Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
216d0c47283e17adffdecdc35a7b38ea_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
216d0c47283e17adffdecdc35a7b38ea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
216d0c47283e17adffdecdc35a7b38ea_JaffaCakes118.html
-
Size
175KB
-
MD5
216d0c47283e17adffdecdc35a7b38ea
-
SHA1
6686ffb855707378f1b6090db27fcf5ec1908239
-
SHA256
1b75ec24e9b46c3ccdc69856da66ec6640df90433b1f63f7ee480fa0b15d0c98
-
SHA512
dea2f3ada59e313190290df5a5ba12586423e4ba61f3f21cd2a7a4277efbad2d0a8b4ca3aa0fe06948f730be79f94dd9a79e78465e6ab412189800f8a9959a61
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3pGNkFfYfBCJiZT+aeTH+WK/Lf1/hpnVSV:S9CT3p/F+BCJiGB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4728 msedge.exe 4728 msedge.exe 1628 identity_helper.exe 1628 identity_helper.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1644 4728 msedge.exe 82 PID 4728 wrote to memory of 1644 4728 msedge.exe 82 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 1696 4728 msedge.exe 83 PID 4728 wrote to memory of 4144 4728 msedge.exe 84 PID 4728 wrote to memory of 4144 4728 msedge.exe 84 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85 PID 4728 wrote to memory of 1632 4728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\216d0c47283e17adffdecdc35a7b38ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17929375878093485114,15040562370423838184,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\97f3d4bd-fc00-437c-88d1-36ea2bf244bf.tmp
Filesize6KB
MD525745d8fc4d9e3b798fa4c14c831a807
SHA1d1d38857a73fe325e6b6c9cfbda7bb98938f6c93
SHA256b33e0fa4cf6791107f39041766c97eb7175f3f79bb27ec83ca637ad14c89784b
SHA51246535b77a8379a11c60aa8c003844a5c23452fa4b97b6c3851756fd6dc78f26809c9589b4982ef1391be7c61fe518d23cd41bdc696c3bf175de824860b7e890c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5d0b41a7446e8d2245df7b13601008965
SHA1cfa7cb507cec5fa59c49b714833449d2cd23d183
SHA25604eec2c5fffb28d282de622765e1180aa0e0ff8404495a61523d8d365a0132fc
SHA512a8aa06917f1d8ceffab8dd7aa5755ed25882e6eda19b5f594febc277b43474c767621b2c66335983c6f92f1a71238d962de6d75321241cb8b67a480d9a7758fc
-
Filesize
2KB
MD5f10ca5e574d4d0cda27d20d8cc7cfeac
SHA13edc8415929569bf2f12d1003e922ebfef7bc295
SHA2569d07381e78ffbeef7fea08562a31711b13d0578db19aa48420973da8d30cebe9
SHA5128b90142cc08973875711def6344cd118ed2db7ddf3cec4d9886406c04a78cedc3a61df01a0000b83dc9f1dba63e232d1177361720866b1cab6c290e7c278d13e
-
Filesize
2KB
MD52c1bbac879ef672a6abd33c5b31eed0e
SHA1f88370b24e0f8e7f979e49ea591ece3b7a87300b
SHA256b8de1c34859df4e2af97e05b34e641fd2bef1d68f2f2c1757c8b22fae9a63401
SHA512af818940ebae99518eac0914f8c13eb884a689ddcf31f93d3f11b53fb61b2bb133828d674ebb7d6042da447b1bb7ac54cf29d588f13cbb73bc0f54722ff39fe0
-
Filesize
7KB
MD539d28dfbfc98e6edc085da90d5d6bcb6
SHA1133c527df693590d6c2f4ff8b653f77ef4c575ef
SHA256cf4d36de68849cebb804c5e08191eaf095fc82f526012806eb26ab487e1343e9
SHA5121f89045fe28e39a0432cca029119af603bc2db34ad2a7034a5c0cc4e6a955724c0a3bfc3473b4ccf28839c653331937e4e9031d38e0f57ec5f12d914285598f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f814d19d983d8eeaa2d28243c1b0429
SHA113a5633a96e7d3081318fd88ac9ff2aca1081b5a
SHA25651678d7209f9c81e0f60d141aef98aae9f4e57c5fc558409d3d22c490f65c1cc
SHA512d71816d8ca4a923642a8bdbb60a1fed1e7f5e0ee56901e000c26298c60a113808ab6d28d079883a6f36e5de38762c6760372b71c02c68dd2a5eb68d583e6b3f1