Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
68b8f5cd570afa4fe6406213e1b5440a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68b8f5cd570afa4fe6406213e1b5440a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b8f5cd570afa4fe6406213e1b5440a_JaffaCakes118.html
-
Size
79KB
-
MD5
68b8f5cd570afa4fe6406213e1b5440a
-
SHA1
8cafc3cf88a043336003cc016a0a4e7899489798
-
SHA256
c8802486e950bff9682580b0230fa16b9e79314c01fc4072043aa71ea065b9b5
-
SHA512
15425b5695f342387500cb03b37424045f0ec7b234c739db3376fe71bf001a8894e7f5e57e1b1453fdf4a9d50f69d4390766a4722fbdb53b2415c04213f510a5
-
SSDEEP
1536:4GwZdHJhUCkZkP47MFi4o/LzCtWecjDIZIWdMRxrbtv6OgLCW:49dNc6ZcjJUoZbsOgLCW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3572 msedge.exe 3572 msedge.exe 1420 msedge.exe 1420 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1420 wrote to memory of 3740 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3740 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 2220 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3572 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3572 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3344 1420 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68b8f5cd570afa4fe6406213e1b5440a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7e4646f8,0x7ffe7e464708,0x7ffe7e4647182⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,466902518375207938,13431269864676524115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD58b39388f58cb55a63cff67f7aabbfcb4
SHA1855d39bef770c4adb47daa8752a400abda5eb122
SHA256da551460c3ab7c52c5dd4da986e74eb19f82dbcc0a53bb4f6d29f01cff96758f
SHA512ac2b38c357d3a87926d76ff3892c1dac449357358c5ddd401acb99ca9ea0fca65632d2054e859ee53d324266a6512cb441acc3bfcee803adbb3bf478810aa5bc
-
Filesize
1KB
MD524467b69e9c3db925e6fa8be15239a2e
SHA1b6b33f2c50c073cec78e5679fc918524143e9d3f
SHA256b3dbaaae9a9887e042116a7b790d8c098ce611d75f3348564eb921330125e372
SHA512cf7a019af747d06c8a0dd88af22e8febf9e6bef862fddb5f415ae4877e0b0de14be564f83cafef6595d7ee0ba33c67978f803cd6b13e298c735f64d0e3ccadcb
-
Filesize
5KB
MD5afbb07601d107e8773ad6f92223ced0e
SHA127f12c63051397a46a04c069d6ad167e9da7f5a1
SHA2565e2a73f3af5410e25ff5e3734b2237ec344b3b1578a97aa52d5f24cbc031fff2
SHA5124ff7d8e6cb8deea7a84930e0188091f0f1ada8f772a3efd556dcbba928029105d903ed209820d1358fae0248cba8473d5edcca6ab10cde3d33ddeacaec7e95f4
-
Filesize
6KB
MD5123e934b7a919832fd8f85ea5999dcd8
SHA1eb5ec78996317959972061a04bc54c808e4fea1c
SHA256c7d59c14dc87034ce1c626215b71eb31cb436af8857d66244911cc81e50735f9
SHA512e99fff026b716f3bf355fb2e7f92d926ce9cc8bf7c8b78a517912fa3143ac51bfd06d252bd500614099eca32dfb34712e053dadb52fcfee2d4dd4653876a5f1d
-
Filesize
7KB
MD5fdcd5fd37de5ce45e9710992701b5f53
SHA1842baf1fb94402772030673592886eaed6d71746
SHA256f67b16950674014fe1705522f7a29e2c9b5f87d9453d7018476bfec11fa37229
SHA5123b0b3aa099ebee46233254a99ffbb2819f00991553a3c993c1d8d75aa983e59ef891aff2d53557f6fbd754a5ecac0e404b229988e8979e0aa18f6db3f49d18da
-
Filesize
7KB
MD55f63a88f3f7de09e49028cebcd354f54
SHA1dc65aae96498f0d25e1ffe0b83d94f0d03be783d
SHA25605b10dd08f767949f3686599b7291ebe24033ccf6e09119ff5f428330df0b3fc
SHA5127be8b887d770ec808487ac7bb9b71217a2e84b7fcd7ad09bd1fe89b167888e087c6c89e95f46ad87e3914d32cb734e4dd2ab8f77599ed9780d3f991046d8f63f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a553b32e97afe26e901280137bcfd6fb
SHA188adf8cb5c2ef2ff597a5d1db0f4fb94b988c52f
SHA25653d9367732836e28ce9527fe10d60cb070c674be9a38e8cc8e65fa86e57d8b65
SHA512e651ed527e38ca0ab8db4abf481173d89b491c365c778b32cf36697edcb9f5197dbf001b4dfd0556de1fa8c6f2b1df84669520211ba87ccb2762c53306dff9c2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e