Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
34e524fb3d9f3e01e180b1308cb6df2e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
34e524fb3d9f3e01e180b1308cb6df2e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34e524fb3d9f3e01e180b1308cb6df2e_JaffaCakes118.html
-
Size
175KB
-
MD5
34e524fb3d9f3e01e180b1308cb6df2e
-
SHA1
18d0be0c6e0566bb7eae876bc74b9208a10bbde3
-
SHA256
1fbf8835ef437fb1dbb2208583097a511f0ff9c8f40f4cca93fa30412e629b4d
-
SHA512
1fcfec14d08baee7c105fcfb622f95f8fd173cc446914e8720dd7bc79fbf6e2634805ecdda675bf9e41aa65bcd840895f5145e792429bc36fa1867b0096f78df
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3nGNkFrYfBCJiZG+aeTH+WK/Lf1/hpnVSV:S9CT3n/FyBCJiVB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 4352 msedge.exe 4352 msedge.exe 3680 identity_helper.exe 3680 identity_helper.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4172 4352 msedge.exe 82 PID 4352 wrote to memory of 4172 4352 msedge.exe 82 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 1652 4352 msedge.exe 83 PID 4352 wrote to memory of 2080 4352 msedge.exe 84 PID 4352 wrote to memory of 2080 4352 msedge.exe 84 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85 PID 4352 wrote to memory of 2140 4352 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34e524fb3d9f3e01e180b1308cb6df2e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb3246f8,0x7ffbcb324708,0x7ffbcb3247182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16823149476383506295,7591951875590888164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5dac0e21ed52193b7e1817f5090b51de6
SHA1a28c79458b2fe61f99480ff13d316cdd1ac7a1e4
SHA2563c918f453a88cfec88b01cb1351159704b9ce42597564903e9434593e3cc924a
SHA512d9de10c76085db2beac789bfb9cbec1cabdcd78da332ae042255dde40af5f6adbdbb41b2cc4aaf84ab9c2f9ff74be6ebcae543cfd8456630dbc384344ce88580
-
Filesize
2KB
MD5e7ab16774ff9789470fe174ce386b6fb
SHA1e8cd4f9080bb872077e1728fd3c0d669bf9e74db
SHA256aff3f0bd6c96258dfa3635f17e754a624b24ed1b471f51aac16dbb362eaedad8
SHA512e300947da8531eb47525e3acb209d18bccc42052d175f62422add125f285f71fd6290e4990aad744b91d0bafc17c9c715efd75e3175f32ec1927299235df0ef0
-
Filesize
2KB
MD53adc462bc583904e4fbb9a399a44d19c
SHA1bf1dff00957b52ce0787d6d8aba2049f44bd9c8d
SHA2566bb2348988a856cce011fa1b668b0973c13666a1a8c9c56a8fc380e6b8919780
SHA512588c39e88a0db9c659d461031fca1d872cf6232dd9ebdcd043aa0a3fabbb4eb5142d34ae8e88613b828cd4c2a30c3e419ddb6da9feb3eb95cc05ae5b924f97c9
-
Filesize
7KB
MD540ad2f693907e23adc7114d84d9e48d5
SHA17fcd6a5db9918e4464ad33bcd6d2ad2b2d63e351
SHA256908bc4e51c5f1be7477f6f4bb9ded01bd2a9f7f86f235b64877b71f6947533db
SHA5123cdb74335daf512b9a804646569974267b2ba29103bafb89e0ee4cba93c6bf932dc9b6e1494fd3ef76ae038d95054b121ec3469c8467bce40e723f52c8d55e90
-
Filesize
6KB
MD5955cb4a260e3a142e4e60dc4db78a36f
SHA1bce604fd91f95cac5c178efd5dc7c21de797a717
SHA256cd7b0497182838aef2f32eab09fc9fc0a4fffd90716190a3cce6590c59b97dd8
SHA512a1d29f70ee9f8c66ebca0e77469a6713b1373c3b6ff9bd70ca0d70e913c923befcadcf3a8cabb6f82a2f016411da9055e3e408c6ed11e13fe2d6734f07c836bd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de78a2e9fce46c2d57494d4441e2303e
SHA1f5dfedfd19d4371a329cbb2aaf69c57dd2d38356
SHA2567ffa863cc0cea27cdcd4cb970d4933fa76d9566e51d4bd3f4087cc2d915a2ff0
SHA512a897dcf570e80147c82597cd0e99c3de578a81e69c9035c664bbbd6b3f8285d4e1663a1aef5e7d366263695cdada96bd406e56a75414cdead32f5c9ba922da11