Overview
overview
7Static
static
7mpcrmsetup.exe
windows7-x64
7mpcrmsetup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3SWind.dll
windows7-x64
3SWind.dll
windows10-2004-x64
3client/index.html
windows7-x64
3client/index.html
windows10-2004-x64
3client/vie.../js.js
windows7-x64
3client/vie.../js.js
windows10-2004-x64
3client/vie...st.htm
windows7-x64
3client/vie...st.htm
windows10-2004-x64
3client/vie...in.htm
windows7-x64
3client/vie...in.htm
windows10-2004-x64
3client/vie...in.htm
windows7-x64
3client/vie...in.htm
windows10-2004-x64
3client/vie...enu.js
windows7-x64
3client/vie...enu.js
windows10-2004-x64
3client/view/list.exe
windows7-x64
3client/view/list.exe
windows10-2004-x64
3funnel.htm
windows7-x64
3funnel.htm
windows10-2004-x64
3mpcrm.dll
windows7-x64
1mpcrm.dll
windows10-2004-x64
1mpcrm.exe
windows7-x64
3mpcrm.exe
windows10-2004-x64
3mpsoftup.exe
windows7-x64
3mpsoftup.exe
windows10-2004-x64
7mpweb.exe
windows7-x64
3mpweb.exe
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 16:37
Behavioral task
behavioral1
Sample
mpcrmsetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mpcrmsetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/advsplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/advsplash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SWind.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
SWind.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
client/index.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
client/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
client/view/default/js.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
client/view/default/js.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
client/view/default/list.htm
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
client/view/default/list.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
client/view/default/login.htm
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
client/view/default/login.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
client/view/default/main.htm
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
client/view/default/main.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
client/view/default/menu.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
client/view/default/menu.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
client/view/list.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
client/view/list.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
funnel.htm
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
funnel.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
mpcrm.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
mpcrm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
mpcrm.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
mpcrm.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
mpsoftup.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
mpsoftup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
mpweb.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
mpweb.exe
Resource
win10v2004-20240802-en
General
-
Target
client/view/default/list.htm
-
Size
2KB
-
MD5
e257bfe8269120c35a6f382d2743e63e
-
SHA1
53d8019e2f71bb8f21e2fbdba44dee6911520fc4
-
SHA256
ac2ad4a830daccbac285ccd07457e80bb615abd832794d924239967c5ae3f2e7
-
SHA512
d63cdf6da7973ecc3d8f3a0af582bfdcd1c2ae47b83d66f35b4c3563d2db277c26eb66595d4e4a0900a011bd3a29b097a82392497ae8fa0f43ca74087cffa00f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2444 msedge.exe 2444 msedge.exe 4892 identity_helper.exe 4892 identity_helper.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2964 2924 msedge.exe 82 PID 2924 wrote to memory of 2964 2924 msedge.exe 82 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2272 2924 msedge.exe 83 PID 2924 wrote to memory of 2444 2924 msedge.exe 84 PID 2924 wrote to memory of 2444 2924 msedge.exe 84 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85 PID 2924 wrote to memory of 2040 2924 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\client\view\default\list.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7fdc46f8,0x7ffe7fdc4708,0x7ffe7fdc47182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,8039226483426051868,14396715658210390184,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5c5e3c6899f471c0057c154c516dc95be
SHA147f791ea030e4064001ef7736c83e84ad2ac142f
SHA2567ffeb92e2c2eef62c780a941c803690e7c4d6e2011bde66db1c86b85261a10a6
SHA5129c59d6617bea2ef29c57c2ecb07c39ea36f413b0b1d2d6b1fc3f941633d7270aec271981d80f05a7f1acae64d6ae6a867f4293e0285bc6500d2fc9a1b4fa89df
-
Filesize
6KB
MD5bfb153ff251700c976d0bc6cacfe0598
SHA18889fa2b9570555d875075c1f67aef05540d9bf9
SHA25614c8f31cde44e292038c81f828dbc8deaa9664e8a33808c9373fd04f09163d0f
SHA5123b37f2cf622c39a55d1c5109ff3a9191098b4b1a6b75501b66dba5663df0f038c2219b194a06f93328277b3a3b6cd9f76f2abe0cc808b191af369e780d054142
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD540f65a110de70645dfaff8a512ced44b
SHA14991b7e615916b844c3890a5deae9e2ef8f0b1ca
SHA2560283bccfd17f9978d9cd34392e30a6c8512bb9c0b8709cc1a78d662f37e6fdf3
SHA512833219ec929856088b653bc974f6ca64296f4e0bffcfe765b12ef041c8d9db1a125ca2401efc25c596971cb78a3f12f57de9ab0f843665277865b1e8ee9f999f