Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
27c914f3b2a804b76e49a180db00925f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27c914f3b2a804b76e49a180db00925f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27c914f3b2a804b76e49a180db00925f_JaffaCakes118.html
-
Size
36KB
-
MD5
27c914f3b2a804b76e49a180db00925f
-
SHA1
0dc1f7e9033b166440720ad3bf24040c64b33d8b
-
SHA256
6c9fab56c70b83c4dfb9f074be8df3a2a1282912b5b4c2fad74cc6f5cb2aa741
-
SHA512
f60b141c17147b4bbcba49903949afdf257a9b7277c907468538774e667d217007f2282666efce28de3b0d75a1b54eb9bc65e6d9dbca371a6ef948a392ff28f2
-
SSDEEP
768:SVsIcpw6gaxHSxbfWsdYw/Z8I1wEeJHEw:SVT8gat0bfv1qiwEeJHEw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 2240 msedge.exe 2240 msedge.exe 4244 identity_helper.exe 4244 identity_helper.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4488 2240 msedge.exe 83 PID 2240 wrote to memory of 4488 2240 msedge.exe 83 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 1696 2240 msedge.exe 84 PID 2240 wrote to memory of 4540 2240 msedge.exe 85 PID 2240 wrote to memory of 4540 2240 msedge.exe 85 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87 PID 2240 wrote to memory of 2152 2240 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\27c914f3b2a804b76e49a180db00925f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce0346f8,0x7ffdce034708,0x7ffdce0347182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17096526904627575472,17744836799990984125,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD59709ff167d9ca5e94573e7cdf3028907
SHA10af5c0839a367f412acc1c20f9b24de7cedfda7d
SHA256fab4a4507f3886a5064984e92b3f2aaaee91705ffe05421311d5c3e5297b67d1
SHA512ff89b02144d9157afc9fb349683d575fbd55dc014b647bd490f65ef98cd8fc774f48a4c42ddab09cfc7df12029053dac98b965a2c9baa89ca6217ad97a1d902e
-
Filesize
934B
MD5c991acb1e5d26c71b2019b9f991409f0
SHA166e31e46cbea2c781892f335d6d5cd6faa9e7ee7
SHA25696cbd343bce4563b79c3030c1455a33aea2a31acd134b786099f1345b4d35994
SHA512ef6d916cf97aa95a9232259dc050d92f0a93f436b5e2d13cdf8d08cd5a171fd859a10482337c380cba168030b79d291b5f0db2bcd80c362308f87d44a589fa29
-
Filesize
6KB
MD58b1060e5e14953cd4bc3e215d04cd444
SHA146d249d3c5822c8f77b158b927dbfbbe8756de8f
SHA2564f801ba56b357c036f643d9e85af853d98c74400662bfe16bc37d3ca76c93aff
SHA5121272e2f73ea57a05f0df7ec72ec291ab33a358b72111d9e597b27d4bf89668d5955b103fa4a07fc043b78d221a4d024b3b5f5a92e9f60f75456e4029446030f1
-
Filesize
7KB
MD5f4cc94b94511c6b50af02205d819a72f
SHA1af558bc0e660f690145f3922f0fdb0f194d108fd
SHA256deb754c1ed05f6e74c003e10f8bbd2640def2b92fe4f370ec82658ff0432a5ad
SHA5122cce50dd542198c950c2fe2efb8a6dcfba3320446e10cb28e2f11ce706920e1d7bf6c03430a4cea99663a87c4014d955c7d4623bddee912b6a98c9b9550b9854
-
Filesize
6KB
MD5aab7b001a8447a63fced8d7031204ea6
SHA1c274368c21e26c189a6a0f5f38eaddc4bd4f79ef
SHA256f4f3d12687e566c0ad21c5e067cf10bf3e27ad7691a6d524e2d9bc99f97b73cb
SHA5128a7aa78784d008ec658cda7e31b8617dbce6cf72d3062ab36d0072dfb3e06ffb6bbb737f072acb6c4acec0b306107d8410fffc8c3678caa9d2a8426c5cf6c2ca
-
Filesize
872B
MD53ec491c0a23b8188c9cec46e60b4fc19
SHA183831a9c9315b41ca2a38bb4ce998020b7e87785
SHA256aa2da3b87b3eba4ee8d14db7548ce22e452acb3910a2cbdf3e501a35e14acdb3
SHA5122b7f7425616f1ad000c1b616c23341c568ae2b2f32f694b573286e285087dbc005b5e53f5357a0f157c406bd85155c5b59e71e2f527d72081b12c94caa1f8dbb
-
Filesize
203B
MD552f61227022de1b5443f25e8663913e7
SHA1ca5204e50ad8211af770fd2bd28fad5499c819ca
SHA256afe7e637bf1ca01ea15d2621ef5fa5a5c43f336b8eea4b15e3d391de8d49b5a3
SHA512dab587e2fdbc645d26d90dafd7db01eb140d5a1a54f3ba4d5c707856aac452a12b05f71a25a92ed5f6c28ec4278ff6a0c25c798b715b1733d88a7b41414970e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c1e979bc0e49159fdfeae2b3d049388c
SHA139e7ce77d5b14826be51aabb0e1d6e05597ad2fc
SHA256158ef726f2265036602e92c5323787b1305763f1c10dd988b92c312bcd0a79d6
SHA5120ac0925f6f592d93decd38090e864c06411a3f8c988ece017c22b6d9414a041c1dda9d1523da0bed95b791b90ac55cea50f2f9fefee9119b5a7851c0dea3c364