Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
a47d51f2308ca07bd6309351066859b6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a47d51f2308ca07bd6309351066859b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a47d51f2308ca07bd6309351066859b6_JaffaCakes118.html
-
Size
19KB
-
MD5
a47d51f2308ca07bd6309351066859b6
-
SHA1
8cf5aeb699ee8cf043b74818501d092cb5e174de
-
SHA256
70fda20c9f4d10bd3a45d210b21ca5a21e4cea18acc2386325e49644c1cbe87b
-
SHA512
f107e3a3a2f54e894f51b443e5ec52e2f316fe130c9cad5aa68c8f4c8f0e23df465b2b33e1c52b67338c9ea38ef1a3794f8b17a08a851eb58f2fef661a7baa13
-
SSDEEP
384:tJKiTZjJik3cUTnqCCiDBKeSLYVksxkkTjE0KQ/Nng4GKt5BxPnN+91WRvAcYMiZ:2ieScUTn8VN0r0gTn2WRIXMi/PPdTcKf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 1832 msedge.exe 1832 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 3912 1832 msedge.exe 84 PID 1832 wrote to memory of 3912 1832 msedge.exe 84 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2012 1832 msedge.exe 85 PID 1832 wrote to memory of 2680 1832 msedge.exe 86 PID 1832 wrote to memory of 2680 1832 msedge.exe 86 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87 PID 1832 wrote to memory of 5016 1832 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a47d51f2308ca07bd6309351066859b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd790346f8,0x7ffd79034708,0x7ffd790347182⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4518049164926944265,14975508716888011693,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD580896491c8204e161feac55225884baf
SHA1dd253e8eb83a4d6234b798d52436a307bb80acce
SHA256d1b7eff755ddcb78d44c636eb120d59c7dd7770a64040167123e9d19194e7c08
SHA5120e1d616da595e2266d17d30613e74d51f15d68ee635c8b707a28f06bf036fa13457f17dbf09a36e2231d19e179fd8419e5baea849592a873f66cd2b64da52dfb
-
Filesize
1KB
MD51410ad9bbdedf74eabc65c722e0c1813
SHA183884dd6c3ed624b883a07f2c98c94d50965af6b
SHA256c9f914dfc270dae8e1e461a8517b4f11376e32abc7a142a8c2444e516eed2088
SHA512d71fa8108301b68bcf7b93dd259c0587a3cb0b950cb9a3473ea37458b6406db9a776f74de191e919eeeee903227af5423c3075bd12431f0678ad58d1ae924f77
-
Filesize
1KB
MD5729e18c085ace58eed905604dca03a0c
SHA1a843c54efb5f489be26419ac409b3ab1968385e9
SHA2560af85b6c18a5d80baef5726dcbbf2066c90a899aa8ac93157d6d300c3d0aaa75
SHA512f32674f19b100d6ef929a0a3753f442d11c15ac2963facf42bcd918049259253124406ae23c89b65e9cc07ce254e4476e5a20629f996c8fba5dc55988709b510
-
Filesize
5KB
MD5952532926feb3603408dce3e5badb7cb
SHA114db3ae957654f4ea9ef5f7787eb3148c3947df0
SHA2561705bd3d0faf56ebbf90981ee8347bc550937ec3b4e79839534a655df49475af
SHA5127e4c4b2a3ff6dab894303cf218da8b0ef3fdd7cb166144c89491dea940df9cd24b80db8997c18ab62af88b393ce4c6095254a5baa52c77f11b63a5562a3b23d7
-
Filesize
7KB
MD58ff4e72e312d252d2a81f1f6572212e0
SHA11572e0ffe7f39d72df124590529e4e7d76c87a28
SHA2568e6ac28bb2137f7ba5f06671a846be1f4054ca44a839f1f2fccdad2ee72c1bff
SHA512e8047b6d36a3bb7b6f122750c80d2cb24aeb30a1042302ada6a8cac76ba2a4de218722730f40ab7ac9cde5205ad3d0ef6fe8159782efee2fac4106911865e898
-
Filesize
6KB
MD5202e2b71d63516ba11e86ed6e00f10d1
SHA1251e7febb40b44fad6f0ccbe367edde95041c534
SHA25612c0c72daef6349be995bcceaa853a29b4c6798c7f9dcc3cd1241b4dad7189d5
SHA5123121ab7ae1eca040ac887f2b72cc12acbaab9dd457aaccdb1e2fdd3fb8e32c4ee401f2b2cee85e7023a5697fa9e3b639530c44e5ca268fb8ca50dc5c7640d900
-
Filesize
707B
MD5504bc680ad41b0474d7e2aff82fd7c01
SHA168204fef08fe6910c99c14bec630b20ca62b69c8
SHA2567e8e85de39eb0b7fae9878a5ec4f81e890df1e2150b12d294c18b68cefcc8639
SHA512453591de4ef077faf0717d41385bacd3e2e4e9d0854ef0082b961568afadf58511a9f728789d979b0782a731936ab77ee4dd8c37bbe758ea2b3eaf147deaacd9
-
Filesize
539B
MD577ec54d27d44440d0afc3381ff9ef377
SHA11fac38c1ddab73fbfc16cab81a91cfe49c5ac931
SHA25652f7ee716a1ac2341b2d0e51fedc8152908b90d53fe60be5292b98dd4ec1c496
SHA5128f8c8d9ad08afbe6eed16b31446efa15007881ca8af422b79470974c0808b01b46ca413ebe534a0de5a904b7532870399c9151d3c87a38e623e0d0843e6c47b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55135f53a496bcd8c406eb3f8478a3e2c
SHA1fef375b680b7ea0eeb80b559344b7ec9822babc7
SHA256da4d2f04e3ad318013eb2267bf6a2dbe61958fe21fe4437b63c039d506a7690c
SHA512d1f0677dd45c0668e2ded82c1314f6bc7da0f0e4331b06004dcc7328ab7b12e747a225d5e4d71f14839dd9dd20fa0eb8babc8d01036945913282b1be62afd791