Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
e9db06415c6d4c008320619a2a50778c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9db06415c6d4c008320619a2a50778c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9db06415c6d4c008320619a2a50778c_JaffaCakes118.html
-
Size
61KB
-
MD5
e9db06415c6d4c008320619a2a50778c
-
SHA1
dad8c7ee291a1d3899e0d5827260588dcfb6655e
-
SHA256
51e6592b634c9511fa1bad75777f263d0e55d075b4c80293a1cbd764579f02aa
-
SHA512
4add9552faab49571c0c46c50f37d424cb7e76e8530de8d3555abcfc4e526080d285b5ace0b32a66600a0898275747bd97c217daa056e5e0b39d957c3a1f8db8
-
SSDEEP
1536:47Ol1ukruImnSspBolaALUWJgERvjnIMVnza87oBU:47OqkqImfpBoUuVIMVp7oBU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1844 msedge.exe 1844 msedge.exe 2016 msedge.exe 2016 msedge.exe 808 identity_helper.exe 808 identity_helper.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 660 2016 msedge.exe 82 PID 2016 wrote to memory of 660 2016 msedge.exe 82 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 4600 2016 msedge.exe 83 PID 2016 wrote to memory of 1844 2016 msedge.exe 84 PID 2016 wrote to memory of 1844 2016 msedge.exe 84 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85 PID 2016 wrote to memory of 2544 2016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e9db06415c6d4c008320619a2a50778c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5178491080610750473,4162748254202488149,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD518b3dbbfa9a3cc6a1bab60880fd24302
SHA1359cc29c42c88ee0e796045e27293feffedc6a0b
SHA2566bc6da1d8d9f9e1aed2350bc6e8fe2d94efd6a96e9fd2505aab88d93eed60026
SHA5124f68d9132409963ebefc318236abc21e6dc16a68ad12fc1e9290ad86f534166db7b05381189bd0921860fb216766087bffe30bf8eef2cb3c455a5bd41396af6e
-
Filesize
1KB
MD55e20b9459ee45ee082b7c795c21486c0
SHA1030fb836dd59e145013497ef9c0c4031edeced77
SHA25655a493cf05d86dff4efe59e9549b0a7faa451b0fc88c79ecf534ee48ee3f32d5
SHA5122da5f765d8cb6b6c88320e8d7d0e981e88db97865c967176cd210d3b608f15286a9d9994b244566982e38898d659b1725c14bca458f2478a8093811a7ed641dd
-
Filesize
5KB
MD55cd91db59278a446d8c03ec9eff74b80
SHA1105bab26cc625d1f3b817bc0ab6f368962f425b6
SHA256807f48a3ccd01fb8cf7886227a17a62c741aa905e45ad4f65b7c00dce80ce0ad
SHA512495746ba8ee1012af04d3361d38db9f0da4db70055daf1373167bbb40de1c3539373faa310180a682c8461e069e330fbf0860f93d6a8fa37f164b817cb4f7b72
-
Filesize
6KB
MD554fb3c0613c804edf36c3bd3a02142ed
SHA1dae67c4f6bd02b2c96a4df1d616f8a7556f31ebe
SHA256c9359f502fd17b6a2d76bfffee3c974d544bc0a94bc13a6de7848b43730e1d19
SHA512eff85b76d56556072156a11bb608652106af3f87e3d4780c1881ec9a67fc6a1d0a9c18d8ebd2768651de5624c604e1b80d7496087a4455371b32cdcf19184cba
-
Filesize
6KB
MD55ccf7cd45fdba2f64fde520fc05a12de
SHA1304c95da40e53cbf0c78827d3531e2f3e570cc71
SHA256ee476abfac639b68d0094a0251868f98958386604d4f2220300bff8449d2e241
SHA51291f12e08370639e318fc85142645103a5217589f6edf941526128161879480ea93da6215c2eda2fc9c232094d8fe8f40be1d2f44c51b31c8a79156d11b134ae7
-
Filesize
706B
MD5e4b75f26c233c4cccecd8a96f6291d21
SHA1ace3ba9b5fda876c9b9a8e25201e2db8514911b5
SHA25668090c6487216fb7e50f9bde82ff09d2b38ce21836b7c4aa4f566caff840e83e
SHA51258c84e8c7910e62ba781c46a7d296d92882ef194c00ee3bcf956e07ef9bb248c542a5d16a9abe0f6b7875f8e582cb35c14f16446fe27c043ad7fa7b9e3490198
-
Filesize
706B
MD55f58d18f9e82ee56b2587f32d13a2c97
SHA1606efd950a207855f9ea488536ca63a45a5d30e9
SHA256c96394949d241c6d96a94e671ae8cd0113c78cef6e27aa5beb9f111a70c8ff67
SHA512ac090b9f4e9b2d9440c1257cb275b8e7ed794b5bacb4f62530c0c6015b4c0b4d8cd33f24d4a29b1682dcd499dde56bf3526e3475cd3f09794822f3b196a9ffd1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD574869b221df77e94f782ba413ba2e29e
SHA145c450289ded3b061ed038a3e0f38dab2730de11
SHA256e92e0bdcb641f9d1efbad44133312bd1dcb83cc59fa913903bb8770d3b818628
SHA5127d73f9c164b619d343d9cad2e7583804e38aae3a49810ffa332b9804a7266a60e048761a8b0c8175d630f49db34f4ce364ac17837cf1ff67d59887c1652888fc