Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
33cc02681eecc1027027e151aebedc86_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
33cc02681eecc1027027e151aebedc86_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
33cc02681eecc1027027e151aebedc86_JaffaCakes118.html
-
Size
15KB
-
MD5
33cc02681eecc1027027e151aebedc86
-
SHA1
e274e5a66c347d0baee030eae09175a6ec45277e
-
SHA256
c4f5874abac5143f2ea0d3206c0d85612f8c48ff59700e2b3da9f2d42aff8bca
-
SHA512
6d7367c57fdea03976d33754e11f45628465d5d60b245056e7158f5ad415a7102347f970dc02e268238c2f1e641624ca07f0fafa36832ae4c9bc85b28f9aaaa5
-
SSDEEP
384:5Ooibckt9uicy69APsA2UIUetTYbcz0zJ2:CckLuiYeQTgcYA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4140 msedge.exe 4140 msedge.exe 1476 identity_helper.exe 1476 identity_helper.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3152 4140 msedge.exe 81 PID 4140 wrote to memory of 3152 4140 msedge.exe 81 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4080 4140 msedge.exe 82 PID 4140 wrote to memory of 4044 4140 msedge.exe 83 PID 4140 wrote to memory of 4044 4140 msedge.exe 83 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84 PID 4140 wrote to memory of 3884 4140 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33cc02681eecc1027027e151aebedc86_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8d4f46f8,0x7ffa8d4f4708,0x7ffa8d4f47182⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2006617306205624956,16324593284390678563,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD57b1cce31e54cf74607636acc92fb0be8
SHA1486c431575b0abe6c5f5758f7ca93a8c884be739
SHA256f38c09d9be56eb588a0900ae6c77159e1f90e6ab62b3676da30d107410cf13ae
SHA512979c818223a8eec69d4fdfe831b8c6f758d259ae817b4c694a19a6180b6ea5a745084a56fe938815dc4f868465ad12cfce4a9013f23fb376e7e54b47194adbb2
-
Filesize
1KB
MD59020e6faa46f1de2cce803da0a068ce1
SHA15b2b286d2cee2473edf99f35e1e1e5cf0975289a
SHA2560616d1b2fd02514bf4d39ab8fedaf83180bbad9f9eecf70526810467761edbec
SHA512f70d9360b638d82c01700097dca86e091ef64e07a820a5ad4c17de1d4ad66c3028b4db467e87dc63ad1f9e363f2588dd656428b61d3908b15b6249790f32c433
-
Filesize
6KB
MD5765b8bd6a6fa78f434cebc13980aaf52
SHA1b92f44005af432dd2fa8c64bfc5105c0d77af02d
SHA256c282337e024660622750a69acf61f0527e0a2469f84eaa456109ba5ee431bf1e
SHA512b1f5dd84f88e41e250eefb6f114ec74ed0a064f25f2679965b161b50417bb37d4a214d3d2da1eb01971273e4301acd1a29167affbc57b9f60518f1c266fac2ab
-
Filesize
6KB
MD5ed04c7d130132a57770eb6c1b83287a6
SHA16656cd9cb6ab4de60ae237919a25092070ae07ef
SHA2563f2df33a80d6f03d5af8e8fbbb82c4c02103f50c394ad4b575224c137193967d
SHA51226fb1341f7d2a35db429cacd21ec9c675f0ddb7c10e2e9ac89c5e4633f94863b8a8a3ba868defcc76b92f47e504a1dd3a5e43edb7a8f9f0dcaca25243eac524d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b6789a316b10c04f4d23b4754e0a8e9b
SHA1898e1a876f12257bf54dafcfef0837a345860740
SHA25610fc735ab01f7326d603b51fd4315d45c58d9b204bef20aa21e9ba560a022a98
SHA512b78752789eb1a28cf7c90f7e2b95e8662655ccebfad6e7417d3d2fa084d09bf61ab07fd830fceadd8b25c205415f795dba52c23d31b570271f6323752951df69