Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
37d7b68c0eb103ab0fd8cf99390fe6f6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
37d7b68c0eb103ab0fd8cf99390fe6f6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37d7b68c0eb103ab0fd8cf99390fe6f6_JaffaCakes118.html
-
Size
73KB
-
MD5
37d7b68c0eb103ab0fd8cf99390fe6f6
-
SHA1
729730e65444de119d8a7b13546ffab2742d0532
-
SHA256
15710b49802a2e6622e1fa49b6bbcf6205d3a927b9b79c1b0500e0d858b94307
-
SHA512
d3085549f9e8d8f5c5ddc63b2baa357ad95c4602e5f3f99077fa85fcd6b600c1169167bd412f425b976a144d25528f628ae4ff6d0bac99d09d76729a4f6c6887
-
SSDEEP
768:nMwl8hYKUvt73O2kLvBiW20O9dvQg/jQofOkXLmO5ZGGbM+291q:nnSyKUJO1LJiuODvQqOqbM4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1032 msedge.exe 1032 msedge.exe 1284 identity_helper.exe 1284 identity_helper.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 880 1032 msedge.exe 81 PID 1032 wrote to memory of 880 1032 msedge.exe 81 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 800 1032 msedge.exe 82 PID 1032 wrote to memory of 1660 1032 msedge.exe 83 PID 1032 wrote to memory of 1660 1032 msedge.exe 83 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84 PID 1032 wrote to memory of 3028 1032 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37d7b68c0eb103ab0fd8cf99390fe6f6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a8746f8,0x7fff5a874708,0x7fff5a8747182⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2460 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2304 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,262411374780698997,16654281615250684680,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD506f1032ab0bef7988c5f0c9735c42716
SHA109376c81c4a4969ea041f044e767408ce7380cfe
SHA256f7968e7ae22b9a9b9ce433cbaee230c7518f0515d14b75896c3d8e165f75efce
SHA512c9c1c7368082c607f7f24df9f1cd6251a902350d7e51cf76af9ac707c3dc5a1c543e3ca1742413b505415892a28f199d76eb6177e07c82422a03dc75f0d129cf
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5607423ea424140fb0b3275ea6f0bc04c
SHA117ebed64306e2982a2b680498ebb396d350b9f9b
SHA256acfbf699f7ea03f969eb251d22d72cbe7a5130a99f3a0c28bef1f280bf033be9
SHA51231d81697763982e31005fc8c6e1e58bdb598e940a3bf4fff0ca619475dfc1ce3c043d986223f1327d62d08bde5540cac0525d271684f020ae02be1f621398153
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5852d1c45a1ff7143576687dc80893a81
SHA14f2f5233bc3cbd67789d55f3736c447cb9460c81
SHA25644c04bfaffc6d0c2fb7f572404c59951d22b090f47b44cedc2b5a1a0ae50953b
SHA512fc734bc841ca1aa5280c94ab8e6a94618a8f4c04f7a6058e4530c3c1f69732ba4fd1c6d25945d1bfa95a5b6c10af3249377a3b0b182d03059907f9673d79e0c2
-
Filesize
1KB
MD5e402b2edddf2dbf3e3ee13e248b901ac
SHA11bf40057b6abc9607b9585079d88cf455b746ed6
SHA2567151762215eafe002ec2efc31f2273275bdb485eaa7e269270867b609b6da8dc
SHA512c30c5b1d4c1dcd050f6c328401b10b1f8f985bdce4dbbb4fd8a50a5dac3e679358ffbc666f5c0a57662183d89367786e1a6588ac11a1ab06069c8a5703f5abc4
-
Filesize
6KB
MD50e32ebf0186317fad2093845b30c753f
SHA14952d8a41af225be9068192b08a34dd15909be8b
SHA256354cd4eac954d56370df87d3217dba53879eeb28e8d9fefad928ef2c0788a401
SHA5123aac03ca472c21fef93b2ec5f4d72d0498e86f600b8e49f55c0f5ded02993955810d5fe5ad7617a56e993d79056499b348d26454615ebf8ecaedec30268671f0
-
Filesize
6KB
MD558a9bfd8697a0dfe86e6b4d1045c4259
SHA18ee114b209d9138d4d7af5bedd5b8d503f41590b
SHA2562359fd5a968b3b0dcf2bbd31a56bac809d1a9a90ce18d83f197e30c00562883d
SHA5128655586723fae35db4979676eed6a0c9fd89bc44da92f44bdc9cb62dbe4f14cf823f1ec76a8fc45143d937aa1a28a6a0973a759b2ee35264bcc4b88813b81401
-
Filesize
7KB
MD54e2c365e169a430adfa2994166940e33
SHA12a22de7787a367521c1383a7503cfc8326d734e4
SHA256f35543ccc809ff1393f5afed7901c48e5d6f3d16bbdf8cffb9b17f83b14b3ab0
SHA512d797562d41fea8fbb71ba7db5c32e9b938148485c1086bbda6cbaefaace456e55e43c4f17a069e62c908100ae431ab904557fb500cddc4471daa369c1ff9157b
-
Filesize
7KB
MD50448e8f1c6de94c6dda4aef24ede2c58
SHA1d563be22b8b6b4acaae5db3dcc7c1b63a01720ea
SHA256621afa7b35a12bbc29cfd0752d5460be2e1ce31e1b680251d21a78f6bb3f948e
SHA512277b18c410482b92e1c5ef526679defa49a46d5ff5b8f866c85f2851c81b491a517ed3346104d4cd7d4c431fb6fc3f16afbc945f0a9e7ab0aeb8bbe4d590af31
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389