Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 15:15
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3972 msedge.exe 3972 msedge.exe 2080 msedge.exe 2080 msedge.exe 4144 identity_helper.exe 4144 identity_helper.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2080 wrote to memory of 2456 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 2456 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3340 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3972 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3972 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1040 2080 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://d5r0i.staysmart.work/ka9y4jg/catherine.kruse/Y2F0aGVyaW5lLmtydXNlQGRtaWNvcnAuY29t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc4cf46f8,0x7ffbc4cf4708,0x7ffbc4cf47182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 /prefetch:22⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2316,4996135904756081769,12887884753195321326,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD516dc7223559beab600ed17505ac3a0c8
SHA16b8cf9af61aacb6774076363ff7582ea54924c34
SHA2566dd367d848b680f5cce90d560d9b508a2e0a0e5fd94966fc1e74ff2cc6c5cc88
SHA512db6ab846cd0305a4720efa3ade92b57e6232e00abd2d5f9b228a5519c6fcecbd9d66a24e0d934210d270ce84a37660593fb7d3c1cd652d7b0ed7aff0343dd10e
-
Filesize
425B
MD50ac9530699cf0d11eb569b6f9df4b103
SHA13dfd70c1c4fb3bc37b2cb52a18a2be978fb66e5d
SHA2564e0dfa872b6962d3ca1d36bb2035e02f51b04cba8239a4d7e1fe1d785d198fde
SHA5128d63171c319d8b6a024c548f304082976ab57a0c926f4b4e9bcc0ef3012e1a7ce6fc14d291543101c59ab561d2f4a97a775a0f1b3dbeed6a2af0a22ed42dc5f2
-
Filesize
6KB
MD5f0c8932a3ca5b00e9eb5c4aea6047a6c
SHA14bf0a107aafdc5067420500a26886085141e14b0
SHA256471ab63fe59718cd03822e1495e9c66e7efed9ed8906d931951a50c36c9c3a21
SHA5127379df3068ac52a0b63eb98a5970af2e6069c1e5244264a7fc11af94492d8113e7ae0919ba5191331af3583b8d025a3f078647657858c0c61db45bb8ea9ba514
-
Filesize
5KB
MD538b6da1078296c478787fb8719a6cc06
SHA1cb1536818da9b1c5cdeaee215f7ab143c74b7057
SHA2564370c8af04245f94260f232b445079db1b4ae139042da65e3d62f0c520ea78f8
SHA5123bd349dc9ff407df8dc50861596d6354fb30b87c3e1458f1746b0e24699a9814bcc51aaa56e3e1593c6d49cee97103332b340083d5771eb43478ede1cc79db8b
-
Filesize
6KB
MD5f578d10ce33e6524a92188670e10b6d8
SHA1bfb75bb8bdd4cfd91e8bb2a7a372b7afdb49ef82
SHA256b1b8707fb3a919d69c6695d1e2f80d0394ff5362db750fe9a60136cd0e060547
SHA5123c9848b4523bad41a5b167e073ae069cd4560be6eae4cdc459fd46a8fb0806817f75ce838a34184bd55564849d1b22639a2a50ddb8942a39e9798f17886b5916
-
Filesize
204B
MD5921c3921328cd112472676f33ec881bd
SHA13f6054dd1ef5edc5dd88f6ff7fdd2e18d833db4f
SHA256c1d8056688fb0ad84ee7afb9233a5c3a9d9f39b3e8feb57afa2f12b05ff21e52
SHA5125762cb3590d80388981a501a15bcffc82bb99c1551ad5cb0ecb2380734a76677b347acd1655c089d0f76c1b4235781505a2f22b8655405e9ffef7b06e89da347
-
Filesize
204B
MD51f3787389eb3ea5e134da31cb048d794
SHA153bba4406563ea4b8271ec57a8b6e22c7bb9da0e
SHA25635f9741a2eea842e0586367cd06b23887e57195a0aa704e6a30af65613a146f7
SHA512f0ef3cadfd0eb786d5c891bc5bded5cba30fcb77ad9b454a685449f8cf758f54d438346f043545872a3470706744e08c06338af0bbfebc3b92159796142c308d
-
Filesize
204B
MD55e16a3e00bdb5f7634d2456bd6bcaf7b
SHA199d08d2719e99d4433a4fbe8e19195dda4ac4a8e
SHA25638ef83a5cd8d3089054e2dc8f7d32f1b11b86ac70fbca97b4755c9cb624d3937
SHA5122718018a71905abbddb3abd1cd7bfad877582a187626d196fa050c0da163fa84cf77f9ce794ef9b6c5abf2a4f6d9dee8f72f107dec623a8d6587765d7fb5b716
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53f54426edb07b9047904b85f2b01b687
SHA1277220c6cfc6eb9fc4212be773df5f92bf838a83
SHA25663d4ab33726b5be79c35fbad61571a8430bc3a5b6c69adfa695413f6dc4e7fed
SHA512c8fec5941fa6f18e56dd950e9dce9eee62e6424d76e006571654f6e6ed0498b721b95664a647cc266398d0c973565ec717c1ddac746ed47fd41af10ac3fc5801
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e