Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
eaaa50e5516f34dd29d94f840bcd5f35_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaa50e5516f34dd29d94f840bcd5f35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaa50e5516f34dd29d94f840bcd5f35_JaffaCakes118.html
-
Size
175KB
-
MD5
eaaa50e5516f34dd29d94f840bcd5f35
-
SHA1
9c33c19b875f0c09591cd4d2fef468e1234be184
-
SHA256
6c5fe01442ca4f5dfe2f7afeb0160787f72146c1263dfb9bf3bfc52034d89740
-
SHA512
58a2ce6c0af0ce0cdaed745ffd9c4b9a428dd796e1cfb387a5f25251c6e064daaaec7ca0bdb26a8798c2c719b188768efd152abe0d24a872a81de6fe3034ed8f
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS37GNkFkYfBCJisW+aeTH+WK/Lf1/hmnVSV:SOoT37/FRBCJiEm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4052 msedge.exe 4052 msedge.exe 2584 identity_helper.exe 2584 identity_helper.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4560 4052 msedge.exe 82 PID 4052 wrote to memory of 4560 4052 msedge.exe 82 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4452 4052 msedge.exe 83 PID 4052 wrote to memory of 4192 4052 msedge.exe 84 PID 4052 wrote to memory of 4192 4052 msedge.exe 84 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85 PID 4052 wrote to memory of 2300 4052 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaaa50e5516f34dd29d94f840bcd5f35_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9f5746f8,0x7ffc9f574708,0x7ffc9f5747182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8001489017774187311,8439314006795437817,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5de69ed6c4eb7bc3ec02e1195c51cd1e7
SHA124158c61bf600fad049212e659ee6dce862a2252
SHA2569ca76a4fa51712a331b5d52a8e2a1c04e227948a58c2c13fcf8f0a39a589259a
SHA512740681716737c553f0259cc08f98f4e8846891024c16c1e4796d740ea82ccfb217b3d61738386e4bca14621c9f53efd7a52ecbb9318e90464a3ceb1c3768a823
-
Filesize
2KB
MD5c3c9d53d0bb8a3781c38caf10c475226
SHA11d6f972247976411ea3b1f97275e5c6ebf929c68
SHA25685535e46d9fa3239d509c59aa8b1e0a20d9af5e0448d1de5ff926779c8ac67c7
SHA512d1d7493ce19e06deadcff7712e118f206c8becc342bc837dd1dd153c15f192a8e16c589ae5e2b1d5e3c40c0b319d43d0bc5530c79fad968c350f08c14f4d6c25
-
Filesize
2KB
MD5d1b960ec9df32cda52fc41605a401ca3
SHA135ab0fbdaa7ec5b05ad00f2d7a2d66cc2c33cd61
SHA256f1c2e0fe552e167b4dc302b7ed37fe610edcfc29d5bcac9ab543f1e46f7ea4d7
SHA5127f8d603b3b13f92acc74c67c0fb1d4148dae1e3c7319135c97dbedd3614332b8a505fd6d7fca1c29d32015f0f01e1828224f46e28379137ae2aac1bdc3d2e700
-
Filesize
5KB
MD55b85d51c61b23b87b9460372ed9cdabf
SHA1355a8de9ba2cba658b08b0efb470fc5bc61e9f96
SHA2560222cb511ed408bc2713abdcc626dcbd8b922b9dc9e3e257b53f583e5cd43418
SHA5125d2f97f93ec4835b07f156db580e9dfd3862026ee28cdd46b219c1b3ad78d087f31d043c8f779afec6c66a128ef0d0952d41dc75ab9e924b10ea3afa48eddff2
-
Filesize
7KB
MD5c7766bede59fd8532e2142165370bab8
SHA153ea26da7de714a8a0c87036befa8fb5bcba4bff
SHA2565532931d8e9b05807eaf28a70a6d79db9a4223803a924e31e5bab62e7aabea86
SHA5122d1a4ee0b96c96135805cfdf33dabb0868d2fcc5a0ea44177dd3a3226d192c46013716e5119308b8d37ad1a10054f149a7a2066dd47602b7e7cec00f469f3a83
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a634c37854be42e8d01b3d06e3c91ff
SHA1e93b7686ec4cb683c08dd55fc6fac9308da69e94
SHA256a4474a88f87d8ea10cb5a9f06067ff693e474ecb23c3cfa1390c2e9e452c7617
SHA512b7c9307907b908ac28885e07569e8d6d4f634cd3a746c20472474ff5e7990b2a5120da6934c2776fe71118f50abb5e5cdd1ad25094894344670175949d3980b2