Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
a7496994776ce4cd68503ce8791fd436_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a7496994776ce4cd68503ce8791fd436_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a7496994776ce4cd68503ce8791fd436_JaffaCakes118.html
-
Size
140KB
-
MD5
a7496994776ce4cd68503ce8791fd436
-
SHA1
0fb2d86ea1f02406d64e292f96d3607f830460b3
-
SHA256
e0899f2f6b5ca520c72b5714c2507c5ceae61be3a3d060e76cfe9434696570ae
-
SHA512
9b9c95591ba2792849b3d5f47265bd413966a18898e0299309b585974fe319678d2ecbe9ea28e2ef2a9a8037bb76b204c768f037fecf7009c44739c0e8f88097
-
SSDEEP
3072:jbSS3zKUP13G4k5QhLpOatVSVGp+NTljcV22wOoS/0Ib+b+FmKgMx3uf9zShtJCb:je23G4k5QhL8atVoGpam22wOoS/0Ib+l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 1572 msedge.exe 1572 msedge.exe 4708 identity_helper.exe 4708 identity_helper.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1536 1572 msedge.exe 82 PID 1572 wrote to memory of 1536 1572 msedge.exe 82 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 1764 1572 msedge.exe 83 PID 1572 wrote to memory of 2304 1572 msedge.exe 84 PID 1572 wrote to memory of 2304 1572 msedge.exe 84 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85 PID 1572 wrote to memory of 548 1572 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a7496994776ce4cd68503ce8791fd436_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb027646f8,0x7ffb02764708,0x7ffb027647182⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1614352005960656152,2100693505114598344,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD59f30c099ac1ec62c9e14b304905745e2
SHA1e774bce78c44418018c6da7db58ba8fdac6099d4
SHA25635cd0f599035ff674be47077747b6865e12226ebc5a78ce5aee3b40527af62d8
SHA5128b6ae2d05e228acb042a78a770824cbe7f214174f6ecebb8de539b13bf29142561aa6894330f1525ecc1352c576ea0346395466cd776b93070cce77ea7436cba
-
Filesize
2KB
MD57262aef2946e0d45dc08896a631a5681
SHA113364c113c143c1e43c07a32c2d3d9f82eca56a1
SHA256d25080d0b019174d353a21a4b80c97a118924eea11bf627b6e47ec90e98d769c
SHA512ba1727e2cf48bf1ab96ee5b41924671a6b313a157f6a6ae6a5ba3b171e907ad0b3bb37207f1256a79f8c0463bcf29535c7db0c54cfb4d2930dc90def41b9b819
-
Filesize
1KB
MD5782d8bb871ce9132c326141a9ea1367f
SHA131020d0f9d47fb0dde1e1514939aa7ac8b7800bb
SHA256c0ab895f4a8a45ba7c801d2ed6e8e609892164423ec0ad0d15b2c427fe7558a6
SHA5120e67bde41a214ff68ebfbe219e8c76ec191c98dbd1a8918e113d2cb4294d6f9c1c6333a9c0bcd404293f6cae5ec65ebd4558545d45d19cda49f748d390a8abe5
-
Filesize
6KB
MD5a7a19b789095893d25e1491b6be12bd5
SHA1cf1b7695dc70d8762d6b1dd02afe673f343ca90b
SHA25692c713a23afc6650962a4c2645f6bc80cd2c92efa76772d2eb644721b86a8102
SHA51239c758607c7644936c3fa56787193760be398fab67a04c7f1f04a5d3520d8ab440cab8c443bff09c5aea9f2ae1a8adbc851e4dc79b7a6086e110582c9ad93fb0
-
Filesize
7KB
MD5778b7bb6497f161e5032dbbc376fa78e
SHA15114dcf5784672f285643447c52f9d1ef7727029
SHA256b9eaf9b486f649704136653f2f46a1ee3d7b975282ec7d418167b03cf9ca66ce
SHA512794f7515c28940296370c9bf0726a41f6e949210aa94c7ba8ffffc62ed481c398a62e7c0875a22d5839ca4bc96e0cfec16ddccda3bd14623c861496721519e8b
-
Filesize
6KB
MD5d1f607ba5a778ee212b769057a32a644
SHA1d295e6a2eb023e19f727e6f2af467dd8a771338d
SHA256be1b5af459c9f60ebd8f0f3bf24cf4c3068e7c016352e94c144baae6c5e6f7ef
SHA512a100307a5a59bef4ee92c794e416ca0f16185b7784937b50e4a567d4e35251f04d7dbab6dc15f3d2f719e74357d207ed6384737a02b7fab8738b587d626a7193
-
Filesize
538B
MD5aebb783f30c6970bf99df986908a80e6
SHA1df4ca1bce30d717992d99bf9a5780d8b021bf6d1
SHA25611cc8d3f27bb3ac9ab5e0771b2676394061de87ecd8c1f2fe9d87ee0eb58cbdb
SHA5124f61aca2ce84d1c950bdc6578ca9ae8dcfd04c4a514178ea5f5f5f933bd48b9af35d75faa7e7f58036ee001c0337acd28d247121cf126261468a1f17b0a76b6e
-
Filesize
371B
MD5489e64d16d50784cb584adf4d32dc233
SHA11b682daf46d7f36017243c9d08ff08c2143ef9d3
SHA2568851bef49b967a508548af55769778f8de1abe223039e33bbafb3b8d27939a45
SHA512f8798e1daab7b1fc5c57c7d781503c44733ac48b04ae06cb4a443ed9f831f1a37c3ca7e627cdc89856586fe73e1461fc599e71c1197048abef9f7dc6299e3a5e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aea0e7762a7a6ad2c04d7ba7feb7ccea
SHA156f6f0cb2b5a626ce75ada471d1ff249838e47fd
SHA256d3cd0da7c14972e8d6c9ca2b9c5d04e46bcdd61243cee6e24886da955eae3e2b
SHA512b5a73259fef7a71b198617ec1b84c435687bd886816e3c81a63f17e381f71d998bd60aa3a584a86c13e0541a5fd53bb68520e0b90182a1d4c198aab122844660