Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
3f71370d5c8d576bdafcf201a590347d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f71370d5c8d576bdafcf201a590347d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f71370d5c8d576bdafcf201a590347d_JaffaCakes118.html
-
Size
17KB
-
MD5
3f71370d5c8d576bdafcf201a590347d
-
SHA1
7a8ad691020abf3c31ecef71791fa7827f9e57a9
-
SHA256
2ef523cece86c01f2bbfde6a2198f18a3fbe413f61f696dbd651ce54990bc484
-
SHA512
b927e295d06b7d5bc0ce4e88382dc0e34bc73b2590123dfeb113debfbc9c3e56e9154621c2a79bd4f890f368ab19d431f9a2c61dd222e42a7c3fbfc509cf312b
-
SSDEEP
192:1fzy1hA5jc+cjYVbrwx4p5E6OnVfg5wbWqyMXmAfuZJW3OezHg7k4PllmP3KTALd:1fKwcL6fbJOn65WF2FA3OQokQ2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 212 msedge.exe 212 msedge.exe 5048 msedge.exe 5048 msedge.exe 972 identity_helper.exe 972 identity_helper.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4392 5048 msedge.exe 83 PID 5048 wrote to memory of 4392 5048 msedge.exe 83 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 216 5048 msedge.exe 85 PID 5048 wrote to memory of 212 5048 msedge.exe 86 PID 5048 wrote to memory of 212 5048 msedge.exe 86 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87 PID 5048 wrote to memory of 3500 5048 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f71370d5c8d576bdafcf201a590347d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9a87346f8,0x7ff9a8734708,0x7ff9a87347182⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12583287023944782182,11993510361755959087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5464ee525579e1a321d108fd875a3da94
SHA1213fe1013b781aa11dcdbac6bf4adbfc7b08cfcb
SHA25684985f98bb682a01cfd0a49127c903f9bd6353f5520d7ef57fbc8eedf0f067e1
SHA51206bdcd67bb338b78c9277173428dc19a8472aad809705f1cca20645b05ab3deecfa50316e206065b5e804d747a99dcffad945c88e67bee613f9b9e25abcf1ca2
-
Filesize
2KB
MD52fd4563d065e5d3a2cc8dbe52ff24694
SHA1e73a0675147724d8779e055417426015f8b2036b
SHA2567e96eaecb4d2f432858781425afa47123c69b6bb434436190fd0788f65f39321
SHA512493d592a945fda8984cb5e9aa8c22e26cd6b44edbcbd87cef5ec9b75cfc2e425cc39d814a9bbaa2202c99c004cd63385b3406e9136c2b54d06341067b4dbb374
-
Filesize
6KB
MD5a068d4030464d0d36f08e38b5acb645b
SHA1a02e66a7d1eb71c77ba2abe47bb331dd088d4ac6
SHA256848a6d10ecb967d13336ba54333162e7fbb8773fa56c1886d9c621ae112ea6ea
SHA5120f869d6598e00759d1c98ba56aa7dab1318f01b85ec7a8da048899652934fae2748a18ff1a18da4717e40668fad9e4f3fcf83bb44db507318d5ab6148cbad9f4
-
Filesize
6KB
MD5c3c89aaf519acb9bf4d0395635743744
SHA1584040d0d914cbda93099f3fe92dc86da7daba14
SHA2569d622eebf4cf7785fa18220141c09d6227e604166b011a1414dd5371797e563a
SHA512d28f051539cc57107485bfd047810a01937a535dffa745c7ed0eb8cda3a38716c9fa473bdc4d3bea1de0938e8937beaee42addb3e0a8d76bb6acd0ce0f6e0f9f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD53691a7cd01c755a32efbd4bf4694599f
SHA1454d3c54bdba4d70993024e52455d49165deccb6
SHA256305074b1bdc25a41b92793fcf9bc6cbdd3e0216b7a251b5f811c3a7f648b1972
SHA512017d657c4500aae2fbfc835624f5e596191241c794d24ca938a616fbe465f5f6eb123b6e19b096615689248a773054756df82db854a144711e57b62c6aaf01d7