Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html
-
Size
57KB
-
MD5
b93e42d4bffa3e5bd47ec0b0fe62d1ea
-
SHA1
fc73ff7bfd3bdfdbccc31fb81fd6c5a3cb722360
-
SHA256
4371754db4844f88766a2a2f4826707176208e66948f1ff12e82aecae69a68ba
-
SHA512
2a205682a9b2a260d48c24733332f5a36dad80e5d5b64c2e9ee2e609f39bbb419d3a696ff8048425679cd531c1c083c98b4fbc4cf3920601dd4a565b46f79fab
-
SSDEEP
1536:ijEQvK8OPHdsA3o2vgyHJv0owbd6zKD6CDK2RVroXFwpDK2RVy:ijnOPHdsL2vgyHJutDK2RVroXFwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 452 msedge.exe 452 msedge.exe 3968 identity_helper.exe 3968 identity_helper.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 4784 452 msedge.exe 84 PID 452 wrote to memory of 4784 452 msedge.exe 84 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 2904 452 msedge.exe 85 PID 452 wrote to memory of 4084 452 msedge.exe 86 PID 452 wrote to memory of 4084 452 msedge.exe 86 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87 PID 452 wrote to memory of 1480 452 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4c846f8,0x7ffab4c84708,0x7ffab4c847182⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,13696018631840226455,6575837756295074409,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5a46f646377b3ff7c9d792f03ed99906f
SHA1b89b125e7f5ea570bb8ff43e8f4be09b7b8e7baa
SHA25653a4a1ba408818769498e851dcb6da1f59f213109f2c27d87f75fa559bca5d90
SHA5124663f7599343856e6c4c734fb49c9f1c3a2b148d00c337657c0c311b0f8d054049555b6cf4935e394c2571678ba4d179aa80f9d4e15bdc4c1efb065a67e3880f
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5143c48fbca489da73e54395cd578aa0c
SHA1bf054db8368a05c23833f1f03f394a01abdb2492
SHA256d08980e35eae05465c169dbd60af0453f480d5462c64a258b3764c01c9cc5ac8
SHA51212b0bb524ba2aa6db0c713ea06d67ed76a7a27d9862eca3a4177d076490df2226476260304eb8c5c701765a46de8bd67e70e96ef646be85ebed79b4bd291a2e0
-
Filesize
2KB
MD5006fccec613f7905d3cb6076f6e3fc13
SHA12bac784723d26c941e49667165a465db70eb6de5
SHA2561ee322dba27f4b9d9ea252a8b25511a317540ca258cb1e88bec5cabd6af97511
SHA5129f86b8b5ca266843f81130e27432f855de03d6d655a6bd725240831d471edfd3851bc24e2a42fc21861f1952424f6d0395327d041441a2e4755344baad7567d7
-
Filesize
5KB
MD50e123656cf701992af3bcc4053679b74
SHA13bcf3b71c4a977984bcbf4657b51a22c73f3de0e
SHA2566488797e645974dd8838f9b1532ce54afe4c1106d18cdc3c2cae07522ce4e19a
SHA5129cae7530b9cb0389b46f15ea35617fb704be2eae9bde47630528f30bd1e83a9269eb9b85ad3dfbb67d95f678bd4216e3e44bf89afd047b7c5f9ea0c864877e3f
-
Filesize
6KB
MD54320e462ceecef15b03a3069800b1768
SHA1580e0ead65f3cfd5af9c58f8b2407f76812dd717
SHA256a9c4f29416073374de6ba8cf8ff91373b012af2420fe1f8a2a9c3a3e8d4a6a6f
SHA512d8ba92f82bd4630fb62c27b7633e8edff860678fa30c6cd5b703e768983d7a499dd16cc4a43d24469c32ef535958d315fa916c5ebcc0e14a965c1abeb87de925
-
Filesize
6KB
MD569b0630256eb8b659fc3acf6dfe57419
SHA15af3997e3fc7095bc448ad94d6daeaa6449b0057
SHA256410df4f3d1071771e368fb24cefc6647da326104c37418d623fb10ba8d93e48a
SHA51283fddea260abb793b18054355511d709e2199f823943eee773321f57ef62d3b0724a7350a392a392ad8e29c8350a878d22d53a3e8eedbf215f8173ec078c18cc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57fae98fb6707a90bf9c85f507cf69de9
SHA1813580d7a71ef273df1dd6c693db33e2b8314540
SHA25617ebf5bfc5f3f983b75a3a8a3d1120d8415ff0592e95f3c0eebc20cb5de251c1
SHA512323bf4fa7bd43ed5c68c64b5ab0334e1e89a2c45323ab06d53a7441564d2354d5975d728d80805f0066ef7fec485c74ef82a1f7217abcb94606534e5efddb1dd