Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
d36c2d3863bd7bab996022650992da54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d36c2d3863bd7bab996022650992da54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d36c2d3863bd7bab996022650992da54_JaffaCakes118.html
-
Size
144KB
-
MD5
d36c2d3863bd7bab996022650992da54
-
SHA1
37c2b9d3f73a9c3b9d53cc3ffe6d9d182b96d86a
-
SHA256
262ac20400dc1171dfaea93fcc388b565236254c1efc945ca39c9c989c7d889a
-
SHA512
6ac9157713fa47c6427b7872284e040745ea3e2d158ec1c58f094dbd76ad595df27e96dd6681e4b5fede93d60761db780358cd776e8564df2c9b0a4d20975a46
-
SSDEEP
3072:QAopfCUdH+HiCtsYJibE01SfdZMPWeyVVuwKq5ZPBL4yZHrPrh:1op/QtsYJibE01SfUA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 544 msedge.exe 544 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 5044 544 msedge.exe 83 PID 544 wrote to memory of 5044 544 msedge.exe 83 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 1460 544 msedge.exe 84 PID 544 wrote to memory of 2816 544 msedge.exe 85 PID 544 wrote to memory of 2816 544 msedge.exe 85 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86 PID 544 wrote to memory of 1440 544 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d36c2d3863bd7bab996022650992da54_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa240646f8,0x7ffa24064708,0x7ffa240647182⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,81258632649464278,8726107188029525339,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5538ac5e54c108d49ce208aad6735dd4f
SHA156361fa32bbcef92fbed5c639b9e8adc75a00fb5
SHA256a495af053dac9ac72b6b19f2bc08a09fb78ab89e54cbe7bee9bcbc1a0782a74d
SHA5127def9245a7361b2621a8a590f4adb269e31a3bd1d95d720d8360cfde6106e1437c30bc386ce60743d1ec34664d316aa2ea73645b34a1cb9844e407c35dff6b5b
-
Filesize
2KB
MD567e3214a19353b7fefdbf2c764067e0d
SHA136673dd4def9bf110cbfe48870b0f8df586774b5
SHA256c21cd326e6b22883d5c12d24a56118cd596e8a93a1c1f95b71712082cfb5a594
SHA5122099a6719ad431965cfc7534cc7ee3df95d0b34a2579b9c3f1f1159b52024d8a090f86d09374db050cc045ee25823003cc1a0192ddaf0044679608468c3cfa8d
-
Filesize
1KB
MD587eb79d12c07b05a9c029538716bd727
SHA1ba529cb12765bfd359f4c06c71cbff14adc2e361
SHA25689d52c9d1da17b22ba5da43027b6f3097bcb531e488233424c62cb9610ffd165
SHA51275e00c294df718df723842522bce4fd0dc79801d4f98451c6206193c3f5efb2bf2351bcad8471d2f5befa27206145b85c4ae004857eda2d86d3333966fbf175c
-
Filesize
7KB
MD5eff44c2bb89b9a964a7e840dcc3039a7
SHA1af6a11ade69a2eda8d68449c737902216a7e3a3d
SHA256c3eed7e123bc1fdb4dee5878bad419ff6906c9553809564deb3ca8413bc77916
SHA5121eda299b4300155c20c71e7fc01309ed892d7fcc780b305d2979574f12fe2ef8372dd63ef9219e7a9b465c188845fcba0d1ff3f5d1cf8f51e5e4b8aceb71355a
-
Filesize
5KB
MD50fb7c4acccb513bfcef7ee6760a7af85
SHA12b27040d895d1153938d693285c9ae4b00171d35
SHA256c514f2f3f8c747978646ad7f8a7c1310b8f1d22a1107cf4c8905ef662fefe507
SHA512c44441350c0057f6a7356c44795de23de2c6dc5ee0ed4f1e00413f5d67599388f87bc42da6028d0ab86855ed017e31784476add39167f7b19afbae01bfaa872c
-
Filesize
7KB
MD5c553ef5cffcf5e76a626bcac51da83d4
SHA1b6b61094cfb6c3a6e3e4942eec59a27308ca6943
SHA25650885fa385652eaa810a1ca8b60387e5375ee7743dbd8c7bacca6d31e7a4130d
SHA51293647c53a9906640aa5c11fa0c0c9f932e92e738795b97f789939f1124a897f4dbb2b7be01470ea2b41c18563ea1069b9c5ba495cac511b47cd0b5ee9f11c066
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e164351f738406516079fa44dd161d15
SHA17a671808bf4e0c75d7aa3306ff16099e363ac250
SHA25658d34dd1d8876e08d39e9f68a9cb5995424abb400aee4b90eccc3cef23c7df5b
SHA512e16a0c13afb34c80d276c63c6f06a9b65ea7e7afa14d09e6535b4394e1df73e8eb1c47aca5ab98abf7af50b900f36b62eaa8abe00636e4b6100c794a8171f2f7