Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
ea872bba667a014af52e3aa9f5eba50f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea872bba667a014af52e3aa9f5eba50f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea872bba667a014af52e3aa9f5eba50f_JaffaCakes118.html
-
Size
135KB
-
MD5
ea872bba667a014af52e3aa9f5eba50f
-
SHA1
7cb71119a5c9c4a308ba5bf9d5b2d9a6ead97b5b
-
SHA256
96de3551bef1662ee5317b23c574e3784a8d0a269cbc606cde5e8de5b831aac6
-
SHA512
6cc0266b3682c27a3f5d628661305938a681ab7ba7f08cf6feb4ff4c936803dbe8b1169f736f9bcd48ee2509d057b66810f8a5f37f00e4b897375cac21e85f27
-
SSDEEP
3072:31m3IQzj9bF7XvO4ebyb3y7hJZWpTvTW585Ij7dFNA7J5q:+76p1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 2052 msedge.exe 2052 msedge.exe 2784 identity_helper.exe 2784 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 4264 2052 msedge.exe 82 PID 2052 wrote to memory of 4264 2052 msedge.exe 82 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 64 2052 msedge.exe 83 PID 2052 wrote to memory of 60 2052 msedge.exe 84 PID 2052 wrote to memory of 60 2052 msedge.exe 84 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85 PID 2052 wrote to memory of 3572 2052 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea872bba667a014af52e3aa9f5eba50f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd76d846f8,0x7ffd76d84708,0x7ffd76d847182⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,5595004131554503458,3143940263658222492,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7fe4eed3-bedd-4d58-8755-fb342470abad.tmp
Filesize7KB
MD5eed63538fbf33ae6312863e6e9b1cbed
SHA1f3e0d1bdf376cfc04617e5303a4136b2abd3e43c
SHA256249bc763fcc52100d570ea936a7e88caa25e510bcff40d799361cd0d36eb2db9
SHA51231cc65d36358eb2a2aa99ad44b69c97a21b75e9075081b3f4fab9a1af7c91b75a9d90cbedf66039bc357df135c2af1bf36adff79310dc1d73798d2347de566fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5593d9e0556dfc75b63ae9c7ff347c81f
SHA1f9628e9ead7c674733244928781f1055c95ac140
SHA256a54d812017a5f927ee064b6e510011f4c094179de40474819187fdc93c9d8261
SHA5123a6dec715114e6c803e15b111db225056cccc6301f51af83d9919eb6e7ebc0af4f6de02acacd38675dffc7618375aa965af096737fc3064ab6ed88b74b50958b
-
Filesize
1KB
MD5f1a0e6d9027009a7a438734cbd8baa28
SHA1fec76737cfd6ad5b904161cf39dfd9b98b367e73
SHA256520244e5524472e50489aaf943c2973ead6374b75222f9357820e7d256a2ac80
SHA5126c94319053c299e139e5a2436cf91b1bec8f8460b282122a946503511c8cdec9d08e8ee5441e5ab4f2af35d4fcaddb8501d46b15f7e83f9fcea1c1e0e787033a
-
Filesize
5KB
MD51355dec98a2066bd95cc6c3ab6ff9662
SHA1474f7b7ee8b20189bdc529a55a0182c46fa8f992
SHA25656cdd1f3de24f0ee09a04d2d8d2c0b756588c5220f64a3e46ed3e8d3aeadc426
SHA512faa5ffc964be65d360a500a881c7a433232c98c886d2a7590360f447515d2e856accc97e949f978888d2d2154977055135be5c6ad6164887cb613250738ba10c
-
Filesize
6KB
MD52849ca8e1fcf93641a7a84624fd26de2
SHA187f2580a8018d7c0a46b6776c052baf181b5d5a5
SHA25692c9913b619477d43de7f81f1aa006bdf6bfce0f31c632a8232efd22c3db1ffc
SHA51248a534dd1251acd8800e7da42efca49dd02606f360448a2a16d798c50c4f497c071130b6e5d2b73783a7c0269592326669ffa9bf861be30d857db5a80df320b5
-
Filesize
7KB
MD5bb64791c11e394fd61593f90030dc28e
SHA11cfa0ae9c417a038c386c434a73d80a115494559
SHA256711a05c3ecf500c7d6f8a8dbe0887ffcb005e5f8d93add4d29ab9651ed916061
SHA5123d7a7cfe185fadd940b9989530531dde9687f97951164f4a8b6f03e4ee19731f0fcaafbd179a3c880c6aabba0d1a038f42d4f0462620f091798a1ee9f61a63ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5deb63777f1dd6573c0ef9ef54ff6a7bb
SHA11374e216e7051e5f17b5486baa25dee2dc1ee4bd
SHA25670280addb537e90eb1ef288b03f6e0976cd05e46540f22ced0ec3e703e70f93b
SHA5123e62863d9bbad67858224988abc5b50844a739786cb109596651c1151367d9b34e863f8c4bc5a18b6fcda59272d3bce1e8bf0cf67a85ce331f5dcf2a2b0ebc28