Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
0f91617775d35c610f1cd4d8a63627a2_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f91617775d35c610f1cd4d8a63627a2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0f91617775d35c610f1cd4d8a63627a2_JaffaCakes118.html
-
Size
17KB
-
MD5
0f91617775d35c610f1cd4d8a63627a2
-
SHA1
18a6f59ac60e64ff686aef498a4d05d70b29b9c6
-
SHA256
13e6475fe8ad759aa88b12d22417870fce0c6180f8cdc87cada2063892dd606c
-
SHA512
d2d79cb87152354de020817c4193b50aee2a8db7fa43382965af7aef4b559e1f6e7ed275ef5187a4a8bb9533040259330732bbd0b71bc53c19b6888709c6d1ed
-
SSDEEP
192:n7LPM9hd5jcT7T1LB4xa490TScy8lviLhOJvWR/sYL8mUNJUpEMBBpVbDM3s5TgW:7e5cTN14E49mSA8e0RgqPB53VvOcC2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 4884 msedge.exe 4884 msedge.exe 4520 identity_helper.exe 4520 identity_helper.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2188 4884 msedge.exe 81 PID 4884 wrote to memory of 2188 4884 msedge.exe 81 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 3632 4884 msedge.exe 82 PID 4884 wrote to memory of 1668 4884 msedge.exe 83 PID 4884 wrote to memory of 1668 4884 msedge.exe 83 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84 PID 4884 wrote to memory of 1788 4884 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f91617775d35c610f1cd4d8a63627a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9983855147262206256,7525338362598751632,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
204KB
MD5081c4aa5292d279891a28a6520fdc047
SHA1c3dbb6c15f3555487c7b327f4f62235ddb568b84
SHA25612cc87773068d1cd7105463287447561740be1cf4caefd563d0664da1f5f995f
SHA5129a78ec4c2709c9f1b7e12fd9105552b1b5a2b033507de0c876d9a55d31678e6b81cec20e01cf0a9e536b013cdb862816601a79ce0a2bb92cb860d267501c0b69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD511e84b6816285997101ddff11d81fd6a
SHA1f1c71dc89333db95dedac179463bb332c312fb49
SHA2569dc638f76d05ddf2f1e2f7c760dad3caf7009830748108b1fc044dd4aafb0612
SHA512686e88e373f0a05ae152e2912573d687875f0075222c6d31f968680ec57d58ff90180963ddd89630b57dd5e4b0d3569e50845a4ebd59fc63d276791fcae64e3c
-
Filesize
1KB
MD5f88a274c6263737e06f2ae3bd5258b7f
SHA1db4ce124cd541634fe0d638eb11161eee7da4947
SHA256188b471056d6c07be6e78ff91e49ee7f35cad3d35710518317313004e6515500
SHA5123113e31d9507a080470d9eadb71e3078ef4cdb0ef088007a2e8013d141e760b8f4347ee59fba19e5b90b96ceeca9696114e8bb79cfe5d8a75c11ae135c759658
-
Filesize
5KB
MD50e893b05c75406c0694a7e06fdbf5152
SHA13a1357a94d6be0379f1632c860324c9ee1312ced
SHA25651e378f8bd5e26dca490961dea31420c0539e47e0e17e89834aeeddbc9c9a100
SHA51284706d7d67baf4e0a46bcb04872cecbac6c22bad758b4daec3fd0e0d595ec4a1ffa7fa37da491209a548c3194b6a40086dfbb0ba9b0d3759b2e0e29f842b6f6c
-
Filesize
6KB
MD54da009604f3e87036bb74d9964ab5b51
SHA1bd47def88e05ab27a9c97d9778dc3d3afb7fa6ab
SHA256e5c62d9367ae359b792e650724df938655588c1657e0e06eb4cead7c1d161b41
SHA5128359008452845a8f21070a098036371629f8b631b00ec48e735b11dd93581aa42412e9e4f91e110fbed8f512e3a1968e5dd42ea1d1537b1281877e2d90e63c30
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5901dcd1b1d41156fe2086d0f6cc85b17
SHA1d2eb1c62c06416110eccdee0760ab841ff889dc1
SHA2569f713da91bf3508c6f74266a4c682fc5bdfb4466d3020651d055feedc93bd5cf
SHA512784f2785a31be9fd32d665098ea7d3e55b60a06410cad7847f5dba3c99114da62a2a8ff95926fe9126677a247e9b780e55372a419b103252edd5797f0afa54c1