Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
d2f42571ef6e8777df510de82c139fac_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2f42571ef6e8777df510de82c139fac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2f42571ef6e8777df510de82c139fac_JaffaCakes118.html
-
Size
175KB
-
MD5
d2f42571ef6e8777df510de82c139fac
-
SHA1
dcce74f6ff23a5b2cea5b2dbd95685056dc0339e
-
SHA256
63e2950843d11461d3ed32ecf8e512868226b8b940f68475c81e559bb3fd6ef9
-
SHA512
4570fbb6e29882bde01482f956c1b8213208ac866d91194a58cfd511fd1ce47bce66e9062e1a3d32386b5a1f7275b83f664081b1f45090f55ab308b85d7bd250
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3QGNkFvYfBCJisu+aeTH+WK/Lf1/hmnVSV:SOoT3Q/FOBCJiMm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4420 msedge.exe 4420 msedge.exe 2644 identity_helper.exe 2644 identity_helper.exe 5956 msedge.exe 5956 msedge.exe 5956 msedge.exe 5956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 4512 4420 msedge.exe 83 PID 4420 wrote to memory of 4512 4420 msedge.exe 83 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4896 4420 msedge.exe 84 PID 4420 wrote to memory of 4924 4420 msedge.exe 85 PID 4420 wrote to memory of 4924 4420 msedge.exe 85 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86 PID 4420 wrote to memory of 1672 4420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2f42571ef6e8777df510de82c139fac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff220d46f8,0x7fff220d4708,0x7fff220d47182⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18154137684628535275,5252308684327174258,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD524d8344d5fa8762f907e5c71cd4fcc21
SHA155ca9a13c62b1f235fc34c667db2dccd2dd48130
SHA2569ca22e08401d03d12e81dd52bd95cb11f9e8d0082faa69f538f27dca6f309aaf
SHA5125bf2b220b1e7369e4b7a59b621cbf195302f727ebebfe2549f8ce203851b2e61df4d9f80be0bc0291c151ffa2be4592aa69bc090bc25a640f400c0ea280f8169
-
Filesize
2KB
MD54feab7f71016f250ab338f42258478ef
SHA1de87fd7788cce25069c35eb9e1f8e64d29d48620
SHA256bb11bb24eeaa7e0d2afd925996201be38c5ffba0a4bd67ec9efa0b24df3269c2
SHA512f7de115571544a1562c413682f954e7a0a1cc03f32286cceaff4cda9214bd1e1555f7fcee75b51aef9c63c6bd4a7cd0d0dca93a8fb1b0182d911d81621a2c1da
-
Filesize
2KB
MD5f804ffb6940871f64e3832e3a407cbd2
SHA15fc0169e8e83e55b6d832ffdb9caad9e5adad441
SHA256cfe0ab0eb02f97c8e627f635b50eea7db6b819b4e3872a3942e2e653a4d71dcd
SHA512ee96a468386355334ec593f75607257b626e48351f1975225cd331b4bded7708d5fb7bfc0964eddc874b28540f54f80153c610cf2a2caa21ffeae5a4b41d72bf
-
Filesize
5KB
MD5203522011929d4c38397b873163c7a59
SHA1419867ee711cb0d0d39d6fd91b08d9f099459fb1
SHA256cbce3867ab47b351f1b43d381590f2a76c2ba7fbcb19643a345f72d72716ef15
SHA5128790812c3376e6112fb8fc6f109701e929b60c7507e1e0f3f3a2e0096d5a7d0ad72744b523d390a9925b29686b64d5c3c642a760ba5df03ae1c4f7476a9c1ae9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b66bee54-53f7-4d43-b449-a8780ca468da.tmp
Filesize7KB
MD565bfd0378a673d05d5adf9ef79ccc657
SHA18c76e7840a17a4bfd4db541165b85490fa996019
SHA256d770da4fb5ef0d8439be326eab85066218dea0fee187021b40d38304d3f51935
SHA5125177cc8eb89671b4d9d1ab41c930c00615f25d5dfb5efc15153c25507fabaa21f1b7fd9909ed62b84a3bb252a5de9eeacf1af29a76d3fff38577ddadb2ae67e6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51008938c06b9d4b3cc7a11aadeedd0e7
SHA19c3f71605992da5c71758a8d6e9462fedb3fe414
SHA25664870be389c35eae0bb9bf09a8cc0bbdb7d5b9d8ff702959267894eda8993745
SHA5123503d284867f2703b449152fcb9ccc59c61020f072ea35dda4b1d2c7837706dd680623f0c5ae3712ca174f6266b1424e052b6abe89861deba0a96be659faec75