Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
562740ae5f7f9ef60bcea6370e7015a6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
562740ae5f7f9ef60bcea6370e7015a6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
562740ae5f7f9ef60bcea6370e7015a6_JaffaCakes118.html
-
Size
19KB
-
MD5
562740ae5f7f9ef60bcea6370e7015a6
-
SHA1
f834eef43da98044fa2fd4e5ccb90b2b53ad389c
-
SHA256
a967ac702ffbe4548cf41ab93fe25d4e159b17b52f349c529e8e1a006e008073
-
SHA512
44393f080e82bde2a93ad2996ebba684834122ec20949e7ccd6c2a78c71d1be3e0e7561d4273787edd0e22187a0ec0e2ee355ec069bb25e8af3e58575a50720d
-
SSDEEP
384:7PcO9/XWN9wYHAY2uJHLkh3VgTUapfcdiwX2V:TcO9/WtHAYo+TUapQM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 4768 msedge.exe 4768 msedge.exe 2380 identity_helper.exe 2380 identity_helper.exe 6132 msedge.exe 6132 msedge.exe 6132 msedge.exe 6132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 4108 4768 msedge.exe 86 PID 4768 wrote to memory of 4108 4768 msedge.exe 86 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 2296 4768 msedge.exe 87 PID 4768 wrote to memory of 1840 4768 msedge.exe 88 PID 4768 wrote to memory of 1840 4768 msedge.exe 88 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89 PID 4768 wrote to memory of 3120 4768 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\562740ae5f7f9ef60bcea6370e7015a6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe649f46f8,0x7ffe649f4708,0x7ffe649f47182⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,3449461222365664438,13709009762481678776,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5e523d3fe5c30fb25c7e3bb27f7961c82
SHA152c4b67598c88659d8f8e786ddf95e3a310b6988
SHA2560a76131f9e0c61f34cd6b315def40aca2c54a7e53b500e30a9d03075d7091500
SHA512919cbb2b6246207692c5b4a1d4bcf90c6eb236fdfe5b629cce5e541ccf932d259a5b01706897cd9d056bad4a31c156d5914bf540849ba111e62c832bc80e919c
-
Filesize
1KB
MD50ae1e5b28057b398eb7a7eb5b5d14efc
SHA1e4284852792b575cad9214f3f0bf3513e7dff911
SHA256aa93f1c571bf188e197f52b0d00fbb049b19440cf5f637e52ca48c5673e18748
SHA5129988ef65b18fcf2566d4707d949c03f4a283405380a48e30740de01467c4caddf483648fcd0073dea4be400ec2e2bbc2b3dc6fcb664e4a2154b10e3e5d8880f4
-
Filesize
5KB
MD57c5bde78a1a1f291502328373c822891
SHA1ff8ac5edc22c19400219310de6e17cfff598cd7d
SHA256973cb275d0082b2d47af1f66ecccd11fd73cbd68555fb376a86bd6494ef7f74e
SHA512282a83ce15662d55a1220d01efdac8b768ccff05da1ceb8a15cff6214113169fb8f285725cd30abef2438ebfb1226bf09f3db3b384aa9eef13e22d9c4cef0e3e
-
Filesize
6KB
MD59c049602672ebfd05d35a6d1f92c90eb
SHA12f12dc342b76ccca80eba86ad5d1167545d6c2f8
SHA2562f991b790afa3457c929b433619b059ec4f5ceb901772cec4629112d8365232a
SHA5120f8a49b2acb1a003279203a731f9d3de8e066a8b5cc26784ec1fc0ffa888a644d755c805cc7985da64d3ceb0d3c5ddced0b0846a15cff11f314c97a1987ab151
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5064be36f7bd0c6a28666e2f58ae69395
SHA15f5757c387daed1010e9297029e99f99bee93640
SHA25619170dd1bb6294b5cde43e17a0d67a48ae5f8b85c26e19706803cf3de0aabefd
SHA5121d6878003444ac1d9de15698b86b97f59bc3f2509960bc487fdac9aee46418a470d0e064dd767bec7e81526879d7b36c4192da5d38a3240e7fbfd87e81cd587d