Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
42745b824fd4a42f8558bf9736bbabf2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
42745b824fd4a42f8558bf9736bbabf2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42745b824fd4a42f8558bf9736bbabf2_JaffaCakes118.html
-
Size
175KB
-
MD5
42745b824fd4a42f8558bf9736bbabf2
-
SHA1
3da3216388a911ffc4733135a786de720389afa6
-
SHA256
9a2b9101fb97ffbf43def0e749bcd9ec3b27f5571a11859b9f02b068f946591c
-
SHA512
993c1ebf8af00418ae35f8ad24f3b5286c348c85603b3e1f09ee8c845bc613f7b5a3a70a80c88fadf4b2b635aebdab63827a3d13bd71859f1a8f5304c66de375
-
SSDEEP
1536:Sqt58hd8Wu8pI8Cd8hd8dQg0H//3oS3NGNkFRYfBCJis8+aeTH+WK/Lf1/hmnVSV:SOoT3N/FkBCJi2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4924 msedge.exe 4924 msedge.exe 4900 identity_helper.exe 4900 identity_helper.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 572 4924 msedge.exe 85 PID 4924 wrote to memory of 572 4924 msedge.exe 85 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 1648 4924 msedge.exe 86 PID 4924 wrote to memory of 4544 4924 msedge.exe 87 PID 4924 wrote to memory of 4544 4924 msedge.exe 87 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88 PID 4924 wrote to memory of 2724 4924 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42745b824fd4a42f8558bf9736bbabf2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3719711700510397108,14639687154250354756,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9d14364e-5505-4af8-9ec3-e71499e1b98a.tmp
Filesize2KB
MD57cc2f31dc0a7c0e5deb8ff473c298604
SHA101b56c3fb3dd6b7d6c3d80dd836fec89e7161fc0
SHA256febf3810dc21d956d13948530c9c4665942b147e06140768ab248499c5279b10
SHA512b17636e284c7d408eb72a32fc5d57df020daf9cf320c0a73c033a8cb511866cac2758f6c7c42cf15d8338a60560e3d9cb5e452125c9525eb6f14fcc150ceb284
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5a137090f769e871f82440e8c272a16be
SHA164b8a08a6fb8c818fd58ead4b3dbbd06c8dd5f15
SHA2563c206a8a69ff9864272b0be9fbec72f08d0f12094d30ef3d13c0e04666af0653
SHA5123a074f6eef6a3dabe076b2f4de62ce1648b253d405cb93a529483c45ffc58aa2e677ddc7881dac71c7904f8b577bbbfc3fbd9e6fdcf121bcc10c85f34a33ce32
-
Filesize
2KB
MD5d5e6ce882bbd6f5d7ce130b5952def17
SHA147242ec790b492877a97e4b8b6e8479f2e4f8ee0
SHA256dcdc67708066c56d498a361b0905258607e8a1dff21fa95da52b9d742bc78ecd
SHA51264bacc4c80a1a2dbd6003a8be8bc1b5f69ec1586b8f0c8d2b43bccd2b8f8d0273572b70e82ae5c60abcb0ff804f5b698d4df62bb56698f2c38880baed59926a6
-
Filesize
6KB
MD54311f41eb19a438a2b962202c5f8d369
SHA13148678cfeb5eccd07b3f15e52417509283b906f
SHA25643cbb0af7f470ba443bf8758a5778341e4e38a7a499060b0caafbb5aeff0f12c
SHA5129a6869aa7b6204e99eee101a73e9552c32a7571a460bc5038b498692d6f1777033d56ebe238ae7be36dfad273dc423b8de83897105e43660d0737e0b7dbd7927
-
Filesize
7KB
MD591508b42bcc9e73c32cd0e2288fa6c73
SHA199e0e3a8917852794737fef055358d9153da96a7
SHA256aeb9c5e4e165e8f14558ac5926ed7862249c38a154dd01b1f873611ce8ce6a57
SHA5122c42d429b2f165ba7476363254c8a049ae37d20ed0b67ba6dae8d6d093e1bddd0e1260b7850389bbdfcd7af8c3043bbf87d232798851015b5bf6a85f73c585ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5187ec794ee696441298ca96cd01e7898
SHA12e15d49bd0377c95df571fb642ac3358d22280a1
SHA256aa74239b999f5a85297b13ea0cf2f5f790c5712af14e539b574feccc1ac993e7
SHA512122059c50b94d58ee272b00c1bf18867653ea4e20f3cb3756397b452063c7c51646defbef694b5b8dcae090f04605e2082c2daf918e8ba1f30bb47c8d68428df