Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
2ec8d7355359f0293aebc420634d6aee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ec8d7355359f0293aebc420634d6aee_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ec8d7355359f0293aebc420634d6aee_JaffaCakes118.html
-
Size
101KB
-
MD5
2ec8d7355359f0293aebc420634d6aee
-
SHA1
1d0dd40ba576d6a202537ee2c9a9b544f44754d2
-
SHA256
bd0ada7df0172a6e8391a2e14e881891102582f4ae7a77594b969af4f3c96277
-
SHA512
06f6947525fc8a117a1f1aaba79dd11d2e989c4431fe6b02be134c03e0b85e87ff717ca430a045ee3b3dd9978d946016ff1c78799629876f1b783101f1ee8534
-
SSDEEP
1536:f1OrV46BCMsozALiYlLPciaw6E6bIPiH7nkHXl34HDRk2YFcarR6kQFCCqSAGu:/IALiuh2sVIHBYzrkkQFCCRAGu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4672 msedge.exe 4672 msedge.exe 5016 identity_helper.exe 5016 identity_helper.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2876 4672 msedge.exe 83 PID 4672 wrote to memory of 2876 4672 msedge.exe 83 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 1448 4672 msedge.exe 84 PID 4672 wrote to memory of 4968 4672 msedge.exe 85 PID 4672 wrote to memory of 4968 4672 msedge.exe 85 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86 PID 4672 wrote to memory of 3900 4672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ec8d7355359f0293aebc420634d6aee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa68646f8,0x7ffaa6864708,0x7ffaa68647182⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:82⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15619355101427347530,10346406989532821919,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53cedd9ee9d61a7daf2845952980626a2
SHA1af5d5f828c50595f8d9d693135a33c3555deecc4
SHA256b78a6b9f1b4b20368661f62a404ae83595757932d998b63264202663206db755
SHA51249769ec874a3dca961afdb284d405d94976d1ae4ff18b20964868bdfbe2cb457ea7e565978587c59426ea3e32a9cae8cfa42e0c3055d0063c174e5fa486856fb
-
Filesize
2KB
MD5af454878d5f01bf42ddba07798971da9
SHA16f679eefe01ed71151036777c92561a38716a164
SHA25615a3bf6ebc0380a12934181b2e245a5783aa01f7f6fa2786838b13aa3ce33db7
SHA5125c483b4adabd26854d207949a40592d2ac743728eec46e2662c7564a40970d8210a1774d787f20bc9b6ce45acb229ebb59d90dc390d7dee43df30cc188f0c070
-
Filesize
2KB
MD5c8e93e2c16215d974f3e870694b18df0
SHA1d1e8ba8226fe420b61db113b6c865d02ff17eefa
SHA2561e4bb2a00df65b164ce3703201d46a832aeb1af2133d26e6b9cf9b541be0cfe0
SHA5128b027e3639c43967589fb60f243da17b24b92bd8da62928bed99c616165e98d63e117a26afe7887176e4e487472ddcc3fb9f7470a34ed5ed4bfb323374024f91
-
Filesize
6KB
MD52d1d444032104004fe72c4a43facf1c0
SHA1f139dd797539797f48eeda7818988c1330b2e08c
SHA256a85fdbf8af46ad3042b9e9c63fb7d19aff04380d4ba362992778c9da51ac2899
SHA5127a836b9ccc56e861f2d6b4b109329eae61f7f67755b467877ae7baea646dcb31125e8d8b3672df49560ef1582442ecf6562123e42f5c65176d420bb14343e21f
-
Filesize
6KB
MD597ea38f514f74827337d67b8ee51512a
SHA1fa20887030dfa55dedad5daab3f72891f27ea73b
SHA256e3272d8961d1ff93dadb69879530319f7f940390f71771b57028d6a2bf8a1585
SHA512cb951644751127f6756be321d5b46d6c1396c9443f120a10d2d8abc91d7db6f813fd5f972fa984d8447102e46d6dffcb636ebc2e91f5b0a0699b9c72f25c188e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD518352b2a0233e4b19a3e14554355c2f4
SHA15863ec29c3b7a1c181fd41cb8a5b748232924fb1
SHA2562040a4107d5e07e809e1b126d8936d0c09022b53ac80979887c1a02042419714
SHA5129a03b02d0b531d3d006277c02a9e0bc610d8871fc1a6607d084fef2e1a3f867fdb966011d1394b37c42bce0f3a9aba3280508680f46396e64787f49df052c51f