Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
89afc6f9e609e3030ed2b9ed348a2d9f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89afc6f9e609e3030ed2b9ed348a2d9f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
89afc6f9e609e3030ed2b9ed348a2d9f_JaffaCakes118.html
-
Size
175KB
-
MD5
89afc6f9e609e3030ed2b9ed348a2d9f
-
SHA1
38e2855ae5cb3257d1237efbb77fa5521542a389
-
SHA256
a77e80797f407adf9d21f986fadbd6740c9bb5742806d0c7fea3f6eb655bc7a4
-
SHA512
8a02cabe01d3d7fa034c324f709bcee3286ad4a1bd637f36b3b024c09c0ac9db777860b03357ee088e7f739e64c97e039b3c6f2acc6aa70848dbdac04d9ef3dc
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3EGNkFmYfBCJiZr+aeTH+WK/Lf1/hpnVSV:S9CT3E/FvBCJiqB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 1412 msedge.exe 1412 msedge.exe 5812 identity_helper.exe 5812 identity_helper.exe 5792 msedge.exe 5792 msedge.exe 5792 msedge.exe 5792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4356 1412 msedge.exe 82 PID 1412 wrote to memory of 4356 1412 msedge.exe 82 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 5352 1412 msedge.exe 83 PID 1412 wrote to memory of 2220 1412 msedge.exe 84 PID 1412 wrote to memory of 2220 1412 msedge.exe 84 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85 PID 1412 wrote to memory of 5536 1412 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\89afc6f9e609e3030ed2b9ed348a2d9f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe4,0xd8,0x104,0xe0,0x108,0x7ff9a4f946f8,0x7ff9a4f94708,0x7ff9a4f947182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2108 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5831288737580819289,1815499553028531421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD516b27547411eb4cd7e3f1c163790279e
SHA1f1e008a2b0e138929120df722e79a3d298ad6404
SHA25650a5c373f58475a0eae24d2f0aa0819d57d2707378dd42706e5cf3b9aed590c6
SHA5127981dd76bb393fe0d7fef3ff05e2e1007c9ec799d338167e8df1865058bc57d49e80ff1d4a3ee78959aca1c25f73b114584d64b81283d6ad3ba6d8259ed10e02
-
Filesize
2KB
MD53b01613603a63dafaecb26da60a8565f
SHA1f3563bcd8f48fb600a70591c4ecc980d3a9a6283
SHA256fde532fd814d53c717b0e06ca2d69f365d9ce6fffba613a05e715980ffe577f1
SHA512c58776124eec845d8aa788dfabfd0099755270f293bf54155b9dca375a190fe942a73bbf2112503d47332e93179c90f5c4a3f983b1d0db1ea0791c85439a3f50
-
Filesize
2KB
MD592d171be9052b7acc7adda7b282ecb4d
SHA1cc54f54c142b9e07cfa8cc1cbbe3aebf065d19a1
SHA25618525814b342e8aa39e7bf1800b01d76eea4dafe1dec63e39fd6e6d91b3764b2
SHA51225db523899d945178373d6fc5b6c4809d8af05068080b91a527d7a05ee8917ddb751eb801f35a376e45136de93dc6c4eb8ed7f77b583b5924c83081d7df6f364
-
Filesize
5KB
MD5f9c8bdc6984f7c3d1e706ec3e848d4d8
SHA1cc65e508cfe58671bce284e5eed7b55267ebda28
SHA256a6eb50245dda419a0712a3f2f9a6bfe0cad833c1b9f70192b1bca8b4d17d8a45
SHA5122482e1c0bfe1b23365088268883888323b963c0f258f06ce379cfa447b355b85966d440e96d9124e7f3a5f67e648a9d2fc962238a2c1cff79079fb5fc3ea1547
-
Filesize
7KB
MD5aea8ebd7e0bcecbfb42dec095ad2f69c
SHA1d27051c293b4dd100d5369981f44d6246a26f624
SHA25634e99a225aef577bef4b82f9934cc2a06beaf1262e74ef4457f6177e0502c6ed
SHA5125c21b15686c7c585ee1c75da75d09876c483be20130e9fa5375a76573fdc31b2544fbd2f874be87f7dd1c1325910b2a7b6817317b563969bcf00e42f1f4386c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57543dd2b695b4ef561889b5c11afd8c8
SHA195bc198d6f028cb24ab12c6716af6010054a809e
SHA2566f2f5343b442a779533e3599054ea6554fdc8dac294e67adbbba6e4a829b49a8
SHA512b8e1a85d82954c2514005d48faccbc7430dd6441b643d27f2681c9f5098850da22ecb2e31c605b225e1defebbb2dd1b536d5e74907f0fcf39fed9e8833ccff52