Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
676ef72ec9b85ac322f9848739be7792_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
676ef72ec9b85ac322f9848739be7792_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
676ef72ec9b85ac322f9848739be7792_JaffaCakes118.html
-
Size
87KB
-
MD5
676ef72ec9b85ac322f9848739be7792
-
SHA1
8dcdb912af5a9793cc42a5c5797aae9ee1f1922a
-
SHA256
cbcb07f612d32f81605f181c6d601c3498582c1246f8af0bb276db5af00c1b98
-
SHA512
4b98c3a73b028fd7c2b0b427e07f4ec1d01e2e5461e69a195f2ecc750abbe20f21513514941a2031a97973a8c33b644efd60c9a0a029e6ddf4bccf4a14f9d0f5
-
SSDEEP
1536:FEKpfNJjhloYycMH2zI0RRYgPlsxmhh47WMZdKJjJFGvFSwVCqJiQvpKtAKi+j5x:K9hH2zISRYgPl0mhh4IOiqJiQvpKairX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4436 msedge.exe 4436 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 4268 4436 msedge.exe 82 PID 4436 wrote to memory of 4268 4436 msedge.exe 82 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 752 4436 msedge.exe 83 PID 4436 wrote to memory of 4424 4436 msedge.exe 84 PID 4436 wrote to memory of 4424 4436 msedge.exe 84 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85 PID 4436 wrote to memory of 840 4436 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\676ef72ec9b85ac322f9848739be7792_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0aba46f8,0x7fff0aba4708,0x7fff0aba47182⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1860 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12009963800236398113,4456249334264882971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5d35f42357429852e4d86a110afcdd16e
SHA1f6ac414bc6ffc699a28ca2a5e3a00c64018d63d1
SHA256a3e5b3dd99d70a79e8410d848bb5fe972323d6f57d74707fbd7b0a7d6c4ae951
SHA512b01c518de5a9f8c8585535f637e8187f484ab8950543b0d2b09000fb2e685ee28a53836c07e1e6e3366145c8468e191be58cb7f9b28a0e2adbd6249165777c45
-
Filesize
1KB
MD55eec632c140f406f8688ab18d111a816
SHA1e43bad87be1ddfc5bbb0ffb2318f7c20e4db0c82
SHA25615a3e65c136420f9a13c82a8da453c6176f2f21807c92a5c8992dc6a568ca362
SHA512e7727083c5f1de33d2971ce42c2543a94fd3463e08ab59f82f09b0812fa92c8cc868d45534c27fe00688e8fd4fe32b12dca7e35fef63a4dcf94ad6cf914c5936
-
Filesize
1KB
MD5e9e172ae2aa6227c0ca2130469e23c01
SHA1d9140694604001c8f1caeaa727abd0849e04a7fb
SHA256776548c7d4155363235d52c38c1029af06399fd54ae3bffba6010a43c63f8f8b
SHA5129f1b71b18308793b86fc603012bd7d28cef74165343f1b99e2a39ca9aeb052d0397fc9b47a030bf17ec539d8b7b87751f483692a19d00dae0f4385d87717ed52
-
Filesize
5KB
MD5497fa81a5993fe3ab3c73f4587e5d008
SHA1a02fd7b25a41ff63f381785ae05247caba608fbb
SHA256bc0a1e8233d73241ce7d7992f79c32c18a07b26f184ef1e643a07f0010e67866
SHA512a980a7cfde5938c807748c6b6982dbbdab31cd2f56789f2b89cb8f8833b137b2ecfebbedccba2a6b95e063ec9c08fc2e16483b7bd14a750cd34d0d3e5aa52d6d
-
Filesize
6KB
MD5bd613c0d60c41a90b04ffa7980685bca
SHA17faa387d8c1cfc7ff610676437e92bb70a73bfc6
SHA2565fe06cfe39e3a9a19b7e612afa2c1032ff59809bf536d5049c17751a69ce63f7
SHA51228afede2a575e710793ca7091965f5e127fb744ac62307b1d6d8cb3ec25d9cae98ecdce75a97d187010c04096276c6873733b8e50c22e9dd723b074f7bddb9b6
-
Filesize
6KB
MD5162b1964811fe6a4c7ade80febb4c3b1
SHA14f71d87ad7ae27516731863d4641e821a4900f5b
SHA25631916d4482fcd99f8e6f25480d17847389112b24679f307653d751e9543c6751
SHA512b6514f4117e78487b0277b4a40dd22ca2a00d8e3afea35ec953194d745d1853a105caa10e9921d6643896d2188eef588506e425ab8c3c723241ff56eab6e67ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD587cc43f98c653a271a5df869e8575b09
SHA114341d14638862acda7b86b9056187777227d4ad
SHA25690ac5a713d6e69aa1e7d106b20c956003b654bdf912e63e8ec9b20c249f408bd
SHA51242cb9bdf9c37bdfc7b9d7e7690b68a95b78bfc74db64df33f9d938e8768e8b14c5179fb08aa1a241047543d6db55a2a11e780e17a4b831d217c5a887c569bd51