Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
798f784d9b481159ab99c6b50060bbdc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
798f784d9b481159ab99c6b50060bbdc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
798f784d9b481159ab99c6b50060bbdc_JaffaCakes118.html
-
Size
57KB
-
MD5
798f784d9b481159ab99c6b50060bbdc
-
SHA1
bf62b453d00217cbc6f44c7c31e814d59c365d52
-
SHA256
86e54dcc678decfb96a1446ddf010215a81b02ac6c406c8126bf89d16d131fd4
-
SHA512
43156b683e68a867c0ba4a093007c7dead1f42329f250ce438fcfb709cbc5c5d82cd8f5959400c137a128529c850d185dbb7278b8558724900af5b1ba8a28ea4
-
SSDEEP
1536:yep9/HJ2XYRcxvcrabdYzftgJ9drnI7ZdaMtbeNOLYeMXcw:j9/HJ2XYRcxvcrabdYzftgJ9oLYeMXcw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4876 msedge.exe 4876 msedge.exe 2164 identity_helper.exe 2164 identity_helper.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4828 4876 msedge.exe 82 PID 4876 wrote to memory of 4828 4876 msedge.exe 82 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 116 4876 msedge.exe 83 PID 4876 wrote to memory of 4288 4876 msedge.exe 84 PID 4876 wrote to memory of 4288 4876 msedge.exe 84 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85 PID 4876 wrote to memory of 972 4876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\798f784d9b481159ab99c6b50060bbdc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9530103689372258538,18141901109672565616,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5587fd68e51098610c0f44b74dd640669
SHA1b115fbacca3e6815d9a351eb579a51cfaa1e846d
SHA256b0106ac66e5a9b316b54cf84e8de144f934ff89a4f2a52d6e2026aeb2864a3ce
SHA51261e111f0e585a886c31569b0f4d58741161a45ce8c6db2a661ac85529569d4b2c3bdea4f7a306606229006d6015999f7460dd3e0af0c089b09123919d80e2d2f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53214790b33d6ab70192dbeb59af60bc0
SHA1e4349d0a545ceb8a92770943c74ae9c0136ab641
SHA256401526c4e9d8d48f35262bb24e1d0e1e9d42e3701b40ee59dec95284b89c3f40
SHA5120db5c8cf352643fac3f6ddb76d2f91fdf74dc00519c91fcd448695602f0ca82552d2847a1223976d3dfeb4655b00702d07a63dbb23245049fdce5fbc9b4354f8
-
Filesize
2KB
MD5ec07b45a6996be5589d38f2c78bfd2ed
SHA181ceaedf4141da94420ec41e2795a3b01fbbcc38
SHA256f61db07f8d8661b666e54c38c62ce8d143ad276f6408ae0dc282873220d7510f
SHA512f4c6531abc75e0f1e79a67321b80657da784e8e171b84c747303a121ccb7facb8d7ae550c03dbb6a2650b863c6319f019663a91c21ca7a7335a0a973a56f77a1
-
Filesize
5KB
MD578f480535044672f2404322f36f5088e
SHA137a85a15f2aa81b7953e0c8a353ed3542140b448
SHA256a8e1276b31e2414ac0f0deedd8fd0fff5c98efdc31406408c26a220ef4b1e62d
SHA5123709fccb15777448506ac1c383fdbb5a40b1d67fdb78c9b5480f34209d0c0e61915729d1df446241d116c7e9acd7171b4e630848b412d0a5fff57d2bed0b3a78
-
Filesize
7KB
MD540f7f1b0eb6d0395346dde2a40fbf601
SHA15444b25a720007aa1dd444d00be568c75c69196c
SHA25665b8c27c8b8e5ae02bc6bec3fb6ea92b6e732802f40accc47e1c4e978d4a0ccc
SHA512d6c9213a9b6f41d24ea3b01e7be4a3821031baad134af8a2fa93d43833c5e0f3b3d74bfb11132b7ae7629bfc420679a587782805cbf2c3863890a1067d4fdbab
-
Filesize
7KB
MD552ad1508c2f5fa22a2e7a75eadbcd7fb
SHA192689b2f30578b3e370e93a14322d4174ceff45e
SHA2562ab8aa113f5b687968c60a83627152e213e51aedcf0c30cf1aa174bd668bdd41
SHA51273b38a504e1399e1deac185088027b361386a896de1c158adeded45f0e54d97cf6c72b6f935fd1cb4225061b93303afc909559feec766c64e2c0460d669d13d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5039b7d9d543c438409963451c09055e5
SHA178b83f0802158e34a9be8b49ec7f8c4ce0ce6b31
SHA256bf5949022da810d39c7b92e4a0c9a285dc8ab32afb3425cd98b4cc77ede5091d
SHA51249b49eb8f51128e072ac89020e34f497d0b2ab09a1054343928f6e85f8743ecfb5411a1f9959d1f1dad328a22985e108c84b4029c088fd2336223672d7fdf01c