Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
5ec2caaacaf98c66c36b4309a08d93fa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ec2caaacaf98c66c36b4309a08d93fa_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5ec2caaacaf98c66c36b4309a08d93fa_JaffaCakes118.html
-
Size
228KB
-
MD5
5ec2caaacaf98c66c36b4309a08d93fa
-
SHA1
69f83ecdb13584dbd2fdd05f684d7f1e64df20c4
-
SHA256
465e45caf02aafc8b511e294b35fcd12fbcbdcc81725bf83070277559345d08c
-
SHA512
4d30a878d378a9c570ede180f9494c9793c61ca348b9836f748a8f204629839a6d3c560c8be317c0d5aca9fbb7587f74ee42b1eb79f8a664718b80485f858331
-
SSDEEP
3072:A3UHWxGCPXWOfh/PYPlIWY7RkTPSHSe1Pdr:3HWdqkP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2492 msedge.exe 2492 msedge.exe 4528 identity_helper.exe 4528 identity_helper.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4864 2492 msedge.exe 84 PID 2492 wrote to memory of 4864 2492 msedge.exe 84 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 3508 2492 msedge.exe 85 PID 2492 wrote to memory of 2528 2492 msedge.exe 86 PID 2492 wrote to memory of 2528 2492 msedge.exe 86 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87 PID 2492 wrote to memory of 3612 2492 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ec2caaacaf98c66c36b4309a08d93fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd64e246f8,0x7ffd64e24708,0x7ffd64e247182⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13317646292707877261,13672809384473063214,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD53116f128d7711d6e0ed214d1ce7c24f8
SHA1861c26b641e9302da1ca6e409ae2ff46b2c670de
SHA2563a2dfb8c47598c9991d025bbf3acec743859fb8f0d447775a45d3ea8ea4d5c79
SHA512e048e765cb18801fac8154a43e7caa0a7156279be7d3e9b9cdc28f17c5cc17fe9727819ed9b8547fb749adc3a55721b8bf000ce79cc27d48dcd3733501859d23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5147c8575863ef10089f0c7548fae3b25
SHA1a4d01938e4b0e30f32a30f379a37c26bead1926d
SHA256b9ce7f7f0e1edf07c22b39fc2844ad6026929462513577fbbd050cc610fc916b
SHA512884975f0bdb9d2b894e4ba782cf9497f97f610d666df24c71737de38388ec4e29a04e38b5a93595a8b3780d390dc353e5b454aaf256c6e2d41c38a574deaabdb
-
Filesize
1KB
MD5c4e363077e96249997886bdd94ae924f
SHA1abe36d6a450ffd06bacc8961b8d7ebb68b5d2218
SHA2565b9470f6280c476169f8f449069f57a33081feec8125d90095f0ef7175fba129
SHA512dff3a3dba4b2de6854185fe87c08549f31ec149df6d9ccc4c14cee3f7fb29d9854f7a2e4d9260735948986922d69cacd27118dc7337c3aa4a4ba2c22013309b1
-
Filesize
7KB
MD5fb8d9d9ff5567ba8b5d259bc35110eaf
SHA161798051a9369b021737e6feb624cf2f3999bea3
SHA2564678c498ee6232bd7b957fcffaf02c4b6e41d02fd71b4a6ed50762bf9285d9f6
SHA51237f11ada0061872e59af26e046723c53245658201760a14903d7d625798874c99cdf48654aeb51a50c4f5d300471eef43731c7a36a02ef1730ea7ef14db5e122
-
Filesize
7KB
MD5f7444ef50b6afaf4f3bbb624e6a832af
SHA168e3bfe3f27ac44ee520020813743af2891bba3d
SHA256106f9e7669c584f369d59c56b6a734ef0ed1811468d978e4cef373562000748a
SHA5125f04aba6176400041d68893a81dddccbf960269d1c91debd161f171d9dd52796f142b3cef8720217180f485c7de0465d76d3b6b9fba801c5348607794cedbd1b
-
Filesize
7KB
MD55f3f69df9684f80219470cf95371ae91
SHA1d62a3ed9ff108cd43c08975253ed55cae76d68c6
SHA256027ad301dcd24c8106bcb7d473c8705628c8fde11d579c043bd7b22a175595e3
SHA5120bda14b5c467f6e18f1201802f6250dce86b5ea710ec5cee3b1f0bb54afd46d3343bcbe468d913fadf1308a475f515fd9acca939902bfe6cb5509c38c11c8512
-
Filesize
5KB
MD5e6373e5d986f23dfbbe30f8a8d08bc3d
SHA1a459c109fe72685e96165969d0ba4856191d3255
SHA2567d27033545d9bdf524806d312937c3850146a0f73c345f46688c624b4459b6df
SHA512fa67f0a6184fa2a81e1aad4140ffa8f096941a318a03fb46be293d2c324d0feda1f973343f5fa88ae759da4a1df2b204d54ad1b21ef8c4103498d7d1fb737c06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50808f4e96ae6628c2f2ebfea6925f6ed
SHA1aa2067b5cbda5b56c3614561e9c0dd2fbf5ee153
SHA256a77601ac7049c37c5e9fabb52d348f361f731536cbce775623a1bee4ab9be507
SHA51225631fbc4b544543f6927edab349e78cac926b22c71614889b09297881ffd25a0d62815f3ba47de4a2bdd171ab37aae1759e6345b8b10ef3add51cd7fedee449