Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
7c216eeb5e4b71c5dd52e1aaeec41b2b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c216eeb5e4b71c5dd52e1aaeec41b2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c216eeb5e4b71c5dd52e1aaeec41b2b_JaffaCakes118.html
-
Size
36KB
-
MD5
7c216eeb5e4b71c5dd52e1aaeec41b2b
-
SHA1
50a25d3fa82394b4484717225e1f0f0ab84caee2
-
SHA256
301b3138eea311a87d3b9a84ca694887be8a4ac844c22f49de355b9c88b661b2
-
SHA512
2d86c6975a8f1324b1f173805bd8da9c42f50fc0dbb5739e992f99b522ffab6051194c6e9676c6c059202106a93da268304f12b785804079ebf9e7e8d4d7fff6
-
SSDEEP
768:x3mGf0y+b/VEXjPWHljWLwPWz3bdRr/FEIngKNf+2VFnW7S:QGf0y2/VEXjPWHtJPWrhRr/FEIfNf+e1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 32 msedge.exe 32 msedge.exe 2948 msedge.exe 2948 msedge.exe 3928 identity_helper.exe 3928 identity_helper.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1556 2948 msedge.exe 82 PID 2948 wrote to memory of 1556 2948 msedge.exe 82 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 4228 2948 msedge.exe 83 PID 2948 wrote to memory of 32 2948 msedge.exe 84 PID 2948 wrote to memory of 32 2948 msedge.exe 84 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85 PID 2948 wrote to memory of 552 2948 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c216eeb5e4b71c5dd52e1aaeec41b2b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffe676e46f8,0x7ffe676e4708,0x7ffe676e47182⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1699487928576042506,15808155284270483426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD568a7e145af94fa30e847284c9b69b363
SHA15c00c1ac219a560e9dbe39149f0daac3f53b4a71
SHA256410f5ba87e54bdf652d6d93e6e5dae481e6069ab85a20541d6a9bff50325122c
SHA512fbebbb2f696bf672ef473859f067d9903fb68b90151d51c647750b7baf3aae6ccc2042d7ed57079a9dc470ca3466f3e55a1bd6c81e1f8b741b411fb8db915a2e
-
Filesize
1KB
MD5d8e6c4c1764d698f169bc8212d5b1674
SHA1bebcf4ef4f2f9aaef46fa3c514cdee75d34d1997
SHA2566e303baf9ad2b0c5f752c290a470ccc0e83573ff20ac37dddfdcfc4d62d47112
SHA512eeb2dd76cf99374b7503edc176f4ad7abca8dd72a4700047a706230f5c0f29472c5ed33620c91ab20b39c9723006010e13087ac221bef4ced30eb015d55262bc
-
Filesize
1KB
MD501439e37f48740ad8e51f7626b5be346
SHA18d7a293cdb81e80ba48e24eaa1c9818fa56515f2
SHA256df1ae26a612f478bce40b08cea27923ca0085fc47df2386f7d115821c9a29e5a
SHA512154611b59fb650b12855503a8b01c96f3e174aec2f6804e7f053fb84824d02bdac852c7343c82d01449ffdb3878e7706b1fee238c7fe295cebe806c097935e80
-
Filesize
5KB
MD51d508785375761fb06f09f9063032241
SHA12034a403c5a478c282aa5b4d524993741b92cfc6
SHA2569b17b9e9c169abd713047822d46552af3d4f27dfca5795abf76cf5c58e93cc50
SHA5127650689f33624bc1733d21f6ea078b076852cde32140997c5292cf0327c0ecc6675184801f80a7746466eb580d32d94e9076f3f90286a9955c7163c12d3a1624
-
Filesize
6KB
MD543428a7c9a0b41de7ce1bca16717dfab
SHA1a3c6e58b18b4caaf2ee39056cb19d4cc3bb208a3
SHA256aa075cf73e86b9995985b7f62b0eacdef6c51d972cb0bc84bc2b6e7d6c72b906
SHA512921ac320a92e9a0fc0f0c1a974fcb3cd65b5aa6604f4b133c74fc89c2c061e9e380afa122a4d744e9c7e8c4b25bb94b6a038a78d3d5a3ae32cba4f581c5a259d
-
Filesize
6KB
MD5762cd647104184dc49040d8db1bd17c2
SHA10a0cb756a1e771412642407bfada54392d3b493d
SHA25606d4f973082cbc16eef3f27584120a6cd88130df27723233e2477a9966ba50f2
SHA51233ac1bfc95a0c22497ae88d0f0241f2118d75fbedb6b34e659781d1a9bc4e79cbe0b8e5abbf7cb1abe45008cfddca0c3b4f9bf885a5d33f29fd1a412ab66391f
-
Filesize
6KB
MD5c7257080decbc20ffacd5d5422b11f51
SHA1d1a67fbe6ba8da27b55379f7a7b77461bcf48952
SHA25685cfe9b9344d651e0ad7f3ab27386efd0f5d77a21cab3c76eb0a60eb9be161cc
SHA512d71e8165bec3484de2607525dd577be72e12581ba455d5429053cf2427897ea469482840d2b6ce01cddd053195dbdc956b4b0456dd899f0c1040cf7bd83d9f61
-
Filesize
370B
MD54c11acd503e45722986186b33ccb9e6f
SHA1e9dc7cee49ecb6b92fa85dc8c62cb55befc6047a
SHA2565115396d6128145de17bd6aee476c9a24d4066fdadbe13dafe590cabd74d8d3b
SHA5127fb44c5a060b3e3d967d07faf6199412200d2f28a7709593120060c59112190a8f60a49daad6a127cd7ffc7dcde8ab6fc6361b7b2a88d8230cd6b8011c42fdff
-
Filesize
203B
MD50f0e309b7db18d09d25107ae325d1825
SHA198aa1035a03db96c111ff431422e11126b761074
SHA256bd7ac9430336cdfe21e0dde5bd81919e4e9959425a024d66682123f434e17f3b
SHA5120be1233b557580b85c3c52a0348776da4065c9fcdd6b10c8dc7b76f4266fb17b069d8b9338b7623742ed24d500800d1dd850a10d91bbc1ca6d241e62fc80af31
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD576f835f2f772d918e50b699dacd327f6
SHA1bc763f7683e58564184970987252fdb86c9a993c
SHA2565a8b21b475943fbe03b0e789fa5bf1aef53e0e044fd20122dbbd38506ef26218
SHA5124479b17c8fec9a15eaafcee727adab526ff1b9050791407de847ed04723d6b68fbed335aae37eaa952d1029c4fee854ed6e1e5d3b2ae9e76fe0688487fbeecf0