Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
682ced364f2dcb23dda0f7f8b066b90e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
682ced364f2dcb23dda0f7f8b066b90e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
682ced364f2dcb23dda0f7f8b066b90e_JaffaCakes118.html
-
Size
12KB
-
MD5
682ced364f2dcb23dda0f7f8b066b90e
-
SHA1
4937692a11d95b95da7e897e6c982b129bf751a6
-
SHA256
2ee7a57eea1bf16f82609f5f28a5e92cb294eaf33d93efc2773c28a9209b4a4f
-
SHA512
7002425f888bbb6bc791397f710dce4f3716a434b5b428edd7f8f7efb9dac0882f94080362c444b3ce23123c669241ba53279aabd7165a378911f930afebbc6c
-
SSDEEP
192:UhVqp+pnKpVNoS9ubVicjWj7qS40lx6PRYgSjp0JfJiJJ15JxJCdllk3iGWvWVaB:Yu6YKSm0lJUhBL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 436 msedge.exe 436 msedge.exe 2204 msedge.exe 2204 msedge.exe 2404 identity_helper.exe 2404 identity_helper.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3504 2204 msedge.exe 84 PID 2204 wrote to memory of 3504 2204 msedge.exe 84 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 932 2204 msedge.exe 85 PID 2204 wrote to memory of 436 2204 msedge.exe 86 PID 2204 wrote to memory of 436 2204 msedge.exe 86 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87 PID 2204 wrote to memory of 1672 2204 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\682ced364f2dcb23dda0f7f8b066b90e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e9046f8,0x7ffb3e904708,0x7ffb3e9047182⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,18331355177793705864,5113460878797090411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e6c810a0065b73f5f73d17297dcca869
SHA15101d13f778416e13eebed947effd01151e40bd6
SHA2566a6006e187b91dda8543811275d87b93c249bc734565be97b48d61e43dcd47ab
SHA5125de9a94b4e79b51cd72740fa4c7d648841568ba09ef45f18acbb28bfda9c7aef1f5c26999dff23bc463524f82cc2f2158a3cfcc66790a6213035c7e1d8f97401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD54fd032207c62860527c6171cb754359d
SHA131561de0b9a9f451f2f0b46de4611c768e335676
SHA256b76b08b8a076c33fd9e3009407c0c7695cdd1a8d5f5e1c83f6d8f550838f8adb
SHA51221f50a8567430fb2e3122f0454a9b09a57cb7ddacaca415c385883f717d6a0700632ca26d472266ee57b046bd135072831b9ca22dd08789c59ba10ba6b2a0aff
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
408B
MD58a68c3f898c9d5f346b68faf0ffcf4e4
SHA1e55fedcedf715c0901f1dc9d1f91bfbaad585b3f
SHA256cf9ba95f29e430623deeea5b4f12e572b22d8a76cb01837cdb69585d3f986b68
SHA51294e02d57fc41e8bd42ed14be5a4726f0d5ecfb802f865de4df02db87278fe74ac64a22175cd03b28a992c1a5d36634f84c41e2d50442967d8659bff85bcc98f6
-
Filesize
408B
MD50649249d0da7215f1d13cb2b272aa3ef
SHA191bb59e88c9611b6cfc3662dfa107eb9ce65d7fc
SHA256fc265e159dc8993013a6e3b7011050bae958b6f9124994be508b15b7fc40eb58
SHA5121511228867d8cb3836f1552beb1d4b29d5c9e18b9097f2df98f1dbada808d8b45086c6e16131cf8c138b786b2d60415abcaa98ea78488818c113850af5240a33
-
Filesize
5KB
MD5920d7f122cf53c5654381489c909dc18
SHA114c44fec8d7192ffe52050940f9f7f6d5187d263
SHA25618ecee757f74687d143892a41d8159cb12934c5f588cc9b1748d2d09fa46627e
SHA512210cb93ef90751feccab647f26ad952052f7ad8b152a994d6daaab64d2068372164a9890e0ab0dbccf54181425bb5eebd8e6bec88743bdc713484bc066b1b078
-
Filesize
6KB
MD50ed8491231cd76f87bd1f7a063039b45
SHA11af8a3c0aad79f79f1e4e3d0efc9be196d564ebe
SHA256d84e675ebfb9ce299c0b5aaec748ba19630f819696a70d4441970587beffed38
SHA51298712da05db3fea5da8f0a7e84fda476ff541b45feaa022bdf5133c163733a242826de86f951eabbc62705cf683707420e42e44f4dd082b1b36c448dde703ff0
-
Filesize
6KB
MD57cfb72953096f3142d64892d42101444
SHA1217b89e0dd734a77e7d2d399f3c61764e09c4106
SHA256cbe0022fbe7d8de0a50d332bf5ce91646f89076986bf8ce00e0be97529684fda
SHA51258c93bc05d3c6aa62522261cf90ba9244d6d691e383cafcf39952b472e330d8991ab51ec656974088cdf1e778db7739d8474fe9e53627bb33218438009df8c04
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5eecc691fabb406349a5d20f1cc2baadb
SHA1843405d97cf17e10abf694b5a9ed8fb8b9b754b8
SHA2568caf6cdd3dc62964862dd11b0a4cc20db5af822b56f8e3aed842aa602e8108ed
SHA5127f5e67bcded0a55c6a709bd75050b494b947f84c48a35e104fb4fd3f7876c560a39990c42a3e8ce3a4907fc2c53cacd2ed948be1608d754b7d596eb94c2a555f