Analysis
-
max time kernel
1784s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 14:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ify.ac/1Ic5
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
https://ify.ac/1Ic5
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://ify.ac/1Ic5
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
https://ify.ac/1Ic5
Resource
win11-20240709-en
General
-
Target
https://ify.ac/1Ic5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 4964 msedge.exe 4964 msedge.exe 2464 identity_helper.exe 2464 identity_helper.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4264 4964 msedge.exe 83 PID 4964 wrote to memory of 4264 4964 msedge.exe 83 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 4012 4964 msedge.exe 84 PID 4964 wrote to memory of 3452 4964 msedge.exe 85 PID 4964 wrote to memory of 3452 4964 msedge.exe 85 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86 PID 4964 wrote to memory of 5108 4964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ify.ac/1Ic51⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba5c46f8,0x7ffdba5c4708,0x7ffdba5c47182⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5397979004249575114,5121741396974132481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5bfbcb89663f9789ccaa8d11bab4e4de2
SHA1ea816582526cfeda2ce841b0008f0ebab3fefeb4
SHA25677203932f34f6217bffc072769d35a814451e0215b819de5addbd05ec8fc4868
SHA5124f559cffe1e8f725c0eb2b995769664b21d7906be222efd3400c8a8d417fa1d1b2df9a9f1611a50798ad87f871eb2926bec4dac0016307ba4645b7dbfaf3ec0c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
998B
MD5b2f92b68573b7f4fa985a6dbbb1599b5
SHA122c51dedd188dc0e7c974aee8205f61dcb509cff
SHA2568c6a6f7017db27e86f979182c757193b18f532fed68c32ab3d709bbc8798a03b
SHA51271dbda2704aee6cd7d94303b0057a268c7ed428b93f61f95c1ae84b9ee76368032a402466fe06e051c6e925d8d024eb2234c7664d94711fd834fd7be2909d3c6
-
Filesize
6KB
MD5d2fc9e6e3082202d2cfe6488b145bbb2
SHA12820d7595bc840ea48461f01a2c50d864c67369a
SHA25627de7684da424e2ce91a24c247dae34c6afbb028320d6c10e2567f01e28875eb
SHA512f071b974763b47bbf55bfd2e5008799cc957c38709d92bb942bac48c9784d32339459296a88428d22fba17579d84979adf9f3aea016b6a3b9cbfd8a62395cb03
-
Filesize
7KB
MD5525690a69c2c0d4d05c85a69f4ea0afc
SHA1677816ad28d6e209ffed07447225a47726f067f3
SHA2566d9ba59ff8f42f647f7eb7f24157dcaca565b80d187e151aa2cc730ce721e590
SHA512a4b929295a294c86c8c06455abdb0cc1359c7f2e8af61a4eb4d7fcff82fb405e76437f0a5f510600a8888d38d8364ae447f0ed08acb0f6d1b915eceb4088e85c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5bfedde61e4818e979211b4a7e1fdd356
SHA1636193b20858003b160cbf4c76f7fc7e1d95bb92
SHA2568533aaa166fb5f9cc38ccc445a70218971d7dda59ff0057113ec8484974ef035
SHA5129b9cba4ac1c0c15328a98e5d9f17fa2b4705dd466f8f9f95d0445e18737d5296097c77b15560e2b0d808a7031c478038043326d0f08e598402698c1503f34b5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e0fa.TMP
Filesize48B
MD57dc4508d94a4a6b3502e52cd71b3b1fb
SHA15aa0f85f9ded6099f1991f02c7ef75581fe905dd
SHA256a2a0c7b8b258b0f6614a677c504cbb46d6f8057c1b731580a5e0341e36811e27
SHA5120a9b9031f8372ed60d8d9cb1345f95ebad2f00d708b48e99c50f95e5bd0518494ffc099efd2a8fcb38b2b4bb5e084eb8c79629992665549e1296ae302ab97673
-
Filesize
540B
MD53a46afd96ebdd6e552802fe80e6d9956
SHA1d4c7e81fc60be47e7a12034a6531fa6a232fb026
SHA2566b4181557dd6e9988eb0f1d059dcc467850d204e97f8e600e0869e580fb5d561
SHA512cfc556f1367d134f338e0b1b772d2d02ad37a7204dad5e283023af47344f994187acc93cd93fc5b222d5c2536eef92f12ecb7bef31e3381cab6a4e309bc18e79
-
Filesize
540B
MD51997942bb74649fc1696d66220886b91
SHA1f6e986a0757fa4ddd1f3f8ad2e16d9cca55f95df
SHA256a0f9b7eb4f5b5b9ec60824581a758dfbf76313b13c23e9356136e876e0369ca3
SHA51232d1bd5c0a5f2104d3c7b00a6ac533af57dd408ae38e9f14c9ed262390ac55eec886acf143190272a9dda9ec170cf0b49def0459aad1c45b3a6500035f4c6545
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD59a36e08246976bca651db31c261f28b4
SHA11eb7d95458843f63d8411da287b31f841fb3c66b
SHA25667aa22ff91f06d31b8753a364dc06ba4af3003daea6508e3877392550bca30ec
SHA51258df57e33989ec145080ef555e0df9887bff70f0ca125988c88718ec3f6333d9cceb116b3db9a3fc708d70c18ce1c09089f5d2fd58aa5e3b8cb4029c4b47aa3d
-
Filesize
11KB
MD511f06bac3dfa7e9c37c6e7cdd6732ef4
SHA156f35f3a5b510295e8e9909a5efed8d1846eefc5
SHA25650461ac6a10e1f5c540dc8d8aa658b5c0d84a6fc0266c5ac8fec98d62417dda0
SHA512e567aea948a7339e1f8cedc09b12b0aee9abab42130930d9fd031884aab4036083fb0c44647e0560bcae0a6b29947084ea8e24dddfff0785685fcb54a9471b94