Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
4287c79a6ea5b6e66986ec0f85377c15_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4287c79a6ea5b6e66986ec0f85377c15_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4287c79a6ea5b6e66986ec0f85377c15_JaffaCakes118.html
-
Size
57KB
-
MD5
4287c79a6ea5b6e66986ec0f85377c15
-
SHA1
03ae8ce396dc4d44ecb0376b913b7d98687a9b57
-
SHA256
752f532470826e5dbf59027f5744feae9325dd910d500c5708ffe2cbcc8d25e4
-
SHA512
badaf2a693a41200084b36865444d01e71e5d2de7ff52a6f8afc7c6bdaaebde337d054cd6f359bd768efbe1d16f2255463830399c8ad9b071bcace8d765d1ed5
-
SSDEEP
768:eRYi6dPB1ffs6To+ZVLYBxLtlgAiiOG1N/ES3GpYQ90iaNa1IM9Alx:Q6dPB187+ZYo0ia4P9AP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 456 msedge.exe 456 msedge.exe 5112 msedge.exe 5112 msedge.exe 2716 identity_helper.exe 2716 identity_helper.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 5052 5112 msedge.exe 83 PID 5112 wrote to memory of 5052 5112 msedge.exe 83 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 1792 5112 msedge.exe 84 PID 5112 wrote to memory of 456 5112 msedge.exe 85 PID 5112 wrote to memory of 456 5112 msedge.exe 85 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86 PID 5112 wrote to memory of 2152 5112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4287c79a6ea5b6e66986ec0f85377c15_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a7b946f8,0x7ff9a7b94708,0x7ff9a7b947182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1396 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4780004182471541637,6086709679137137991,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD54548992d0219822ac99efdf8a0133f27
SHA185654c3d3267f28d7f4873630abdeb80c5472b9c
SHA2560b157f2830f169302fd9ea89318d00319ded6afac1ac2ee5360e06402045e98e
SHA5124e5516232f22c911c3a77a798e8ae3dc31110f9357b9bba46ba8ba9c24e14ce0584b2d342689a10b7a8706f1d5fd8f1eaa8352102cfdd399c11ad544f0a0550d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5209e69ee1f4bb08aba35038a88f6fb32
SHA146f6696c3cf051f75b51be307de893dd804af111
SHA25674340fc61d3c53735388ce4cf1922d451c9e6fab32f405860e6448743e034185
SHA512031b266ea932a04fb52f0de35d4594f17e85e8fce8dffe3162558c8b5c468fd5fbc85dd1e400e230f012617fe8eea18092aa66e04600e8e8809683f524bc7846
-
Filesize
7KB
MD58f0f20f01b64a034c02ebc77ff8256c1
SHA102cbda907a147934535efae691c94ab40d02c329
SHA256ccae07977375d106dc02d887257ae1913873399a11a95dcc4ed020e556514059
SHA512514a5cfe1c924b825eaad5561d908603ed033caf97a7ca8c55f3e580ded12b467e115835f3a0a73846d4087dcc45febfe15c347706cbb5b1e8f687601ed81425
-
Filesize
6KB
MD5a213394216b3618f94db2fb81dc2d369
SHA118993cadb780aa97dc6f7c4aa5736653c7880503
SHA25631a1b91fa5bcd3acfc4dd5d1936ab34e39bb23d2a6701beb7710163c08910b02
SHA512999e15831a6e7c10dbf56729abaf38978931cb4349c98468a8171d7103f25b09776b212d13a52c3dd3a5d10b80e051bbfc5b346f0d17268cec0112d68ce90968
-
Filesize
7KB
MD57f20b1c40e737306e4c6dbfd6bfb7cd7
SHA164d9b0926e51ea18d76d82491ec9360ee6946241
SHA256afce5b6a0b9953771c24c4347f3806665865c693580cecb772c883f9e662a1b5
SHA512e3ea2498204adfa133292446a3989b8ac7652d1a15f3d0f8ff9083782bf1df002fa9be1c78fcd188b4177e9666e2631ed8475a8d480f2e72ad7b22ceacc82c98
-
Filesize
7KB
MD561ec06d6add0b4e9c1d86e7844d94276
SHA18f641bc6d21adac5b58ae932b0d11a8604221a14
SHA25622ed308a5586399ac954f085caf5187ccc321991d2df721ca4ceb600adb6fb6e
SHA512abc0e3e3e7073123dfd52b0f9f4b2161706fa7edbb656ad4b8d6563803849717c248c3058043c2aad79af09e07f6f909c53ee968602f3b6973a36270e34a7f18
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52b2ec02053788211435d6c69bbb8f582
SHA1f43c7e432acb5715bd3635944700330695d06f67
SHA256b65c490bd4249400d61d64cc584c254a54a69df078cf0e085e2e3ba6f330085c
SHA512439bc8f6705983df2f50a5cf04939fa9fe3feb16dd5d95b3ad3b11e02505899ac479e5c4c7b771d8e0432e0f163afe77ab499f16037548ae053aa29a82e1f501