Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
3226235e0c84a46bd6ea25b71fbfba07_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3226235e0c84a46bd6ea25b71fbfba07_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3226235e0c84a46bd6ea25b71fbfba07_JaffaCakes118.html
-
Size
300KB
-
MD5
3226235e0c84a46bd6ea25b71fbfba07
-
SHA1
d7f6701e9b82c6f013cfbdddfb7b8b41e977492a
-
SHA256
d4a8165181615bdaa388a05b776678224ec02509a01e7689c95c4b62ebf912a4
-
SHA512
f8852e1e6987ba069479b970f17e2afb60b1ad55c8f442b06dfbc72cb36679d57fdc07733e670f58d0b1acbead7fff0b84109887616155e0af4245ec396177d9
-
SSDEEP
1536:WsHaD+SbTTF1SjTfPqE3NkltM/jVII3IbIre0wZRmx6ocUJLnv0ue4XMc3U9dE6a:Q+SbTTFk3ItCVI2Be6cwiTCH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 860 msedge.exe 860 msedge.exe 3924 identity_helper.exe 3924 identity_helper.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 4716 860 msedge.exe 82 PID 860 wrote to memory of 4716 860 msedge.exe 82 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 3184 860 msedge.exe 83 PID 860 wrote to memory of 4512 860 msedge.exe 84 PID 860 wrote to memory of 4512 860 msedge.exe 84 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85 PID 860 wrote to memory of 3332 860 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3226235e0c84a46bd6ea25b71fbfba07_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdaee446f8,0x7ffdaee44708,0x7ffdaee447182⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,522315131240744503,8729138492730618617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD50eb30fe8bd71bb08a1dc36c516b01870
SHA13fb2af9eaca39f8984603ca673995294e8b219ba
SHA256a139a7a8d953c2fe46ab5f9e33a5e668c23cb0bb8d7f38f542b2b918f5438a82
SHA51235169d505cdd7ee1de0611ba3e8ac9b323451ac5b046945bcbcafd57662fe92b457d24169cd113318018497c388eed2196bfb0098710ae02cc7bca06b9fa2db4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD520e9982bea3f81a9f3d52d5e6a75ea99
SHA184834951be9863df545b20a1c2f6339d23558f14
SHA25659e1bf0061b358c3b0358017d9feefa52f740cd3d584144eb4758d5d13a3822e
SHA51298c2277502a88a9467ff1ac6dbc40965d53d3c858ee8107e2b48569e5579d0387dd9e3adb158fe9f891accbdd5235c4ec4b38da57e1b64b6760a160225687132
-
Filesize
1KB
MD519a95069763e88976e7562dca081daa1
SHA142234052cb24d711e1e711b1a398f2261c18294e
SHA2561174b213710788973d81b28d98c203eb30255d63ec40012f90271da3ccd22097
SHA512792e7bc115b3c609efdf23adae703cb64b86d77a72f3db062d9eeaa250c0aa207e0d29caeb9a410bf0162d301ed84f2f243c738704bef28f0d6a668e10271862
-
Filesize
6KB
MD5ded2e502b69adf83228f06a736c41850
SHA1350aad9e2ab11781dd743580846d604e28ee7974
SHA256d59fd6ece68a1fd28b4edb64c3a1272380727b230f67fc0df85303e3d067c11e
SHA5125153534ecfffc5e04177598801e375e6850d8e471801c2681b54355b49ed7207ba81fa45e125d955ffce8819769f0923a2f0fab3c55bdb9d94af0c905df9d9ee
-
Filesize
6KB
MD5f2b4f79556c0a02343685877dad42c10
SHA16afece43a9b9a4c65d4d0f3435c72f3d48349c99
SHA256c4027e15d33e0d8ab06644300f51010242390bb95df73b41935835515cf2da89
SHA512591619a87cdef852bb85c4dcf6141daf175eb99b789387ed9218b548da6930162d13796a3060aa68174536a4c23dd51bd670fd54a725b7e395dfc98ae239416d
-
Filesize
7KB
MD5749c96aec31822ac84cd4ccb1a548cf5
SHA1b95473d82a0e1007aaeb7a03b75588ac67dd5c98
SHA2567c50dd20833e842f351b81625b1482e3b6f7f61fdf586b4ff8365e2654f4500b
SHA512db2d0d1d0c33f640e71793b7613553015fe4f4c6a29c8e8ecd756a6857b7206e4bcc650e6611ff1e79aea3822295207c691c9e85e0d9f5c57c2ee05d652bff32
-
Filesize
7KB
MD5441aa3c87ab924d989730b3d8e682cf6
SHA1087a9b6e07032b69c062435de910bd24f04acd7b
SHA2564a774d6833e662ee7553e15aa5f4cb6a726d3b1367e4380b23fee392f7a50a1d
SHA5120afb905791ced8431119a60441acda15cdc48108166df3d0d1ee544959c501c25cf370a5ef985c935e78e955d62e2d2f705675a634a70cb7f14955ab5d14412a
-
Filesize
704B
MD5a1f624e86faadddd426e273ea1fd48ee
SHA17f993b54796225e09ab09ad6de88c4ff1bd69c5f
SHA256d2b1c9f92de374191405352b847477f1fd7299351ea3f7172d08d974d69427de
SHA512a87d308e8620349241ab6906896135d42d15547cd26ce1068666acc638688bf1e51bf2aebcdfb8ea358f6711963289829b0151e0aa6ee0e97ff3f56353e1ac25
-
Filesize
203B
MD5aa16338ef185ea4ad922370ec3fddf36
SHA1d3b96feb876e0871ad82b40a0246cb06a5de0685
SHA256300103ad3da286c07872147fc0cd622612497be611feaf376d5011a0422ff7e5
SHA51247bfc8ce8e18316656031d0ecbdd371a8cd674bc4dbc90e5884e8d24b7bb0f1111763cea321d4cb2fa059dccc234c0a3f55afff689c30be68034fb113bb43d23
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c1719b725b0e6df4228e944f70c26321
SHA1dfdaa66ce32c46fab60c5c6cfa5a42237d4106da
SHA256b645dc877897570ec917c5e19136a83aa307e8ee5c60fc6fdfdaaaff0234bb73
SHA5129cd024713652604f50e109e5767abe8c9c15ffaa5b76914deeb37e197d503b83e3fa7046fac2ef3f95ebe49946c3e42e4d56e05e818210dad30ad6ef6f938a40