Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
6cc9b60b94a612a63b1e83d9416690c5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6cc9b60b94a612a63b1e83d9416690c5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
6cc9b60b94a612a63b1e83d9416690c5_JaffaCakes118.html
-
Size
47KB
-
MD5
6cc9b60b94a612a63b1e83d9416690c5
-
SHA1
006ba1243cfe327b02c80a1f16e3901d4f12b529
-
SHA256
a9c4bfde477aef9ee1ebfb8ddf27d7c8af49f075db470ba884a661f1e55433d7
-
SHA512
947a119217371dd287ae21d427f52bdf06b155191574195f974aaaa71e9b3d02436482867358b2646838f433de7fffb539d1015412976a572ef085ae21123394
-
SSDEEP
768:pDxUtUKuIMkUn2sVwUc8oUUU0UY2BQQpTU4QkDUqQ2UrQeDUpQkUJQPQU1QAUUQE:ptUtUKuIMkUn2WwUAUUU0UY2BPUuUuUe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3380 msedge.exe 3380 msedge.exe 1676 identity_helper.exe 1676 identity_helper.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 1780 3380 msedge.exe 84 PID 3380 wrote to memory of 1780 3380 msedge.exe 84 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 4816 3380 msedge.exe 85 PID 3380 wrote to memory of 3088 3380 msedge.exe 86 PID 3380 wrote to memory of 3088 3380 msedge.exe 86 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87 PID 3380 wrote to memory of 1980 3380 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6cc9b60b94a612a63b1e83d9416690c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa202f46f8,0x7ffa202f4708,0x7ffa202f47182⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,18122170237728523698,15958881095996196812,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\422397f8-2ef9-4931-b539-dfc70dcc2d44.tmp
Filesize5KB
MD5d2319d2b550ce1a916c64a9eb46e72be
SHA1f3a945d5e32df4895a4aa6035e648079faca9c08
SHA256a56cd335aebb446385c44f9fb15a6a47d8fa4fa1643881a2ff4301c7062822cd
SHA51286324432c820ef5d3ec96a29c1827ba72dafafc247fce51902b70f1f3844da5e904f806cdb85ce77328bc638462dbca378e3599747b716a63bc4fc01ce25982b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b3cbf0a39d1d8360775d76fc31377513
SHA1a56816aaf7edbddfd6b81a37380a8f24659c810a
SHA256f16ba6a0bd48f7c4558c6d70812e919fe83432813e7e5cb1c2cf7a50648bd47e
SHA5122decd68a7e30e45b29a82a4d136f222f1aca97ce6a68fdea0d34474c5808ced7819b5e25e27e5a6a9df5cc067bc8e3d489a9c26baf623ea96add2572266d3600
-
Filesize
1KB
MD5ecc89ff9a2efd00efb51ea8385ac3621
SHA198978ccc306503d0d5ae7a5b3b68fa2c427f8a61
SHA256d59273f9503d1a5efe755489b9dd178d65f921e4564ebba24be3c9f2e4eaec49
SHA512fbedb8fd00862a8fc40c5a658e4d70bfb4ad9febed207a34020266034e48908bb7685ef3a4bd908e0b5468fa5b3bac753eded2c88cd635e513d6f27544e97204
-
Filesize
7KB
MD5856fe374c8ee72a6e330b7200125c9f0
SHA1264e0510e0004fd90dd84579fec24fddb148f635
SHA25674a0feaa277177d23157833f835600e25f5076ba6ac2121dd984fdd8d1f310e6
SHA5121f44dc5f05f01528b5f3d7b55f21cb020eea2e7d728dc3d8c9bd835169d6ea327d6ca7513d6c726f13c40f6225bde34d25aa901f1af15c941baf9cbb6f2ef7a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b34717f2ad966318f6ea04fd37c706b
SHA163f57196bc95871339d904f474a620e8286e5926
SHA25613ffe0fba62d2d4236afc29a50ecc2f4f4f7fe2639016d457b0335e5c1677b78
SHA512d1e4f9ec4a2a563844fb438062777a52903e89f7a3b34a52839b9b6bb82c04f1fbef4b85f8d5624ec59d7d4427ec6ac5801073b95daa348c9d486aebd3165bc4