Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
15f77d89bda374548f6f96c593db6749_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
15f77d89bda374548f6f96c593db6749_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15f77d89bda374548f6f96c593db6749_JaffaCakes118.html
-
Size
369KB
-
MD5
15f77d89bda374548f6f96c593db6749
-
SHA1
0908d8add319b988114dc3f55c46706a1f56eafc
-
SHA256
e392d571ea6ceacb7f978abb9f99bb2c92d911124ed97a855a5020a32643cb31
-
SHA512
2fb82f506b0e6e4673a54553547d47bb7249279b4dfdaecd742ec9254af7a3e46b9f0500b1010d586b1dbff3c0ca3bc0e7d0cbbceb9945a2feb570ac7a24012e
-
SSDEEP
6144:fGguEXzfroCVVp4I4qLxzDdO2bteybM7NSz1bz:/1jfsUVp4I4qLxfbY7K13
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 4692 msedge.exe 4692 msedge.exe 4212 identity_helper.exe 4212 identity_helper.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4808 4692 msedge.exe 83 PID 4692 wrote to memory of 4808 4692 msedge.exe 83 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1012 4692 msedge.exe 84 PID 4692 wrote to memory of 1908 4692 msedge.exe 85 PID 4692 wrote to memory of 1908 4692 msedge.exe 85 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86 PID 4692 wrote to memory of 1600 4692 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15f77d89bda374548f6f96c593db6749_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff453f46f8,0x7fff453f4708,0x7fff453f47182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1268 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,10267522168723014398,8059401786578174021,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD504f6d6c7d8b892dae4abae659e25c01f
SHA1afb064a1c515ed9e27f9e05fcc2679e0fe614ad5
SHA256c4cd6f6199e6c97403c5665a844266a8bfb4a059a0b151faed2f1eb45f5c9e17
SHA512d5ffd10ef480285e414fc3fac00dd74ee4c0dbbd5c308f224772ea72db2a1b6e9ec9ba632beb787756239658f178d8bc1db21ff1355e466a3db8662ab3e2eb4b
-
Filesize
2KB
MD5d32b5312115669224b0a1eb001008188
SHA1c857f5ef184b2d47d71e39adfd8ebfda5e948724
SHA25683879cadc2a3740acd6ecaa4891e1e94eb1dbc52f2e52701e0a85eeeb677b784
SHA512debd47b94d1813b2576b1fc80b4b123dc20c963e00c1c3b696be8252f08c4d316a188b9fd1aa65075c0486e9ee3aa05c9def4f1bfd62b186b1b18c64c9e6a38b
-
Filesize
2KB
MD5a9ceb5b9a8d7a0f96229cd2c29a4a914
SHA131eb141688d227ed0ec8bb43c0e7b0745bf5b79c
SHA256b75460314b617c7d37eaff6b092d48c2c3f5a6ff22108d6c5e7a7fc392fcc6e4
SHA51221d22c0a7d977d2d81128160e31df35bdb98d502db689c95c362dbd2f06d15d5841f0b21edb463b1c3bbbb13f60f750282cd6b3b9cfa14e5b1a6026c48bfd38e
-
Filesize
5KB
MD5668a45be7cc050284acc0100eedb2b3a
SHA1a260b4ae0898f79448c62c3dd4217aeb51a7717f
SHA2565443edffa01853a402c383c20b013258a32c316322052838d0ad13eaf206a430
SHA512aa1730b4e3bd959a9ecdfcec4fb5305a4d6eadd320074e6af271c6575f5521a689931f33b9ed7bac73e3a0f9f5e7441b5902ab408ad2214195b2fb3a84316b7e
-
Filesize
6KB
MD56c1ba1ddeb7c6e9f9865b55fb458f85f
SHA1e3ff54c5e4479abcb3ac9d1fa578dd59689e088f
SHA256c526f49b8f02d660105c572a2ab9459ab293d6616c50efc1a0b2e02faed5044d
SHA512ae2f357ddcd86bf6f07537866f494a776525060482eb66adb97e263284381c494a468dc33672f435dcb50c7405017f89aad4cf1520f5dbf570b2bda0ca51ee7b
-
Filesize
7KB
MD5334d3e620e3152eceeb918709fbc6545
SHA1c197522318aecac423f0606e492a658d90b5e27c
SHA2568fe6bfc007a386cb51008ce2d7c22816786e6eb711e9874bdf4f85ef15f91f37
SHA512bf4d9213fa1cf381c844d66372cb18c6fd07136a16ec063422776079a82ee785178fcc6c27455e84d4ab5e7f72e7a8324896d8502b5e362c4dfce05d76395ee0
-
Filesize
534B
MD564afdecafdda1884dcc219b57651af8b
SHA16f9a5d765c1269d98dc2c9b473066bf8dfcdc841
SHA2561f3abddac6254280ee201e908453b750611ce420915bc1f819f034144c9e899c
SHA51243d14f53285523ebf49543ce43e9a0716509ea753c25d8e95fa5c84cf796d49755cd47caebf67320b04f84ea214fb2a21f7c6db9862459cac7fc887328fe86b9
-
Filesize
702B
MD5213f24c060114c049418537702561ce4
SHA17855b91c2e64094471f3e1b32c3db7e2b0c7b3ea
SHA256c2a3f05df7a6260c695338e47260d798e903adaca3af73224919a20669c92656
SHA51288108c93014df7c629e4534d4a4678dab13c02660a122b394f8129ed234eda5c87e5bbc0b93a84e98d3ce271b057f5f54d1f76993f2472136cfec53a528469fb
-
Filesize
366B
MD5172a1e2dc5ef3d6b058073f88e12aaaa
SHA1b78668b421b10bcc218b9182c3d9b7d77440660e
SHA25616bf54972ff44f180793b305d2475160e6bfd0392ab0a2817c7804fc9eac49f7
SHA512b5e537d0ea9a6f416c3cf86e4f6d91a1397f6ea43e0963d2b831330dc1e531a01a44806d9831a58205b9d12d86f4ef382ba5bfb0fb2c8e13472382e314d40a0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD501e425528a0fcb7b7d4d6ba560418522
SHA14044fb8eff961af4cd622815bad15917981abcef
SHA2568deefc5456fbfb12e27109066e97e57d07a848cf88a27b7168e417e7d7d223d5
SHA512b2bba63d873029765fc0036cab2d1bc1ca338af8a34e7a2b19a3f4c26ed4abe6f5ca865c6f6962a7d417334003665d589ab06a3e866b83a19695daccd2300827