Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
c8b433d6a156ddac7bddbe53b4c19495.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c8b433d6a156ddac7bddbe53b4c19495.html
Resource
win10v2004-20240226-en
General
-
Target
c8b433d6a156ddac7bddbe53b4c19495.html
-
Size
14KB
-
MD5
c8b433d6a156ddac7bddbe53b4c19495
-
SHA1
916ea88ea5252ae78ea90532ce9334d82a0c802a
-
SHA256
e4a7259fb3ac9cc0b9c0cb8ddfb11bb2851c45bdd3c741b5bee3b598298b00ac
-
SHA512
4641fcb7798f84427e28bb0d43b20458206070f9657ab1c08cdfc5650f79ba6261d7d390be1a92ca9c5241b3802b2defa143e4e9569b18923f1e2e77d9c84550
-
SSDEEP
192:B1qh35jc73rnWe2pIlbiLekh8m/r0zqCBz6tuc6bvAYzfqlmfdOY2V2i4lmP3KTC:BU3cPn108O0jegvroId32V2H2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3904 msedge.exe 3904 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 2444 3904 msedge.exe 88 PID 3904 wrote to memory of 2444 3904 msedge.exe 88 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 832 3904 msedge.exe 89 PID 3904 wrote to memory of 3872 3904 msedge.exe 90 PID 3904 wrote to memory of 3872 3904 msedge.exe 90 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91 PID 3904 wrote to memory of 5072 3904 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8b433d6a156ddac7bddbe53b4c19495.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe937846f8,0x7ffe93784708,0x7ffe937847182⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 /prefetch:82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,1704542240285405689,1291129593800031582,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD549ea3ca08cf2c90c41c1bcb148fda320
SHA1db1c0087d27873ec6937163a68b851036b97f37f
SHA25626b429ad1547ac15b5b52bb0b97a2aaacd1b0083f6f86ae2823cbee3e75ca6de
SHA512f913f265572aec8f27080b82e1f3a1eda48c4099a3af6bf76f169fc26fe92d18f7ec1cf390d8ab376e905d48f2958abfabccf820afbace05adfa1392c7a8df6c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5f91f77952d25ea53667a1dff6e2b3ea7
SHA166381394b627c543498dd33a42302c57a5d3d8bb
SHA256cb81b414bc6d2f7b861deddd787a2e9252306f87eae28f6254a2e23584fd1e2f
SHA5122fcc8980322c07165b61b50b5331cd28f438df6da9904bbc84063f9ff46171f0241d7a13a2ce627f19b9f7a6ac58ee7493d00c3b884510471184446b3dac5652
-
Filesize
6KB
MD5451523366828b9d8d55ff5c553fdd527
SHA16b4daa5fdb4f077dbb473e5a205467e550e65c1e
SHA2566c5c10bb83803bd55a22e0d6da8f466312bdd7c1ba5c464be35f0f2d98ea1c83
SHA5126cd04bf832bb7c2c52a68df081c68aedac33672ca4e18a64381accb75eb372d6b5fdf7a8eb338b9b632acdd56df281d9435cd068fd6c00fc316ac17d53c20d4e
-
Filesize
6KB
MD5bef5183626d470ff7e4b6f45f72cb062
SHA1d98c55301ef1cb9d66c7f0f27efb55d39be5833a
SHA256ea00216a481b227af5ede08859f19c8781a61d177b28cca4d44f9609af077b72
SHA5127f918f92393a7bf91bdfc953994c7fb3c47df040850f9eadb4b09c75b9df924363852e8d681bbbb1dc491bf7e380e0dbc1de4eb8617941dc8e5fc4d3fa785519
-
Filesize
6KB
MD590f881ea09964b032e0b8ed2c0b296cc
SHA148c292b8c0f78c4c10fa27e5bcf1aab92528a0dc
SHA25668d6be4934986df31f5329638d2cafc39ddd83b9761c58d329f742fb0068b2c3
SHA5120aed03d7aa754a99a401e0eea900426dbcf9a67401859974dd3d851ec1f77518885c2b1322bb7a3f792a257374dfd2c067fff588c8facf200ef56572bcddc2a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fb6061e079322f59a027f4c2f0ac357e
SHA118d1a405ddf1c6e8634ae89e38bbb4651fa0b18a
SHA2561c67b1f055ab68f79b5dce04615eb156f7299d3fd7df136ed77465b6bde85e82
SHA512348a279564765b07567286814d835c22e3bd086db01c7572242871a62392943fac59f09e1379921fc117b62fef201d023443047010050340f40f4c0e80b3a46b