Overview
overview
10Static
static
10quarantine...K.html
windows7-x64
3quarantine...K.html
windows10-2004-x64
3quarantine...C.html
windows7-x64
3quarantine...C.html
windows10-2004-x64
3quarantine...24.exe
windows7-x64
4quarantine...24.exe
windows10-2004-x64
5Click To Run.bat
windows7-x64
1Click To Run.bat
windows10-2004-x64
3setup.exe
windows7-x64
1setup.exe
windows10-2004-x64
7quarantine/ht.exe
windows7-x64
10quarantine/ht.exe
windows10-2004-x64
10quarantine...Yj.exe
windows7-x64
10quarantine...Yj.exe
windows10-2004-x64
10quarantine/pic5.exe
windows7-x64
6quarantine/pic5.exe
windows10-2004-x64
6quarantine/random.exe
windows7-x64
quarantine/random.exe
windows10-2004-x64
quarantine..._2.exe
windows7-x64
3quarantine..._2.exe
windows10-2004-x64
3quarantine..._3.exe
windows7-x64
10quarantine..._3.exe
windows10-2004-x64
10quarantine....0.exe
windows7-x64
10quarantine....0.exe
windows10-2004-x64
10quarantine...r.html
windows7-x64
3quarantine...r.html
windows10-2004-x64
3quarantine...g.html
windows7-x64
3quarantine...g.html
windows10-2004-x64
3quarantine...t.html
windows7-x64
3quarantine...t.html
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 19:45
Behavioral task
behavioral1
Sample
quarantine/BSFiC9K.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
quarantine/BSFiC9K.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/ORaMflC.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
quarantine/ORaMflC.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/Setup_2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
quarantine/Setup_2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Click To Run.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Click To Run.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
setup.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/ht.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
quarantine/ht.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/m5UP2Yj.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
quarantine/m5UP2Yj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/pic5.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/pic5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/random.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/random_2.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
quarantine/random_2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/random_3.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
quarantine/random_3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/rh_0.8.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
quarantine/rh_0.8.0.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/sgu7U1r.html
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
quarantine/sgu7U1r.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/xB2HL9g.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/xB2HL9g.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/xclient.html
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
quarantine/xclient.html
Resource
win10v2004-20250217-en
General
-
Target
quarantine/xclient.html
-
Size
6KB
-
MD5
307dca9c775906b8de45869cabe98fcd
-
SHA1
2b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
-
SHA256
8437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
-
SHA512
80c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
SSDEEP
96:k2J/SNi/FLQVTLKCGWz5ln59Jy0jRdoMVZTdI5:k2pV2RKCxDnxyTMVZT0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 620 msedge.exe 620 msedge.exe 4672 identity_helper.exe 4672 identity_helper.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 620 wrote to memory of 628 620 msedge.exe 85 PID 620 wrote to memory of 628 620 msedge.exe 85 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 4780 620 msedge.exe 86 PID 620 wrote to memory of 3128 620 msedge.exe 87 PID 620 wrote to memory of 3128 620 msedge.exe 87 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88 PID 620 wrote to memory of 4048 620 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\quarantine\xclient.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf6da46f8,0x7ffcf6da4708,0x7ffcf6da47182⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10922347629268040452,12348395871036449030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
505B
MD50233f3e13f4305f1775b34d5c9c624d2
SHA10089d9dee2866bf125100663e1f6b2a54f6e934b
SHA256b01ebb487ca6d318d51aa3885ac005f67016ab58372e61fa0237693eadefd700
SHA512826e9c751e95a3ceed0363d686773e488d781393d9a2c137649cb2499a6e25e072b175a157dd6edd8671515e378e431299cc52df3942adb12ad6c3b57cfe9706
-
Filesize
6KB
MD5e1c2c8ecdb15f83971c942aa9fd81878
SHA138276d30ee3524f308a4fae3a196af3a4018ae17
SHA256819389192e37450f26c1912e14557f01f273e377f6e3685faa9331e4832ee76d
SHA5126912ce1751459b2ad85b32508ad41209ec7135adf18a6b052f5ace5b176468e0e10448958f0973073811aedbc4e0a0dfaf7f0e99af77c17f4b14516799909627
-
Filesize
6KB
MD50497695d75841dfdc1f13dabe2adfb92
SHA1fe7ca75d2321a7ac24a86335c9a187089e9c0e9b
SHA256255f01e744303ae550cd16ff1406607d28809af2c3e794f6365fb9c0c8559ef0
SHA512dd933bc3778cda8542168d13ba7d5150771b6ebb0600c1dc8ee98a55d132456b562366ca2eed57715884247ddbdcf0bc850f00b177ea603e0a8b098b7dcd9e0a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5396274350854fa6cc341981637b5ddd5
SHA121a07395af83a78ebf7fff45acfe2ebbf871b838
SHA256b9caa829c36046ebf2cfd16b35fa6d562e9bc2877dad61d4b9eef11485ae7efd
SHA512968c1dae933e650f1f10b6f28ece8e6a966d97857f6993d5f7168c3a91cc1e342f2f35e6bb9bf70bdfe27d803a1091d4fda970bbdeee007a2af1fe995cb7ebcc