Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
30e496cb42438ca5771d9abd1a735689_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30e496cb42438ca5771d9abd1a735689_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30e496cb42438ca5771d9abd1a735689_JaffaCakes118.html
-
Size
191KB
-
MD5
30e496cb42438ca5771d9abd1a735689
-
SHA1
d5138acff95c103f4b037939e179a76379f00db5
-
SHA256
901f7bebf853de854f04ee164a3d4f68629c472f949a3722d4758bed683a0e96
-
SHA512
1d8631ac4865baa4c5b43dead93e2b49ec4cfa78414207ca3cf8b8b3dcd506625bcd36d757044e17d7321ef27ef36e617c925f1e74de0c20673526fa35978c72
-
SSDEEP
3072:wr9y8l50NK0XqwEJYusIDx17TsjQs9kHW/0KAUj6geefR9Dt+J0:u9y8f0NK0X3EJYu1x17TsjQsoWMCtH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 5052 msedge.exe 5052 msedge.exe 3868 identity_helper.exe 3868 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5060 5052 msedge.exe 83 PID 5052 wrote to memory of 5060 5052 msedge.exe 83 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 1928 5052 msedge.exe 84 PID 5052 wrote to memory of 4520 5052 msedge.exe 85 PID 5052 wrote to memory of 4520 5052 msedge.exe 85 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86 PID 5052 wrote to memory of 4760 5052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30e496cb42438ca5771d9abd1a735689_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9ef746f8,0x7ffd9ef74708,0x7ffd9ef747182⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4757043250021056197,12912116879523019670,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
692B
MD5a8d8444c65bd5c921b0bb599ce55799b
SHA1672c32052e4a39b64e69ddb73a2b319217586c99
SHA2564bf6ff1037645bc768c235f1895c598163c4b3551cdf28881faf302fc51d6bc2
SHA51209526e32be919b19e11f2ee29f0bb03ab5b02752c782447a03c24720de69aef16a74179255847d8562268dd9b8ec0343bd8f7c3d369a35d4f09564c4b23c5166
-
Filesize
6KB
MD515ae9fae028db6cdf587fe4b4e8a1490
SHA13d3942383f5ab3191e584e4c3bff923dae60c667
SHA256a833bc740bc76912fb0f26656e0aeba3b183c0543f7a58baa41a1b8313d9d473
SHA512678d8988ccfcc34e7e8cdde77451ad47d4f312ba74d9b14b91089d94145b68d7222f8de1209934ce5dfa04c621490f382f3db43010e54038d33503be540acbf8
-
Filesize
6KB
MD52a14cc7edf0749e7a03460a073b31df7
SHA139cf122d2572e1d84aaaf9812fe08ebe83247c8a
SHA256ac37498acb6f767c43e8d2697698dae05ce9eeeb56f957be9723a028f1933ce6
SHA5127769ac892052cbdcc048fbf944340f06f748c0f1d7fab81cad11ece86635061fd062669d66baaae7db991df052d8f24bde2f68e48c04334cf7784e5a9f801238
-
Filesize
6KB
MD58a83fc3cfdcd399f9eb4ccc7acbd3d8d
SHA15094b2f360740e749eae93df89603ef87f31cce3
SHA2568ca77fb724d4693043b4c25bc515a743551c1a695a7e0975887491fc9e84bfae
SHA512a6feeb86d116b10d2ff3da307b0f7e598502151ed26ec934118d758f5fd16babace083aae81bc4199a13e6c9bec4096f7833ea1ee8120cfb47cefe448a72a2c2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD50d81a95ce5172619c1b4a93744d8ee45
SHA1e36d4ed1aacb552fa4f8936b5421a42ac43643f1
SHA25615564e673830440a84eafaade78eaabe4b0b09b6d9b6f4007efbcf423fb11d35
SHA512f747d7b4c6bb790e95e8c7d38a151551d60d746c36af579d856197daa67710831817821db8b0b07d65c826a482f07cd9c403651ecd6b9a81ea8900b8bfd496c7