Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
2a0ab9be2cb0655e9cee88ed115cfb3b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2a0ab9be2cb0655e9cee88ed115cfb3b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a0ab9be2cb0655e9cee88ed115cfb3b_JaffaCakes118.html
-
Size
53KB
-
MD5
2a0ab9be2cb0655e9cee88ed115cfb3b
-
SHA1
6de8cc015f85761fe0c6f8dd39e6793bd5a84b54
-
SHA256
c27cbc99aefb6815cd0dc7b52594500b236b65b2d0d349674f7f65ff7a5a8c76
-
SHA512
ca4be3cd29d6e1956f3f1a88450a1bd1b5eb8a0585bebbf693f4697d80b54c089e2486533a3dad5abb1f252fcba41ddf9404a35bcf25f9da970c188a83a29aba
-
SSDEEP
768:vPZ5T0EipB5ycVhHHxp3TkdfhHtQ0d04F2WSv7tmc0qFY2S8mDkY:p5TupB5ycVhHRp3TUpHtQ0d0bPw+FZY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3792 msedge.exe 3792 msedge.exe 3672 identity_helper.exe 3672 identity_helper.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3192 3792 msedge.exe 81 PID 3792 wrote to memory of 3192 3792 msedge.exe 81 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 2384 3792 msedge.exe 83 PID 3792 wrote to memory of 3712 3792 msedge.exe 84 PID 3792 wrote to memory of 3712 3792 msedge.exe 84 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85 PID 3792 wrote to memory of 864 3792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a0ab9be2cb0655e9cee88ed115cfb3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc6df46f8,0x7ffdc6df4708,0x7ffdc6df47182⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1756 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,13969475518046824848,13714898669908190567,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD50445d17d9031b4f99cb100682f71cd15
SHA166e62c361f2a1268a0419ccc6a869223a85940e3
SHA25604141e136af9cf30a75fecc06a9ccf062b4074b8d784e9587b7e263cb0c2ed43
SHA512f539c41edff4b584227b3d602b7d36371d37d368e6fccc79ea4e954236ffd914da8b11877c3368ce779751cb700c55a1c6c7a1bca8140eba971b0d29c86a3e1c
-
Filesize
1KB
MD58594858dd5d1e2c1e721eef1ffc38eb5
SHA127bb295cfb93101a004b68df95cb4eb8d77d1844
SHA256706dfee2e98dfe5dc96c4194f8d792474ce501d5c88c6597ab470c7dad8aa1be
SHA5123bd0dc426e8d9952050b571420bc666af6488b6c31d2153f7ef455284d897aec357e600e447c6e66acd035450ca930c2b8a3f3ef5314b945427fe82230169228
-
Filesize
1KB
MD58a92569d9b20e48a8a423fcb52c5e1e1
SHA1496bddd5724a9f9b4aa8898cc690b88b730c05e4
SHA256267403d2c0277d41ff76b306072f9b2769457d409e49633b497929ea9c73d7e8
SHA512e01bf865e95d78083f735219803b25f7ad423e43e20b6c4168668dc183913d44cf39857df92a75bf85eb94f93789ffffb82be65b56cf729411e181dc17ec7b89
-
Filesize
6KB
MD5f154f95fa55529f9477ca55e9f1f0e9f
SHA131c0b3b873dbe2a172ffa48c9c4cf459e3083ee9
SHA2561a7d1ce4bc29540d2470ac7ee96cc8cd799b229e83784aaa447ea79bee73e43c
SHA5129f147f0e2d3a5289c1f073e4ee8d97595880d64774a238775a56e83cfc304034c61e121de911955deb7856619912e77981869c4750b851bf9ca337b4d0a1a28f
-
Filesize
6KB
MD55df947fa46eedd15706ce09be079c673
SHA19f59ad812579da7a623a308fbac87a94385e95c2
SHA256abb4982c39b467c8e4bc8f7fab0e32583f330ce4eb6aa9cc94ccda01656d8a01
SHA512a55144a6c7e635e3ab481330d49dc8d1a6dc9f2bd6efb1a2ba7db1e908be54cd4ad7bdcf4ca39aeb2467e066c96d36b141d04c4ec198d5c26ca9d20691f02a8e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b9e650d38427d6fd81e8573963e0b99b
SHA16f2d178f8dfe8516e671a33e0f80626de5cf9b2d
SHA256150971fbfc305c3c23494b9ca5fdcb6762baef2eb1af8e0f31557b1c995ec6a1
SHA5125b380a889e1ea7dd2e95dba0c78724871ddecb55b84ac777e4f6406db872bd60d17ad237cbed61edd6e933ace2753690c3026f4de9a184081df1aefb984c4c1b