Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe
-
Size
146KB
-
MD5
8e1682a5bdb6f4b47329c813c0ed4848
-
SHA1
e494498ae8a13e294a8014c4b4573f7f177ad986
-
SHA256
02b2a39c096aecf4a65cf6f17e332d544ce532cf3eea82591561ba8342bdd2cb
-
SHA512
ea2d852b5d4b3f5f9d9f78b87a2f019e94edf2dc6c56406f6fc9bc671f0ef5f82f6181eceaaabacb4e835f07d4ce3f8c279a764a6dac6c77e32053dbefc0e154
-
SSDEEP
3072:oSkdI1piGkg0OTLvbQEAV53NjnlBr2sYoBOlljJ2qnsd5+:9k0ir92jbnwlB4oQEzdQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 3948 msedge.exe 3948 msedge.exe 2288 identity_helper.exe 2288 identity_helper.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3948 2484 8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe 86 PID 2484 wrote to memory of 3948 2484 8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe 86 PID 3948 wrote to memory of 1516 3948 msedge.exe 87 PID 3948 wrote to memory of 1516 3948 msedge.exe 87 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 2080 3948 msedge.exe 88 PID 3948 wrote to memory of 4840 3948 msedge.exe 89 PID 3948 wrote to memory of 4840 3948 msedge.exe 89 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90 PID 3948 wrote to memory of 3472 3948 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e1682a5bdb6f4b47329c813c0ed4848_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.flogao.com.br/dudagatagaucha2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b3346f8,0x7ffc0b334708,0x7ffc0b3347183⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:83⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:13⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:13⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:13⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:13⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:13⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:13⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15386079146532435880,13260873625968246676,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD51c57e44475c5b11bc77941e51acafe70
SHA1ccb019810bc3e11460899457338e50709ea5b044
SHA2569098ec443d8b2d4f770027d4fc36335a532c84b2f209181ff56cb688431db046
SHA512d0d29e2e3eb50a13b129dffb6806335d9f23c2d12d79f296f48f4ea8dcb2ae616e67fcd70257b5e14f6e3d8ae92d647e54b18d3550cbaaefe4e93d97fe2f5f32
-
Filesize
956B
MD51904798f1e2ad7cf63ed887d3c2ac8bd
SHA12d34f4a9c3eec5697638b28edf107cb57cc1d7c4
SHA2561174bd8e9df4c00a4343285ced319a50642257b4c9a2a3f0215e9b0ef6bcb417
SHA512b53f02b255f1b255f1d99183d7179fe56f85f27e8e5139a269b1e66028a99f1529dff1559be8c4d095f6fd2f6e1f1c389d89fdb31e845d69c59b31d357c27c36
-
Filesize
6KB
MD52888b8e7f64bc2685fa511da04288328
SHA16ff20c7ed03f8d69ab69301403e46eb8da4a5346
SHA2560095642dc18bdf9ba5231b29f4bb5f1822b5e804014278e038f2d23c77041da5
SHA512fb1ebc23b5b2831113c247e7cfb4508b9cd518996c0c292742815372dcff6e2dcfb8a843e8caaebd8a04abd65b8b901494e388df9b3a1e03b58a85cfbbbd3865
-
Filesize
6KB
MD54074af279c87037aec60d458b3c00611
SHA1950acbcac6e53c53649ae7a881b3676ec1c764f0
SHA256aa0300af350e27ed39e8997f9b8720002807fd903833a419e24962c56711f02b
SHA512450de082dee5d34eca4608147bcd2da587bf33aa46c23a57500ef2773985c01efad329686786874707e71f23dc66a97eaf42718f6a9473130b02417b566a06a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ce64ff96197fb850602e8cb71bb7efd7
SHA167ca2c9e336a4e36a5cdaf170de9e3834fc65cdd
SHA256c09e1f9c83e342bab126342eb3dd3d2016f2a3f26065cd5e1c93534570fd5830
SHA512e00ffb79f7525be2726f19de81f3007f2d7af66570bd5557436c600784c09e2e0889dff1431015deb4905234f1d564d0dd3d1863813171b9cc91f7effa008d62
-
Filesize
114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0