Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
4c0cb12b49cdae427d2c297733fd897a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c0cb12b49cdae427d2c297733fd897a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c0cb12b49cdae427d2c297733fd897a_JaffaCakes118.html
-
Size
42KB
-
MD5
4c0cb12b49cdae427d2c297733fd897a
-
SHA1
77796892023e433c8c18024938e3b1d6d4ec4c98
-
SHA256
71d610cf563be1781db26685700a729f70ca4d1bdf599f563d38035d7df28559
-
SHA512
ac46311c34bbebb07f6745b997369d77c360f2e811f5515c24ca364b58e368a833fc3c139da6dc5b625cae5ae3c00f81df80c46ba2d9378adffa5bf0499b067e
-
SSDEEP
768:PFxT0EipBRVCqFAnWvAriIQx1VGTA46LU5kW2UP4AEP:LTupBRVC7nGGiIQx17o5k5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 3632 msedge.exe 3632 msedge.exe 328 identity_helper.exe 328 identity_helper.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4224 3632 msedge.exe 82 PID 3632 wrote to memory of 4224 3632 msedge.exe 82 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 2360 3632 msedge.exe 83 PID 3632 wrote to memory of 1012 3632 msedge.exe 84 PID 3632 wrote to memory of 1012 3632 msedge.exe 84 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85 PID 3632 wrote to memory of 1568 3632 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c0cb12b49cdae427d2c297733fd897a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047182⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12706422069446020933,17262659167269603264,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5fd38d8e7a23617621cb8d64d2e9ba9b1
SHA111f814281f819e901b522f8499f6053b1d37d219
SHA256deb825e2b141c403b336f89a3a40542dc66b59aae96b97b48f8b467c85fadb7a
SHA51234d207fbbc4d37023a5cf3bf499667d15b9b4d71f923554072bc6d496bb2852364596a01316aeef3e389142d5aec655be3ab3958b344898aaf8a00e7df48419b
-
Filesize
1KB
MD513bbab25a3fc953ac65755a5bd5c6705
SHA1d96e3d21aaf834118b4cc7c8991a5851acd3e746
SHA256e3ee2f6f1f8eccb2c9397c67b318dcb12efd0ad2da3507c16f498f4c0a83f6ad
SHA512c6f57cb7ebf912a4dfe4c0d320192e2b5daa0a4c3312e51099b7473a4e9dfefffb95a340e5f0cf5648cc34debfabf69298ab351f61c64c0b1d7a81f49a43859c
-
Filesize
5KB
MD5d01ded343f77a9cac12a24545321bd25
SHA1234c71694575893879311508721c3e5390d1ace1
SHA25672d1380e1b33ded125bdac9b740a7eb439e42b5908617885a6af45baab32cb81
SHA51259256b7c98db8bdf256e2a614f1479439c4a454223af21f9957617acdd01a239dc84d1e51b75cfc22e226dabca650439518a3c1b9e99bb8677d4aaeb03aabfe2
-
Filesize
6KB
MD55ae87a27148d64c55f54dc879909d50a
SHA1322784bb43e0d253865a147504fc1687babc6925
SHA2566312529662b93dcc4eca2401fcb0a68e87d6619effbf1144626d63e5bf6fb08c
SHA5125f2601c1578f4e14173faa72dd5b44b1b1dce0f2e1898ad2aa61599eabec832c64e63bf686fe30956e21eeae8e0c5b2172b686c984daec400577030723081c09
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD54c619d0568af21a655b34909c7922f37
SHA1999d93d6a3c5cbc4b58db176dc9442fceeb5f8b9
SHA256d83b7691c5d8b9db384deed6428c5a324d4347c120a145fb79662b64cff9aa02
SHA5120d12288a336733c7fe28eeb9531aa8e2200e52b47da3e8df84e5cac1e80bf12dcf332b6020ddc3f9430ec9bca9a05c2053cf41d32586321825074bee0844169e