Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
246s -
max time network
254s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://developer.nvidia.com/cuda-toolkit-60
Resource
win10v2004-20240226-en
General
-
Target
https://developer.nvidia.com/cuda-toolkit-60
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2524 msedge.exe 2524 msedge.exe 5004 identity_helper.exe 5004 identity_helper.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 3692 2524 msedge.exe 85 PID 2524 wrote to memory of 3692 2524 msedge.exe 85 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 4192 2524 msedge.exe 86 PID 2524 wrote to memory of 2688 2524 msedge.exe 87 PID 2524 wrote to memory of 2688 2524 msedge.exe 87 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88 PID 2524 wrote to memory of 1252 2524 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://developer.nvidia.com/cuda-toolkit-601⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3a0e46f8,0x7ffd3a0e4708,0x7ffd3a0e47182⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2056624453254393095,18124095358525237092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x3001⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a1e5611b358ee7f3365d5ffccad976e3
SHA1b8e20d24ec018750f900290f468f1104cea552f0
SHA256eb13f72d419716225b6260bf765db2bc8e69df04ed98eedb90a943d0f884efce
SHA512bae11fe9b93d8ca8c2904287e0deb9b75593eb5faf94a189212dede4bd83d1a9555956602081991269cca7e09dfb1fe85771cbcf89888c315aa03e6f83204ead
-
Filesize
3KB
MD52160a4c551261dc6acbbe693d1b690e9
SHA1e0a1bdc6d49b26cc680d378146a62bdbc3819a3b
SHA2563645ea145d7a4c3a161f1748d0b21d03988f07138664975ad849a8528dab1d30
SHA512347248411fd9792c9251b272297c98a93f4ba87a1b04595fa724eafe470e7a4df88190a4deaffc1ca47f96c950d82049a2ef4cb9df08d121f2eb5ac672d9c7bc
-
Filesize
6KB
MD5455c81fb9d3920ff65a75f461027c0d8
SHA10288300c8b0840dac0decd9b473c9f8cdd851ce5
SHA256223401015e2290becd2bdb8cc939da2c00985d2b202da581b51e10a42c4db18c
SHA5121e7ae97c838b591a94e0086f4ad5771918360bb396d6d17cad572fabfab37a2b6b0acb42a534f5e4d01e8426c433aa6c371f00f0703fb95dbd35f7af7dd1836e
-
Filesize
7KB
MD5c5488dce1c49efc531cf175d893d59c2
SHA1fe79d5b9ae6c39fa705379c377dbd1001eb200e1
SHA256afc3f3ac79f71d24d9e816350f5543d9721df6cebc8d5eb40bef12f0b140679d
SHA512bf663fba7b72fbab6509844f3f25806f998c9a9fe6d2e998d6469abe26f5a1c44d78aa6adc03d3d74893c086270a490cf01949c1047a4afd011d2ba9ffc588fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5c6677b95890b0b6ffab2a0e1ac2e718d
SHA1d1e743090980fa73f5f2cb9caca0bc7ae8dda6e4
SHA2568a1d1bab0be1a3d52f5185ddf316e57f58df6fe9a0918b17fc3c0086d18761aa
SHA5123a32e5a2e2b45f5a4658bd25a0ec27553ecd5c81e02a373f8a5db85b0589079ae823d23faea46bd741c3d6564bcd9a1db3b025c378ec08490d1eb92c476da7f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a18f.TMP
Filesize48B
MD50ee283d357c6d3d217715d744380e5c3
SHA13bee083d4f8c960811cc69bff0afff110b1724ee
SHA256a6f3d7fcf804ec3a5fceb89e17110d2ae1ffeb585bea26605c6d1f6e3ca0f738
SHA512d41a31b3d478a8ea02e4de50a3af9c6a30b2161272315aef91cbb6a9c7067a0fd30e9a04974c56e1362353a0ce63c9f90ff6ad2c7335b671d152f50eb56db081
-
Filesize
3KB
MD5f72c1d8dad89e323374f94fa8d236fce
SHA1d1a5766dd3d6ab3aaba88c824d833c80a982018a
SHA2569e69abbfe44729d19331f6003a61a9c54845a8cd36c2632cd95457772dde28e5
SHA51284726a25b0e8cc3da2f2eb5b80dfb9cc9512e1a33050e8dcb9585f61d34ee46fb52ca30db735eb27c48af0001300cbfb2fc35abee29dd01c478a1010c7005832
-
Filesize
3KB
MD5651055edd7a803e8f0ad91d0cf169490
SHA1135600db27612be1dc35a3c86bc2bad1e91000e5
SHA2561a4ab81bb9f7be0bc6205654171a1dab43e11565588517100ce014b848c63f09
SHA5123a85e0a26b097fcf252ef7f9d21bea88beef44b7970a0ced7746302ece073a32ba11edf5e3828862c6413ce8dc73923e580c30d95ef83df42c153963851a2907
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b19fffef5a56576d4fba3e9b66a47aa6
SHA1e563a3e1faddac15572ccf16b909798bd12e3bf5
SHA2561e69006835fdb40c5fb9eb14c2d9f295da487a176bd7b28bac544b0b4758de99
SHA512184618fbe4cf055496b38e79806ac78725d8e0bc20d0fc503c3bd4dc9ccff886d164f38c31b7867eefad69aedb3fd186540a8dc4f6ca8443b411e5ac71e52dd3