Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
694969daf652b962017289d626ae2bc6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
694969daf652b962017289d626ae2bc6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
694969daf652b962017289d626ae2bc6_JaffaCakes118.html
-
Size
250KB
-
MD5
694969daf652b962017289d626ae2bc6
-
SHA1
5953ee3c124073356c38836d948ef4ab6cb3e61f
-
SHA256
c0584275e01bad1e2e0a588171df10da326b8cb06f8151a6add4e9f9e6e1d203
-
SHA512
b6fef774ea3c07581b9d88d9279e26346647e1e31f4d71c5da6481eeb59b2c3ba6d818a8125d58dd3664cabfc2a3838674ea582e7c01126a7d05cf2158c0f596
-
SSDEEP
1536:SABHv7ynvCTS+jW6+DcDzPLHio2cZU312ZqxR222kDYUvASin9h0vAXKMtXhU:ZBHTGCTPj7ZS5YUvAtr0vAXKMtXhU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3940 msedge.exe 3940 msedge.exe 4056 msedge.exe 4056 msedge.exe 5040 identity_helper.exe 5040 identity_helper.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4056 wrote to memory of 1516 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 1516 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 5076 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 3940 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 3940 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe PID 4056 wrote to memory of 4644 4056 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\694969daf652b962017289d626ae2bc6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefd5946f8,0x7ffefd594708,0x7ffefd5947182⤵PID:1516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:5076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵PID:3988
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:4436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16797394220469036487,16511676931963607141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a9000e82f5edcf2a3c544deb2abf6da5
SHA159b3df79af16e4cddb209db5d9b2fc68c465f3b1
SHA256d8e3623008ad7674a6b555e2721d7ec7760e9d985ec56c5b56037b378d02e8b4
SHA512cd36349f5ddcc2e77249162d10f42ae05fc1ff7037dfb5908fffdc9985f81ff69b41abea9c5512afba900bd679b9a313a4ac3ba6bb71eeaf44f9ff62365e42e9
-
Filesize
851B
MD5c163376fa2b94bf250c92bff52cd08f9
SHA1385d3f5ffa864aa356e4d73ee804358e3699c4b0
SHA256ddd2ac2a548dc7556112f25464607f994f2ff01735fa58169498de3e242c549a
SHA512d08c6a7b5e5bfe0bd7884016fe3ee1520abd0eb7e76b4463c56275b27c680605cd0ae3dcbc72f3bd23b040d5dc65a14d4081e9be7b241f1aaaf9748e6b12d411
-
Filesize
6KB
MD5929aa5742a16d8681a30f3277f8eaaa2
SHA1a5feac34c9248a105808644eb88a166d1a036192
SHA256992a6998162120d0b5c7622803bae7dc31727458c04640f979a57f866a5777dc
SHA512b726d5d621b1dfc4a7b02072e6e73556926aebf7600bf063a2d1e55c9b42250eaa9d966cbfe2de2737c3f1ba0bdfd9447e07144600c2b07016dc3b568ca2ed77
-
Filesize
5KB
MD59de0193230c36bf8ea0ea06d7e2ccda1
SHA114d567e86c0d824ce6fa580e83cad45418b5cf25
SHA25636f3c0ccac68def376860197f15cb10d5d7159dfae1112abf548cb8ef0634e27
SHA512451324ebe21bb1de595f9ede73f1031a77e5494f119fcd6f4450a78db6df992c85818edebfd04ea53fdcb4daca4e55fa6e03963a114ac13cde1d6f7009ccf823
-
Filesize
6KB
MD5afa2399e4df0c92e2f2f1ba4db9635db
SHA19cc840a221d54c7ca0e7d9fe7b0da960595e2044
SHA2567bceb2563a0bc56024c988524b80219fd3eb317c9c87bfdcc4ba3fb605c69943
SHA5122e326fb921250576e20e6f98ce441922e045a992f49edf352ae829217d81cb005491423a8229f559b3557b37bb537c3ae5b99c6071279b0c90f8c79add223a7a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD535e7c2b95c5104228c1c5aca5089e8b7
SHA19dcadba952d03c51cdf90c942025906613eb2a32
SHA256c67ecbc72dbbca7aa552f8f2fa3632f2b3aae1d91aebf0ff684fb08f92d00bf3
SHA512e5bef23f35622562e3edde66ff2245d2267ea4fa72b26665da39dab7bfef6f7287543e54fe83a214ccd688dd676a50a82ef28e0c48034fdd3fd7ac21e618b33a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e