Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
de61e2827a658e44fdcbd649ad736831_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de61e2827a658e44fdcbd649ad736831_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de61e2827a658e44fdcbd649ad736831_JaffaCakes118.html
-
Size
538B
-
MD5
de61e2827a658e44fdcbd649ad736831
-
SHA1
898f1d9225c83d899a43bcccbe5326cfe6457f01
-
SHA256
737482e796b8f71fba78afefa2b6971b378bcfd7defd8f71d4131370a2763a50
-
SHA512
22c4beca945d227e4d5a1c778662974a0c9d8b7196b6b193554a3e1a3e6d670f4f76bc0464f2cf572f1d0c0b204178396069be1963af09f8f7121b20c85bb80f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 3068 msedge.exe 3068 msedge.exe 3944 identity_helper.exe 3944 identity_helper.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 544 3068 msedge.exe 83 PID 3068 wrote to memory of 544 3068 msedge.exe 83 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 2060 3068 msedge.exe 84 PID 3068 wrote to memory of 4052 3068 msedge.exe 85 PID 3068 wrote to memory of 4052 3068 msedge.exe 85 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86 PID 3068 wrote to memory of 2800 3068 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de61e2827a658e44fdcbd649ad736831_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadbad46f8,0x7ffadbad4708,0x7ffadbad47182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2284 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14533911361855024064,8840458099126415935,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD56e8711abc362b6eaab3619d8ed5b8f47
SHA1a2c37527157f8139f160d753a034bb1504871fde
SHA256e792af7f37b7efcb1a4bbf31d0d777935ef1865a95269519ac6f29140803f748
SHA512922507d29a1af0f8a32e7f07a7741fd4dce12bcbebfd47914df4ced9ae9b831a4e58b9a9b995ed52df9b1d0ad0f1af62b38992d53e76deb0a11ce6b4258b838c
-
Filesize
412B
MD5dfd935f44476d067912a1a0964af36a4
SHA15c4011af9f2e18ce55617fee08f06c153da01b09
SHA256473f743925ef98e7ea245ce8f1220c694d5af1f9656d78383699279eb794b201
SHA512066d36a8e7762049f3f3f2f9abe71ddacc8b5d7a983e512d2ef5c1b867c6ccea37417f5058a315403b302d15a1d08c0a1e92bb46537c3d07a210aa8456e4e404
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD572e9484560bb49ffee32304d14c58fdc
SHA1620d7ac23a56511bd6ef4a0e1fa6aa892b629d21
SHA256c14ddae8ff44965860a79ae1db0a557712b4fb404f0d027568908436912f9c1e
SHA512ee1e5e41a6bbfa3853d5989c361f156d2b8ccd516d2a1520e250c190f17df220cbc97912271a90b678da088561993cfb0fd55f22d5569f2949e313c08ffab41e
-
Filesize
6KB
MD5c2f36fff9e8d97a221dbbd3e3f0120cd
SHA1e83df6117708bf4c8c25aae3a97cc1165dc6bd51
SHA2567a220e2d2011f10d32ed3d967764276bebe8ad20351f788ca4b917f85b33d089
SHA512823360831891add5d2b2ab585e3512b55ba9c3029914f63a20ae8af2cf7ca1eb5b36c81452ef19c0cd80f937db0202bf77a0f182d7dfcf7e1239f40dabcced68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5afd839c0fbf44b8c9e2c588c38e5d6e6
SHA105067ca3bfa95659a6fbe01e19cf27b43ef34687
SHA256b9b7459ee12ff423c4e1c2c280043837d70ad039c9b9bb88603aed0523d1c31e
SHA51233ddc8fb9f1bd79d16c2c04ee441b899d9e4ba8b43ffdb2ed5ebfb5f38a14619832b535d652774984725add8d22821349fb578dc12463a52337f5cbd79e53f3a