Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
c11f59f53598cfe7ee71216e888dbb53_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c11f59f53598cfe7ee71216e888dbb53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c11f59f53598cfe7ee71216e888dbb53_JaffaCakes118.html
-
Size
175KB
-
MD5
c11f59f53598cfe7ee71216e888dbb53
-
SHA1
59b2f0372b14b85f7167f3d52b545af0c2546e75
-
SHA256
f712c5379187171e46e36bf47d5ce79d24a96be0b3c5d99b82e9a4e2fa368a87
-
SHA512
34c1e0b64bc85db788c899fbbaeb59c26cd26bd74fc086bf25060f406ff1e7a3383731a4655710d99fcc0bdc2ddd3f7a0ca29dd5b8482153521c067723b85a69
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS30GNkFfYfBCJis0+aeTH+WK/Lf1/hmnVSV:SOoT30/F+BCJiCm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 3348 msedge.exe 3348 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3348 wrote to memory of 3612 3348 msedge.exe 84 PID 3348 wrote to memory of 3612 3348 msedge.exe 84 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 4220 3348 msedge.exe 85 PID 3348 wrote to memory of 1596 3348 msedge.exe 86 PID 3348 wrote to memory of 1596 3348 msedge.exe 86 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87 PID 3348 wrote to memory of 4564 3348 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c11f59f53598cfe7ee71216e888dbb53_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90e9546f8,0x7ff90e954708,0x7ff90e9547182⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12842317289069950388,14219278640879304140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5cc0a22ce7780a993d14d8e1c982fc4f2
SHA12d5913354d04d69bcd4ed6043b7b976dc9b655e6
SHA256de9f8076a27c0bdd86b29cbd65ff9de8d2bf7fb817acf21329ed3ee604f764d5
SHA5128e796ef578418e9fb29b881d84e3bfa6d1c105deb6d0f9eb5411bc41224c923391e3384efa17335e568555c475871dd8c96c49882517ac3406ec099f867f5240
-
Filesize
2KB
MD59f35ea9b08df72f017f0521ae760418a
SHA15aa06469b4a0aab2843cd958bcdeb6eed1d046fe
SHA2568ecdc2ed126028618f6cae669e68caa0e87806ba796456b3eddecd0d6a1c8e8a
SHA512219b71043605d76df1e893bc06edb2d0dd5716f6ebaace79d90acf43c311b4c582d8bda41ed7785c3b910c45d14dd1304e18aa114c45e26541c7944fd90af5e6
-
Filesize
2KB
MD5cb9bdc6f9ca01c66b1af14d460ae60e4
SHA1713affcf38f903932789ad1f787360d2d333dd85
SHA256ed39c2122caf82d00526067e118fbd86bf7cb3b6f232f29083be1b0f5b5316e9
SHA5123928b34356d071c9f6a3285d1143137a91e621865b59687683474f0dfdd818e023454d4b93cbf3ccf0a08c86e7928dd1bd4c5e8b2e98146d08ee60c05dbec060
-
Filesize
5KB
MD5dfef6c9ef44fa64606c1c0c1a8db4ff4
SHA11761673015f3b080bbf83580e300ba8701dd83e5
SHA2565edf85e68265ef856f95be82c479bf657ec55bcf189f04ff2a1781cfccb490c2
SHA51296452ee5bf7f21a27e1df5bdc6e23ce0bac2b2392af6dc864710819bacd9a171f220f19dd70e880e4e489130cc64ba11796bd24119ecbadbf321b66aa5d278ab
-
Filesize
7KB
MD5f1a6cb5dbd0cae615d1186593d713445
SHA1a2e12712759c1601ad228b1dbea18a1eec65400f
SHA2566b2cbfd9c4b675047b5959197e9805fc88cf638d113d04970dd70f5047cc5365
SHA51207b5c431fdabd031ad0fea76721a9a81e0ae4450367884644fdb10ecdd7ddc9e277b59a6dff9e0c0176914f9aff5d60cb25cc37e045b1ec3b71afb9ba66aef77
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f5a15002b769da544fd7df7036aea65d
SHA1e55d48b78a99516f1dcc1773c3bcdd6433b65368
SHA25604eeeda50cd99b1822189c8a07806cdaa19e0ab089b300ba29ac20dcdf6debff
SHA512a38b01942c87b44c9b2b38873b78cfa68cf2f5cfd3643414d3947a8df0d0e34695a57a98979d74ab9a8209b7681d1068ef0e0d9f69b40c2c1ad1be13d9cd082b