Overview
overview
10Static
static
5quarantine...Ab.exe
windows7-x64
1quarantine...Ab.exe
windows10-2004-x64
10quarantine...Jz.exe
windows7-x64
7quarantine...Jz.exe
windows10-2004-x64
7quarantine...8M.exe
windows7-x64
3quarantine...8M.exe
windows10-2004-x64
3quarantine...0.html
windows7-x64
3quarantine...0.html
windows10-2004-x64
3quarantine...n.html
windows7-x64
3quarantine...n.html
windows10-2004-x64
3quarantine...y.html
windows7-x64
3quarantine...y.html
windows10-2004-x64
3quarantine/am_no.bat
windows7-x64
10quarantine/am_no.bat
windows10-2004-x64
quarantine...ad.exe
windows10-2004-x64
10quarantine...Y.html
windows7-x64
3quarantine...Y.html
windows10-2004-x64
3quarantine...t.html
windows7-x64
3quarantine...t.html
windows10-2004-x64
3quarantine...2.html
windows7-x64
3quarantine...2.html
windows10-2004-x64
3quarantine/pic2.exe
windows7-x64
5quarantine/pic2.exe
windows10-2004-x64
7quarantine/pic3.exe
windows10-2004-x64
8quarantine/random.exe
windows7-x64
10quarantine/random.exe
windows10-2004-x64
10quarantine...s.html
windows7-x64
3quarantine...s.html
windows10-2004-x64
3quarantine...mz.exe
windows7-x64
1quarantine...mz.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/0frhMAb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
quarantine/0frhMAb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/7axE6Jz.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/7axE6Jz.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/Dyshh8M.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
quarantine/Dyshh8M.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/GEFwbK0.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
quarantine/GEFwbK0.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/I8L5Xon.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/I8L5Xon.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/IxZcQMy.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/IxZcQMy.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/am_no.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
quarantine/am_no.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/download.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
quarantine/imfsCjY.html
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
quarantine/imfsCjY.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
quarantine/kablenet.html
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
quarantine/kablenet.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
quarantine/ninite22.html
Resource
win7-20240729-en
Behavioral task
behavioral21
Sample
quarantine/ninite22.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
quarantine/pic2.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
quarantine/pic2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
quarantine/pic3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/random.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/ssystemfiktums.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/ssystemfiktums.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/xqWgymz.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
quarantine/xqWgymz.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/GEFwbK0.html
-
Size
162B
-
MD5
1b7c22a214949975556626d7217e9a39
-
SHA1
d01c97e2944166ed23e47e4a62ff471ab8fa031f
-
SHA256
340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
-
SHA512
ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 5080 msedge.exe 5080 msedge.exe 2636 identity_helper.exe 2636 identity_helper.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2320 5080 msedge.exe 87 PID 5080 wrote to memory of 2320 5080 msedge.exe 87 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3960 5080 msedge.exe 88 PID 5080 wrote to memory of 3120 5080 msedge.exe 89 PID 5080 wrote to memory of 3120 5080 msedge.exe 89 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90 PID 5080 wrote to memory of 4904 5080 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\quarantine\GEFwbK0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f86f46f8,0x7ff8f86f4708,0x7ff8f86f47182⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10773371733666435258,9919719629179311358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
6KB
MD510bf642ac57e600422a5a3557ee16d98
SHA1e8151529351b298372afa609d858c2c47c76e3e7
SHA256db9f95714608f587eccccee430df0a34f8e5c37fdcd211cd1355bacd8a080f3c
SHA51255d4915202219328869dda4a58dd9f6ce2584c0946611f6278b6932fa4a7877917ea4df68a0dfcb84ef38d76b9863190048e3b84fbdd6df85d225d5f4b4a787b
-
Filesize
6KB
MD51ea5a5d84dce5c715a07e64e743bc88c
SHA1c83b993da9aedaa86ffad66e4dbce0a02525e6af
SHA256a3a09906137ff4a94cf8d91eb925d84bee69a45b805797ab6bb3850db6ef216e
SHA512409b4642388c165465854f68dcc071fa0e6c4f7e56efa18f549eb4b2df459627b240c1c902faf848f86a33c250328078168ba4e17ed5a19d62b0b0263931ed07
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e1bf87195c3b140dd67bfd6be1bfc089
SHA15b383cd439b0c8931f2c3656d549dc1a9d66ab60
SHA256cee9bea1e681e859e0dd39c0c1e1f242572e2e3b9cf0b84ffaa4ca1da7b4a0b4
SHA512c2ddaca5cc1af9819f8613fa43c012c74d7292729a2d888d2a51513a7ffbf223cb534e64f4f9f5e0fd4d409fca672106e34d3cabcfaf4ee7c67fa5f09062e2bd