Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
fab3f94430b3cdb76199e8ff03af1ebf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fab3f94430b3cdb76199e8ff03af1ebf_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fab3f94430b3cdb76199e8ff03af1ebf_JaffaCakes118.html
-
Size
62KB
-
MD5
fab3f94430b3cdb76199e8ff03af1ebf
-
SHA1
0b5e69901a52b1e7c7974d8f683c1c05a8164133
-
SHA256
f72820f9c919209fd5a6b5cda7d5f478cd24537c3ea755f2007a4044fcdbdc1a
-
SHA512
589e689b86588f871a907f728a177c972e5d3deb0a4786f25d013f76114d011791ff07dccb08267d607e902d51912d3dac87cf4e3c55beb0dc59fda3994ef179
-
SSDEEP
1536:CYHHmNH3M1ccgEM7ccfoCfSsM7wLYvk6bFp:5HGhc1/j0ccfoCfSsM7wL6k6bFp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 600 msedge.exe 600 msedge.exe 2616 identity_helper.exe 2616 identity_helper.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe 600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 600 wrote to memory of 4328 600 msedge.exe 84 PID 600 wrote to memory of 4328 600 msedge.exe 84 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1372 600 msedge.exe 85 PID 600 wrote to memory of 1588 600 msedge.exe 86 PID 600 wrote to memory of 1588 600 msedge.exe 86 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87 PID 600 wrote to memory of 1584 600 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fab3f94430b3cdb76199e8ff03af1ebf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc88b46f8,0x7ffdc88b4708,0x7ffdc88b47182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2284 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8256010533479966617,5848753327024445879,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2bc94d7d-1df5-4102-9812-60bd1f148efe.tmp
Filesize7KB
MD5ef21519c57bb2410f605da13113209b2
SHA111b52f7873a9a93025f5ce93ceda5412214deffa
SHA256baf6f2d1d39daa839eb5d8a4ab9cd26a59b14c9707c5f93762e4b1acdd13e893
SHA512e48891a1b4628db8fbfd79f9f49148e1d2ef0ba19989256403bc5ae03c213ff1726db61cd573b51c049fde14994997762ac110546fdc2e451a020e61d68af649
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD51d560c3a3fa72c13f0355ca6a56a5a31
SHA1a60525f4087e7b1c294b947bee69b9f4275be568
SHA256e754587ca6eda02cf954c4c6c3ab9b5e8cb55c480d216cb7f434d39737cdc40a
SHA51204529e8fed61aba8db4638d5bb8f347c1def22619793731385d8a38b0ed108fc45ee1204c3ec46c186b4287cca64532a9c52ba27fbce384dd2d15c0a13defb41
-
Filesize
1KB
MD55fb065369cce68ecc27abaabd392bd60
SHA1bee2e9a3b4b31481b13f8d54f687aef124f85329
SHA2567409a5263e80577f2b3a108d5986dcdfe0a3f28e0db09a20b1982a3b3ba92761
SHA5129ae9f3de0b256724062c58ab710007aeb976840fe2e61af82d350d0993e0b341f1ab77c5cdd9cad32778c5aa1df0cb9743194c82f39f67446840c6df82cd86f6
-
Filesize
1KB
MD526e874c44b1023d04ec1caaf33148f81
SHA1f62d013bdb414abb716c5b08965f3ffec3c99133
SHA2566519d459bc3a00035ad8fd86c20eccfaff70c1ff93a06f8fb06e96cb42b2d8f2
SHA5121f712d9ec57cf34836b3943ca466a09d8a252307c01f2cea05f024eb4b03d50166f9e451496919f7b874ad3e3f39c6403d3a2a603bc4b0c10e985c4c2f49b413
-
Filesize
5KB
MD5082da8531f70737590c407b89ff62782
SHA158cfe2176b17c4466af7471750c8b372137f559d
SHA2567dd4e14466ab253680b97a2452a5d9423493824e571067640fd41cd31a95e587
SHA512ce24f3148082828280538c2a2041ed2adc74d2208485f46a5e597b6941ad757e16935338cb2114264222c87e5e48f809dd5f9ca66db65baed17968f5b09675f5
-
Filesize
6KB
MD57079675874b308dfc07581b07c72f8b0
SHA1a626cf7e135ed6d01eaadae9d59935eaf4f2ee2c
SHA256c245d48ad6110177871dbc41d2654a615983fc127c8d7f45623dc98b63475bd6
SHA512e04d2a2c770104ae061d6d04b67b40e40b02d26aab8e06f1bc4be3db3ede8f2bfa77deefcc223fed763c3763d1ef651ef1fea2992d589be5be5bea14200bd212
-
Filesize
6KB
MD540d34ba38e30b0367f52c0bb942a882e
SHA1baace38d7b215afcbe94e116cdf47cbc0f70c6a3
SHA25602e1625e6fbb5446016dd9b572493541221ce3d13b72ead1bb0a17343c83c4f9
SHA51271f9a422af9343cc6ca0c239fa9c03385cbee8f8a5df7672bcfebb5abe9d477fca4f9a461d0674f3e83e73f8eaf413af483d3abe26542a24927cfb59fe6669a0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5024fbf9b50848bdeedf6ddcfc8f495a2
SHA1e623c0f1e3e2e997f1d56b018f218053cdc5b6cf
SHA2567a70a75c0c01ace8dffb39dbe56316844f34c4acb16447951d02f0b2d6d89a33
SHA512bea55e17d4d841a3d5eaa16bff815691a140c4d762607eca39485fa322ac3dace940f34e690e5b24bd86f8f72d0ceeec62807c7fa2a1ae1db6525cf59a9bb5db