Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
ddc758ab0b6ad498ff9da1962d07b874_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddc758ab0b6ad498ff9da1962d07b874_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddc758ab0b6ad498ff9da1962d07b874_JaffaCakes118.html
-
Size
175KB
-
MD5
ddc758ab0b6ad498ff9da1962d07b874
-
SHA1
a42553455c56501fbe0f2ff756326dba6779d2ae
-
SHA256
1b425a0ecd580d97fd385f89b93d98b3fc205f291758e118a326d2b6285b2c34
-
SHA512
cc55fb7e9d95b5a113c74c7d9d30cdcc8c31256597550ae9a220f8c33cad9f4622c61395f987330726730814cdd353c785e82034af255b6d7fd46a9ac8b78439
-
SSDEEP
1536:Sqt58hd8Wu8pI8Cd8hd8dQg0H//3oS3dGNkFoYfBCJisZ+aeTH+WK/Lf1/hmnVSV:SOoT3d/FNBCJiNm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 1440 msedge.exe 1440 msedge.exe 5036 identity_helper.exe 5036 identity_helper.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 4872 1440 msedge.exe 83 PID 1440 wrote to memory of 4872 1440 msedge.exe 83 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2692 1440 msedge.exe 84 PID 1440 wrote to memory of 2152 1440 msedge.exe 85 PID 1440 wrote to memory of 2152 1440 msedge.exe 85 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86 PID 1440 wrote to memory of 5052 1440 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ddc758ab0b6ad498ff9da1962d07b874_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e39c46f8,0x7ff9e39c4708,0x7ff9e39c47182⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7752890952799448333,9957451375116081888,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD507d7a017dfd241321d3f546051e85b44
SHA1df30e620eef67650ebdac6a9ddbc5ec3da6ceb25
SHA256f061dc26f1ba4176e1475121c93344797bdf1bca712a122f5693b12485b401bd
SHA512c260bf0a39ea8e7af16b6a0e764b3708ccd6ce3590588d1928455c858603046baa34d7be974e84f819398b97cacc535adde40119fbaca35b21c89733b623674c
-
Filesize
2KB
MD59f8108a383cd07fc0603839324b565ea
SHA1e0d0aa01e8c6ec34d3903e14ee5d04f8fa4ac66d
SHA256c78d7f943f239c1e036472955f404b26764118fecc90dcc6edbd30b6b36dd827
SHA51233c29189d0c22e96c9b62facdf1cde8ea271a6bce79ca8dd21368f8680cf50baa8af09c0926d1340e55e2f641efb430aac165916faaeac9ad2d37d683f2e4989
-
Filesize
2KB
MD525326618ae39a81240890c1edd017033
SHA1606c953406e7dc460ad2c9f4a48beb90ff8ed730
SHA256d9cbd4de3787d8579a29fc6a6f13e971e51f201be61bb952bcb499a8428a843a
SHA5122dd71a12c0925d934bf1b63d5ba715b5b922fd4a46fd7db9052a81b9167c900bc15ceac0ad630c51b90ddaede500f933966b70f4632da5ea1d587de6d1b92aca
-
Filesize
7KB
MD52e717d9333ce47607697c2ea59b4f54f
SHA1879bd15096b516af0b5afd44132ca9d5ed50d539
SHA256fc46d868e720158084afec628b90bc4f5142c6a85aab808e6d94fd52bbe11588
SHA512128e39596056faf14930227e2ccefb963f36252bed015123a01edfe847b9c90f89352616eacf213fb27f94ab2321477e5a573d78e7ab31a1e40442b18137f969
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cefac6cc-731c-4b3a-8d98-56ecb0de3dd3.tmp
Filesize5KB
MD5c8f87b907b78cd69b6f5d020150f2315
SHA1798fc1a7f5f61a2cb8dc2189fa629121fd0caf7b
SHA25614d03730b2045625022dff01f72c273e2b76f7bfc9e9f1f0e6a01a6f3423ade3
SHA51274cbdf18e2400c113babf04248dba54c851a252d3bb026c09054a3da8aa9cbdd3e608adb6c6b5e16d2ce2b62e47e7753367f87939934e606464051965c1256f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59fecb3e0e626156956e9361187d19ed6
SHA1534afc5df2ecaddc68a174c4d7cfe3bca139baec
SHA256aaca08d8e82a46fa7e1d09deec31f2c989778d35ee2cb836883e692df52db6e9
SHA512cbec0127c6770048cfd0518e4cad90854ad0ef730d47957428978812334e2fd23d207228b8ee996bf3e05fd4787144ab5e6707894078ed3fd7247ec246d2009f