Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
b6a1e99af5ac2f9fa72897fdb5b5de8e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b6a1e99af5ac2f9fa72897fdb5b5de8e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b6a1e99af5ac2f9fa72897fdb5b5de8e_JaffaCakes118.html
-
Size
175KB
-
MD5
b6a1e99af5ac2f9fa72897fdb5b5de8e
-
SHA1
2cd958f7e583b1142a99e1ebe1bc00245a0c61f2
-
SHA256
022687940c696d3f5e61c9d6f5ece00b1f85d5a9ebd803223d60ecfb0b005b53
-
SHA512
ba7a47083dc174f165d525a0b26cd7f369a728c841c907f1d6ad34db674f830748fa26b2d66170f7b893fc2e3c5db3c34c70df084bdbb0034a954fa88e661c4e
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS37GNkFIYfBCJisd+aeTH+WK/Lf1/hmnVSV:S4oT37/FtBCJi9m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 1072 msedge.exe 1072 msedge.exe 2284 identity_helper.exe 2284 identity_helper.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1984 1072 msedge.exe 81 PID 1072 wrote to memory of 1984 1072 msedge.exe 81 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 3432 1072 msedge.exe 82 PID 1072 wrote to memory of 4368 1072 msedge.exe 83 PID 1072 wrote to memory of 4368 1072 msedge.exe 83 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84 PID 1072 wrote to memory of 4744 1072 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6a1e99af5ac2f9fa72897fdb5b5de8e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7b6d46f8,0x7ffd7b6d4708,0x7ffd7b6d47182⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1370918451722625205,16667235794333740028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5c69b69d4d49a9ddc68170cfe01cd1f1d
SHA1d01c3102749ae59589939a9ed7e7aca5fa86a0c5
SHA256094fb0952ca6b29a3a5881672f705d4c0ad312b24a552f30c66d6ca5370448d6
SHA5121caf6b8ea0db6c82873ea82e834298594b43a3d327cd890d7a94167c4394e6b5bb67ea866f6a9d17ea7dfb8917945b4eda7208dfb5f177bbc585302a607358a4
-
Filesize
2KB
MD5b26c52860aae741fae0964f40f9935cf
SHA13297ee246628e52da8a417397eef177abe1a5ece
SHA256f765993c1dedd790db101b4fd134c5f89abae0ebc942377d3ca888ae84d2a5ff
SHA512ae03051713c4030c4b34c46f380758506aefcace89473785efed943c476fc7ce753fc474e5348ae845bd963af361a6ea1fd8c355a84b27c5e2c7eb46e6274e0a
-
Filesize
2KB
MD55f23c15cb39bbe1071fe6a574d789447
SHA1ce4aa1eb668eabba55356fed8d62881faa76d837
SHA2568936695ed1efdf003bbf05fcbad68c31ea1a3907e03eba910099ad140dedecdd
SHA512eecd4e74f79fb932fffdf336920d6a8e9165e94c73ac510fd395b1d27b2cdb0dc79d9ab227ba8c6bbf470fc37494ce36fd37a0e5402128fbadd90b20dc4c00f2
-
Filesize
7KB
MD55c776f52a19a367dd387d170c1756cdb
SHA143409109e9029a66ec0016aa1954c8f59a42a060
SHA256c7129111534cdd69dce91c295409e1c48d82ab28092b1844766edbd331ab16c2
SHA51228daa9fd282c20d5078eece6bd85470c5e13e6a6c53b558e454744fe8404bd75a798db96b0553c1d5b2b1dd22475d909e679439bed0f9a2571fcf37bc76b415d
-
Filesize
6KB
MD587b5581dfd78fb0d3a124f6862cace4b
SHA1b8b7515bc4c6393642b1c1d87fd0f0415de9c9e1
SHA256a4f4b1467697420a89a1718672fd1855d4b4d9a29d8265bfbd8be2183aaddec4
SHA512e5ff99e81e575d8ce57e26039aad9e5f215ada19f8d46e44aea4933d5e4620e246da7337c2b1d3751e98261bab378ccf675f32f06920d6c023737cfc2c78adfa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bac20f8661b3ae2996b55ba3bd5a60af
SHA1290f0198d88e7f55fe4807cbda8ad9c8181ef1a7
SHA256a733d0fe191d88b7bf65866696f7b643e17d2e3a60b7cce338f1d93bb0dc1471
SHA512362a6316ac8826b574cb4014a67d934c12545a718ea45c3da2a8a6b4dc281abe68f1c81aa06d53241136c486cd27a1b1417acbe56dd995dd2c4ad5c322a1ea5b