Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
dd149b71c9369652bef3c87342c5d6eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd149b71c9369652bef3c87342c5d6eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd149b71c9369652bef3c87342c5d6eb_JaffaCakes118.html
-
Size
109KB
-
MD5
dd149b71c9369652bef3c87342c5d6eb
-
SHA1
b4278f643555fb45f9acb111f4178ea9ff738eca
-
SHA256
a2d01aee122bec258b6d9b495586516d34aa06690a7e20d833db8fd56c77caa7
-
SHA512
48267f142cfdd4502f2b04d698729789c58e431713202dbc15672f983be6f2b66e18a7f242cebca5e13cb9e7ae76007c7eb2d6fd166c6adf929048e9399ffa46
-
SSDEEP
3072:11yZz1WQ3iGH0cWsY2FG9lE/sMsMmBdyvNHQ7oad:KmcC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4132 msedge.exe 4132 msedge.exe 4296 identity_helper.exe 4296 identity_helper.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 1648 4132 msedge.exe 83 PID 4132 wrote to memory of 1648 4132 msedge.exe 83 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 1088 4132 msedge.exe 84 PID 4132 wrote to memory of 4044 4132 msedge.exe 85 PID 4132 wrote to memory of 4044 4132 msedge.exe 85 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86 PID 4132 wrote to memory of 2528 4132 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd149b71c9369652bef3c87342c5d6eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f57d46f8,0x7ff9f57d4708,0x7ff9f57d47182⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18066200931878011183,10860516540604529606,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5548 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD598983773aecb0ea6904fd35e9c2137fa
SHA14baf434c09e9e55269aff4c190dc6ccde27f03a8
SHA2567cdd19f4bf407a4431dfb24b30b8ab7fc7778d5edc75e8a4814bf91adc592686
SHA5122e4de66b9ab337e2c16c209d145d455e97e9d0ba57cc7ed71871b3a01c5897ea774ad4709b507d331af6854884b346870946a274d1f903161761f4a64953ed52
-
Filesize
1KB
MD572f01e63487b8d313e1308537e79e576
SHA173f764f4a2d00a0ebdae95453c5767c58e9a515b
SHA256fe4566ecce983bc1447edb87261f53798e0a48d1d6b7b17a902527846fe8180a
SHA512e2db567f128c486984a32bbc4572ae2cf6a25141670ed21cc8fa1d6a02bb30de4f8542afc19077249abde7a532456d3563289f4b9320ba52e03883ed397c7cc6
-
Filesize
5KB
MD56d948d9ce6e1c8c1ae74027905fe439c
SHA1e3fbf6360313719181746fa9a7ae52568e2a7e43
SHA256d5c352bdff82179547140685f3b4451311f09692321556184204718318df95ee
SHA5122fd878cfc6c4612297328c0cf29afb175a56d2f358d34ba6937a72c77f6f45015e0b39ab7c9eddcbebed9c4c4df1d9c21fdba40f75a67d2bf73828b1700467da
-
Filesize
6KB
MD5672dd9922f249e86e322991f2dffa571
SHA18188be60a1151ae02aa352e07236c76813131562
SHA25637d210901daca9ba334fd4dbb9b452be8cef7a9653e4cc25fad02c511aaf4222
SHA512beac80826a46d684b7af1a3b42cdbfa1b846765bac09ec740bc1fe94f3c86f109b957053a8f17cf262ee0dee72f0920475d63e2efd777844aac36b305b33f286
-
Filesize
6KB
MD58e3ba7cf238cbacd2d4b940a2a42aaa3
SHA153d95ed0db25dcdd98a81b21234f08c1fad1a705
SHA256878ba62fda682196d4da69fd462094d4d3f7eabb593446bb458d0bf5b8efb124
SHA5129df2051b805fa87c5f9c8fe871c4bc6d3d6272af8b6136fc1d44c80c2a1f976971f2d9bcc51c4b4440975ddbb9a1cd0fb178547f5426f4acaa5aa375112b4825
-
Filesize
6KB
MD536d9ad643c72b5d2a0fbd055c612ff02
SHA192eda51a364b648ee65e22b9e3b49f6ca4c6dbe4
SHA25667a7ce0ee43a04a672477c7d6a7cd3641f5ae09faceaf6ec22258136baacedcc
SHA5121c54925090f51d70e077d910c82fbfab45a9e081cc400192b9b6bf14683124b61af3c88911dcffba07a153e55d4b3493383ca1e00f107bd7bb84ea96f596244d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cc24f4d46ec2a5bf245d76f57dfa3ad7
SHA1e917ec182c6fe86aa790a400c160c3a9fbd67ff3
SHA256c29ed82088c69286aa86b2acb497b66ab46397f45555a1f38cf8f266482adc87
SHA512d94ab17cb33390ef864c1f08ae1f4194a7e8524c0ddce3112b3ea751b7f971657ca80b841262b146d99bb841ae01e35de92847268a634112ea247d71c473917d