Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2a56fad42a12f63d25e3d7a09714c7c.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2a56fad42a12f63d25e3d7a09714c7c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2a56fad42a12f63d25e3d7a09714c7c.html
-
Size
68KB
-
MD5
e2a56fad42a12f63d25e3d7a09714c7c
-
SHA1
4b8f28312b6cc7eb3ccf88baa5673cec3ad827e2
-
SHA256
aff5624594464e67d0bf94e15941dabcc81be4c9ab8c5323c1697fb7875ed1c8
-
SHA512
ecf4833902e492cdb269ff972431495cff7271110c9612dcc2f133298b3b42bb2c1a149635015dd636bebdc1c4bcf7d96c1c5d7fc5935476ddfdad2d602fe060
-
SSDEEP
768:SY0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/VX:SqIk/ntnwO809oUucW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 428 msedge.exe 428 msedge.exe 4996 msedge.exe 4996 msedge.exe 3164 identity_helper.exe 3164 identity_helper.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1256 4996 msedge.exe 83 PID 4996 wrote to memory of 1256 4996 msedge.exe 83 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 3484 4996 msedge.exe 84 PID 4996 wrote to memory of 428 4996 msedge.exe 85 PID 4996 wrote to memory of 428 4996 msedge.exe 85 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86 PID 4996 wrote to memory of 548 4996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2a56fad42a12f63d25e3d7a09714c7c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a4b946f8,0x7ff9a4b94708,0x7ff9a4b947182⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5812175830301493897,4209847246317273428,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD50df9849a32806a287621ce16483c88c0
SHA187f595452adeab02e79fbdee3d0fccf2e2172dcf
SHA256aea0bf2eedd9d76d8c71e4e1f77c3f6d8c2e918593ffad78f16d64a7e846ce85
SHA512efcf14c45adf7f7723c61a506d8c55368ae8fb3bc3951ccf5040e52c0077a9b18160a61235594105676d5b814c197b88debea8d382997ae11358e99c0bf7641c
-
Filesize
1KB
MD52921a5ee72db10324f91d28d730c10aa
SHA194a44a974e388c9651ebb16955f4e818c517b0f5
SHA25656a54518d389dc3334585dac50af97bef720ea1869cd74634f4b2b3f1e597f68
SHA51257add1d012bc906344fc437e322d1afaa85845e2301f815c76cde8f245e225e191300b283e095bf53b47930e388a6e2dec1636a4448d92ce5695f365621b978b
-
Filesize
5KB
MD5e61f9dd333dda97e9e7cdd1c7248bbc6
SHA16720dc3e6a268c98b6e43395dfb811dcf9c51684
SHA25683831c79391680618e539a7774fe8ae5838c943a05104dd32ede3718dffcdcc9
SHA51272c3b2648e524cbce77e6f6bdc4ed3b1e661e7bb39eda0a5c465d6529989f1ff5f5a8f8cffb5b0867c52b44584f48479f152e0220af86bce9ed6de8fb4ab9c37
-
Filesize
6KB
MD5f8cf4bf633c55e7eb58f88d135b9c779
SHA11bc5da243d138ae6166edc7e50c1cb1287ad97de
SHA256915dc817176df9d46c523ccfb16aa6c4a17cfa6f3a52dbfee66723142da7ea18
SHA512f3c3fdabe108a89e493fac89c99c88f83c939da07f8479b99001034f50097b35df1aa53c13ed80dbb5b2830bcb9222ba18d0a98ea1bca68177273c34cf3ddabd
-
Filesize
6KB
MD5b9239baeb8ee09c62a96d89293724642
SHA1bb0c7ce5a71c2c44e17451f341b7e790c23abb3e
SHA2562de387af5a5af98d62f09d88324f245cc57f71fdab658614c56dbb5012b46714
SHA5129a001112fb06585ee1ca1f179be48b1e63623fc94779cac7cdd6df5bf362e7367f82069a69ab2af6eade42f329fb9962ca303fbfe53c04917f90912f36b12a65
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e9b7066d4ea1e6cc7d950cf90f3159b0
SHA10a0c69973380fd56dbf5b9f044615e6cba9f2663
SHA256093dc213799e699af7f530e9b2c1f5c649dbf90e4401ccc99b02db5b791962e9
SHA51276df28734c5e8bcc31c9bcf07c13cf53f2061f4647b41dc8271b5e151d481c16fbd248fe932163cb3a0d77d1119c6f321b3be0459a454270d19713192969cd6f