Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
bf74955900187c2c01736c9919c56ca5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf74955900187c2c01736c9919c56ca5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf74955900187c2c01736c9919c56ca5_JaffaCakes118.html
-
Size
175KB
-
MD5
bf74955900187c2c01736c9919c56ca5
-
SHA1
c5192f99ffbf95ed65011edfa2f6e28b21ba3356
-
SHA256
fa1f2c303677316561c6780a52e0b67d527458b59ef3d33a3f06d16cde611f14
-
SHA512
cb842a5281d920064ec15710fa3ad13df8a88871ded63a2a6e72e0a7872af04328e08ad6e36024b1f60336e736d1fa312d5745488fc4a307b96ddec20393dd2a
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3DGNkFdYfBCJiZ4+aeTH+WK/Lf1/hpnVSV:SHCT3D/FYBCJifB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 2548 msedge.exe 2548 msedge.exe 2624 identity_helper.exe 2624 identity_helper.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 620 2548 msedge.exe 84 PID 2548 wrote to memory of 620 2548 msedge.exe 84 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 1860 2548 msedge.exe 85 PID 2548 wrote to memory of 4192 2548 msedge.exe 86 PID 2548 wrote to memory of 4192 2548 msedge.exe 86 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87 PID 2548 wrote to memory of 4908 2548 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf74955900187c2c01736c9919c56ca5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffe661546f8,0x7ffe66154708,0x7ffe661547182⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3316 /prefetch:82⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6662467241206134090,4446402832833355222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD59ce8ed6a2dcde2e10d69302d25f90e18
SHA13471bb6cbd15138d0dc17642da1d7e3fa0140aaa
SHA25690238f64f341ec86d4d39d741cf0d2b7363e5eb12ceeb2da0a7f51040bb93ba7
SHA512867070fb25356031e5e1a8b9e1f107675897e00d39ec5cbc8f0067250f24d3b854ff7887b3c73e8b5bfa7cd7bbf342ab0dfab1ba8f990e1511e2a67b2f0ba1f4
-
Filesize
2KB
MD5ce97a775087d3d1b6bb1811243f7bd2b
SHA1d28a0cf019e0a6e5fbb25b481b3cc0619739ffe7
SHA2561d1b6635b3a4e2bd712ea3775909878e0248085b1585132305858e73b47131a9
SHA512d768bdb80fd321a6c6f34b0ac7dbfbaf76a9519895d8d021fc62af2007ac25a0a0f72b00c22a6a3b96f934e8cde6ad8f58f9e25039abbafec139296291822a0d
-
Filesize
2KB
MD5d0a0b04587fe0b79c8aa3469728adae8
SHA17d4247533a2f816148d5abf8791aded26f247cf0
SHA256d55c8c31b4af726c7e7efa926b02b6dab3122a37a0560b5bc4b515299b42f261
SHA5128a26e1fc891f2a0631f21298ae244263c64fc6ff33f968bf7334def9871b07d778cf7d02009687a24ed1c95a2c329eeff586cb954a9e3de51aae3d75a39dca7c
-
Filesize
5KB
MD52e3b756c887f62015f69ad2816419f19
SHA12bf8e36e474107f7e70205272ae6b6093910f146
SHA256c51ee11ab12d04ff9d09b88dc7cd7360a101dd37e9e56fcb7c9ec1931a0809f0
SHA5124e7521fc4a4121215058ee32db1676eebd4deb3510ec9eaa508530246162501bfe2beee7acc6faf7d2d85b4e01b07cee2579a09638e189c6d11514bacb4d8c7a
-
Filesize
7KB
MD5e852b436951dc770d9362d0174b87ab6
SHA10d0b602fb26fce7b43ef120a38aed92eefe238ac
SHA256626a125a3ef2c7e9c9f07a93bf92e561a6a4b6bf6f318837051731c180a4ed8b
SHA51244e18960fccdc953f9b639e4a60e0e42e024d9e7d29b86092d5e91aaa87503f15be71aa3db2b53a9e67bc9294c4eee0fe6ed792bdbc454d83386357dacfc85e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57c641f4dce94634f0d8e01b23f8f79ed
SHA1e9b187c4f36e7e61202663ab6a8517a4c8a4aba2
SHA25639646065c003b9145bf59703cd061713616f313dc3cbb7b16437f961e50a1d2f
SHA512c9035a7d1e3c3767541fc0f7631ef22cdaf3dcaa69ffc776b46b8f0e718842da7c219ca3dd707ac57a9e8e74b7175c88e11973ab7f250502c1632e126139a563