Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
3f9eec679e3c176cb429abc32cecbbfb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f9eec679e3c176cb429abc32cecbbfb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f9eec679e3c176cb429abc32cecbbfb_JaffaCakes118.html
-
Size
36KB
-
MD5
3f9eec679e3c176cb429abc32cecbbfb
-
SHA1
220a4d74893b1aa3ed3fc2106b59512ccc64db8a
-
SHA256
20be81f81cbd0e8495642199799821b971e5b082475e82000ef78029171155b8
-
SHA512
a4e90a46bd378501017ef7d8631f73ed8813215eb69bcc030efebbee059ff20bc1003dd92e19f239feca169bc2fee20dd423764478c99b05b7390d6059731e34
-
SSDEEP
384:a7+v2ZukVgyqsJJVssXqs6y0BiptWJ664YqnJx57x8ZcnmwETm7VzjMxJgsRopOw:gW8Q6Rnhm7gOVLaSxN0B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 916 msedge.exe 916 msedge.exe 1444 msedge.exe 1444 msedge.exe 3712 identity_helper.exe 3712 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1444 wrote to memory of 3252 1444 msedge.exe 83 PID 1444 wrote to memory of 3252 1444 msedge.exe 83 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 316 1444 msedge.exe 84 PID 1444 wrote to memory of 916 1444 msedge.exe 85 PID 1444 wrote to memory of 916 1444 msedge.exe 85 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86 PID 1444 wrote to memory of 4288 1444 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f9eec679e3c176cb429abc32cecbbfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9e846f8,0x7ffba9e84708,0x7ffba9e847182⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6416 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8974722144865105770,6314586333757008814,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e7ff8b8af763ae4236f31fd33d23eb21
SHA179222e614adb363e5b0ef5cd93edfa07f1094d88
SHA256bbe3b2d3598d3af3940faf5cadf58f0f065e87a8fd4640ae80badbcd7fbd525a
SHA51237289450ac2a6547814a6731b533e964baf49e9cf91996edddbf9325c7fcdc78ae2bb4c986dcc633a080215c5c94ba17ec482391bdfb7d5f6af2a4f10668011c
-
Filesize
790B
MD56c2b8b63adccba08db64d40be1206d97
SHA1c445f582b1c23a6f4b0fe7afb41caf14948daf90
SHA256fe0c2ecf424d9eb4a63d236679be95d6f209ab7c322aa477a40b414a69d4552f
SHA5120028f7e41a40f10ee8af434d4beb151b8fbfa61976204bcfb7d61f387ac2ae82ff64f46e648c0d0b8d80af40927d3af86fe1d9cc9a3c1e1f6ec684beb1de8d47
-
Filesize
6KB
MD54dcd9368f9c9ae9d1ecf25fa1220adb0
SHA1f1fd46cd65c49b4a27aef861bd5372d2621c33c5
SHA256bb064121bbdcb909d42929192db8dbcd47b904c3196977bb7b56a4baf834807a
SHA512058fab550f07be3b0d45e27bef17930af01bf06911f57e9b80c898a96cd9c1b5d2158d1f00c59e9c71081bbf151a912e7e23e88a208cbec799df99fac23bdc5b
-
Filesize
7KB
MD58a105f716791c4dbc3541520226356b5
SHA11e25a7251cbb3312dd0ca9dd00b768447a8cdcf2
SHA256c98c06eeb687e80fb0b94aa739ba57e4239b302854b8a431a7a9689710d341ff
SHA512275af522dc0e0d5de3ed0a66a5749e72fce3d13276c75557559b1ff6e7853cfe0caa47330101b7dea46879a22724311e1722381b7ccc5efbe241d6d93c9c4969
-
Filesize
7KB
MD5079b2ff67331902da319a8d3b34e0143
SHA1414ce8067387558d2c4fe910b0b75a18d26e7104
SHA256c4b9a547922bfdd86709959e159bbf718d411af2c87d475f712aede80cc0c9b9
SHA5127af3e4c9c3c63f9a477834acdff41eb0b9edd8b247fbd68c4bb081e20ddaf5132232ea5f7dd4a507b199084e39af14070cb8c6cccd51559347a0ba710c1e4737
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5214cb2e10095b1866197997f279a5538
SHA176a07ca0de0d2a86d38a15db2951acfcb5c56b5e
SHA256e727dac9552f9332734840af533762a4f8a458e95e952481d4cb8e7a6f1feadb
SHA51254846308f7a2890e19d39f669502bcc40c4fca9e6a3784b5a51dfeff4ac61ff026a4f13a762f4072c82d8a35271a510daed92a6469a5b9844c01d80976a4dc20