Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
788221f7e3ad6663613309bde2e6062c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
788221f7e3ad6663613309bde2e6062c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
788221f7e3ad6663613309bde2e6062c_JaffaCakes118.html
-
Size
10KB
-
MD5
788221f7e3ad6663613309bde2e6062c
-
SHA1
4054b9be4f9f66b7133a7997b01a4856e91ab81c
-
SHA256
6f6704919ce5c8084ab8bf0b19246b9975066042f380ce9018e60d894aa5b6b1
-
SHA512
178c525f2fde28c19af3c41c669eb30f31962c6269c43e6331088dd9f8956fa95906c6a1164af5999afc282f49d55e4a92d90312f5ef55e7e97d8206d73ff24a
-
SSDEEP
192:UYa3bhEUYSWMHVSkA065Dn4OZLhcGVp5TZ85HHXAAmeqO67:Na3bhEUe+SktEn4OZLhzVetHXAJHOu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 2908 msedge.exe 2908 msedge.exe 4072 identity_helper.exe 4072 identity_helper.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3368 2908 msedge.exe 84 PID 2908 wrote to memory of 3368 2908 msedge.exe 84 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 4476 2908 msedge.exe 85 PID 2908 wrote to memory of 3612 2908 msedge.exe 86 PID 2908 wrote to memory of 3612 2908 msedge.exe 86 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87 PID 2908 wrote to memory of 2252 2908 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\788221f7e3ad6663613309bde2e6062c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff122746f8,0x7fff12274708,0x7fff122747182⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6791272816720874113,17755231965921756642,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5d739ce831f268dc6c0aec6ff3745106c
SHA128528cab95510f8ebed08f4fc4c47cd5a577afb7
SHA2565819643071f0ed662651eec3f22aa6f24be8dac40c2dcc823fe12412a91b2044
SHA512b1bdc63d77930fd6e2d2b3ae3c3ca30d3d06411d3dde932300fc3faf55d49f07893a5536f66fee0e131a9478516d5af58e7410f5c275930b68bf7f6860443658
-
Filesize
818B
MD5741aea0b20346948076cd3d5dce60434
SHA1237e192c21d4631a2be50c0ec758009a0d33ca38
SHA256da3b463d4362754a71f46e34dbc654f6926e3e2a51340387e1eea0779679b3c5
SHA51217c09d7d1a60a627d4bf9ddbacba5ef9649a133a195ab1c5e2eec4b440c923cb321b70fa69c0fb0f31023b4b7a34fc4e5e2b439ca7be295621479c1ed901e4f6
-
Filesize
5KB
MD55871effeb5e682e27a9d43fb99b2ad9a
SHA16b39bd5086a9d035c49e934eb03c200062a3eabd
SHA256910513b10a5768e35e741bcfa526738799f052cce34abbe136810a120bccc57b
SHA512420634a64c172b4af1e9124c5fdca216bd45b4cbbe3abd4920deea57253667de24dbc32592cb45c6337be2a88152c96fb93c5a96b7ffc90b35418781836913e0
-
Filesize
6KB
MD58eda2964c6677eb1f31c357f24f02365
SHA1afd2fbf5beef0c96831c95b1b29e1629585ab94b
SHA256725d11298f6d2446fc469da3d62c37864e8584d95e6f667386b1585cea23e35a
SHA51269d5556d709766abaa7a4c4f1288478c63c0e515a1f39e33ec1ee229d7f9419d6dbcb82506cf98003f8209c0bdd128f0e383e1cb59bdaa876e4a87a03f9f4106
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57f702f93723ae32fbe429b6621e4413f
SHA12e9fff4869dba83c78203058dd5e5ad65b1d0276
SHA256114f00f7996e9d6c3f6f3281e4e0a82eb90dde622bb5ba2c1cff2c6778891e22
SHA5124ee4dfa870112f75e4e8d736ce7f4ded841a5542b26628e051efad359a6fdeb5055868feead1f2438b924ff1e75c88384a0c407d6386b0c47944fc0bfea3b4ef