Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 22:34
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3096 msedge.exe 3096 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3760 3096 msedge.exe 84 PID 3096 wrote to memory of 3760 3096 msedge.exe 84 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3668 3096 msedge.exe 85 PID 3096 wrote to memory of 3152 3096 msedge.exe 86 PID 3096 wrote to memory of 3152 3096 msedge.exe 86 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87 PID 3096 wrote to memory of 2176 3096 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://telegra.ph/Happy-New-Year-01-03-431⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbcb646f8,0x7ffbbcb64708,0x7ffbbcb647182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7056 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11048411223374938956,4049297911094795942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:12⤵PID:4912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD570c3cff5be0bf51076a3fe8506ca68f0
SHA1194474877bac68e9724d6faab90d383f4b00d1ec
SHA2567cd965f193b9f4b6be8eedf87be639b769d4709c670688c482647d2b29df8fc3
SHA512d54ff9567d12c33db436eea954845736e73ba8ab674c3d07da1839c700aeb1fc941b4e24623eba8c0b15ce78dc0fa3fb0d97cffd6d083897c712d5d0b52f8aae
-
Filesize
6KB
MD549e6e2385af060cce55a92f3053a1e7f
SHA13a430c1f4f590cd503ee0f105d610172a892d7fd
SHA2560892927440797f7f0a289e33ed5fa5fbeffe9f6fcddebd9f1c4dfdd774c9aef6
SHA51225a42ae52c798eeb725f87ff5eed88528e0573bf24d47c63feaa468ebdb346d20139eeccea83ebff190d33e19bff13d51861d3e0ab311c222119ae8ad144f92b
-
Filesize
5KB
MD5219caa19860234c5c5e454db7d93f93c
SHA11c870b1a4567b5ac37c3ae3a541f4e221b41cf63
SHA25654415f046cfdbc2320f45ba036204c9fa3c757ebb4f510e9e60c236dcbda2753
SHA51268acabaa0a83ad1be2e283778ac0452c06c4271a97ba427b8d4e03efc9c8a372aa0dc9e013e1bcc5d24f097deaa7e778bbda487f62391923b66d957d7ce4458d
-
Filesize
6KB
MD54952690bc154d23ea0262a9ee7c0ed0c
SHA15e1f5e0736943c0e5c6c96b1e4baa7ccef2e2e45
SHA2567bbda1b042b44805f4ffe800c7c8b78e9d695a54ef9145e5db9ecdd542817a8f
SHA512cb6593e243d35605ceb34cbc22ab3833c3ad89354cd30e1af774031fb4485177b1d40fee34483caf1a96efe818ea3c70f28d9190d3f0b561cff7c3745eafe50b
-
Filesize
1KB
MD5972c95d78f7a7a7cd54287a6b4d0a734
SHA1b6b05ccc21a22a5430a5a324910fcd56d62ed4e2
SHA256975e5227f79b1867c4bebfe75ca634e56faf5ca41feb075c4ff626f9c97f49c4
SHA5121ab3e1b73b35ae5f8247752da9451a9e8e7db2e31ce13cc07e4063b81fba8aae8c33ef73c400e2d2e3bd04066b4bc9693f51da1361da3448d4b4512a3d68228d
-
Filesize
539B
MD5e115856fc499a7a03c9e2548b6bfce3d
SHA15851d9e1342d7b140037b3d498abf06a94fd7020
SHA256d38e2ccbc8697860e1ecc5717796e2034751e286b09b602df34f9926ef9b55f0
SHA5126dfdc3774a4220006ac9a028ab80f9ef3d7c2d9666cd35bb9032b3b350f9b0bc3d61a37a24fc46a0f7ab3d2738f98cecfd944fa9f5ed17151e11c7436749ead9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50a8d633206f4c5b7c84bf2dd079c00bc
SHA1d858bbec757d8c50f8ef047b4416e8aac07c2ec8
SHA256c4b5e3459e3cb91fe896f1ae251fe54e58c5e2ec4ef6e3017618068f1a3ce67c
SHA512238d53e77eff461b338119e46bb478d4c659f5645567da47823e118c84495cf323096bd098a94f8db131190ccab9cda01251aac6a04ef35c1324a43b7c65e111