Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
45a62f04f249ef74021483f2df19bc00_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45a62f04f249ef74021483f2df19bc00_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45a62f04f249ef74021483f2df19bc00_JaffaCakes118.html
-
Size
14KB
-
MD5
45a62f04f249ef74021483f2df19bc00
-
SHA1
ea7d6419ad99d8f5a36288f4256a6f71b9a0e23d
-
SHA256
1deca0817c1ecc8116075c7e02750d4f00873fcfd97ad2cdfbc83b281e677975
-
SHA512
c82706b6f228725c66bca3555b8a81c4be30e5eb2f46b6946f21e00880ae62e85e631674cd9150088696b1f7a17c4ff8f6976c1fcd1332fa2093d0c875eefacd
-
SSDEEP
192:gp21h05jccSGizh/oeWNfSJ2VsWJUdKNpqfpoeFLjs2ooHQj4idAepLJAy9R8MI/:rIclZbW8WtN4fpocvs2nc4hep9pJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 1816 msedge.exe 1816 msedge.exe 3852 identity_helper.exe 3852 identity_helper.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4376 1816 msedge.exe 83 PID 1816 wrote to memory of 4376 1816 msedge.exe 83 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1564 1816 msedge.exe 84 PID 1816 wrote to memory of 1908 1816 msedge.exe 85 PID 1816 wrote to memory of 1908 1816 msedge.exe 85 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86 PID 1816 wrote to memory of 3456 1816 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\45a62f04f249ef74021483f2df19bc00_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e0446f8,0x7ffe6e044708,0x7ffe6e0447182⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,69582628290935817,4909125665282825014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD577885c9a3c0e3aaa4af6da1d55ae0733
SHA1e567e2c74166f0c4dff8655770d52f7ed7bc4fdf
SHA2568d337aab451342eea492d863994b1c21129c3b6387ac976b239579ab61daa59c
SHA51291772f2612a585eb534e7532a72b1dfc27e717d0abf11b606960b7ee7888e904d519afb6a075f89664f98a3b700e0665c0912888df199697da00b99dfb4400ff
-
Filesize
1KB
MD51b5f161ea70ff89832e87989f3c0167b
SHA153d06bf8bfab903940ec549a9f357744b20ace72
SHA2564ecbfd2b236c47365b03c79137291c79c92235be785c6320f1fecb1c0c2ca1b0
SHA512fdbf4c041427c32fac714ff287c10039b34e9857b79795942ae4eea1f4476769e2fc3270d6bed4ab1434d4cce0f71c076307aff6e47a3bc8ad795f1d9095e61e
-
Filesize
6KB
MD58d738408ab30ccc5de6503df8ce04b97
SHA15626593ff32ab3997d4db2b20bcb10824dfeef21
SHA256f73c808df8687bdc68a92bf419af1c6d204e1eb8a2e9140162aaa0724b272d46
SHA51209a51766a4f1e527bca5d9b869e2d05d7acdd8e53fa75b5cb8b479e0e8cf9aa9740255cba380dc6c19256ec6ea7164de0bd7eaa491a19ad576c79a3114173924
-
Filesize
6KB
MD54975f8939d9bb30d0281922cba9e8da4
SHA1136166bf1e46811c317b73b29e4b617f48a99ef9
SHA256d43e14bd012f226183b2818198d4f0dcb350f2715885cf8ab6b91ec68313853a
SHA512453ef65a3a970c7c8b839393ca1dbf0890ca2f0eccc32776224f51ebc603151d57d6a7b3b9bedb07245974c7572e84787316299a9183d5e7d7af2f16a3b714b3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD581d55bb10099f8da726f9307082e6a0a
SHA18b163aba00eda3a4070b8027e528aaebcdff0195
SHA2565feee592a52fe0b3fae7e477958dd7185515e9056b96961070e58d2628448bc2
SHA51258f5d3b91055785eb2d539a6e71f82d2dfc0a99783301938d875b7ff72bad68b10c1c2523439362a5f43224040c63441b89dbaf457886b537eb57a16ed43ca82