Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/08/2024, 08:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1164837561630466058/1278630315501420554/SecHex-GUI.exe?ex=66d180c7&is=66d02f47&hm=9c3973c2b79aa05f4c7a49f31c553d4dcdda648ccb1793f8be6c911e979c70d4&
Resource
win11-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1164837561630466058/1278630315501420554/SecHex-GUI.exe?ex=66d180c7&is=66d02f47&hm=9c3973c2b79aa05f4c7a49f31c553d4dcdda648ccb1793f8be6c911e979c70d4&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2856 SecHex-GUI.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\SecHex-GUI.exe:Zone.Identifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 861368.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\SecHex-GUI.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1384 msedge.exe 1384 msedge.exe 792 identity_helper.exe 792 identity_helper.exe 3436 msedge.exe 3436 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4648 1384 msedge.exe 80 PID 1384 wrote to memory of 4648 1384 msedge.exe 80 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 4576 1384 msedge.exe 81 PID 1384 wrote to memory of 1852 1384 msedge.exe 82 PID 1384 wrote to memory of 1852 1384 msedge.exe 82 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83 PID 1384 wrote to memory of 4580 1384 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1164837561630466058/1278630315501420554/SecHex-GUI.exe?ex=66d180c7&is=66d02f47&hm=9c3973c2b79aa05f4c7a49f31c553d4dcdda648ccb1793f8be6c911e979c70d4&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa49bd3cb8,0x7ffa49bd3cc8,0x7ffa49bd3cd82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,15603454681560062187,8819720233484379105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Users\Admin\Downloads\SecHex-GUI.exe"C:\Users\Admin\Downloads\SecHex-GUI.exe"2⤵
- Executes dropped EXE
PID:2856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50487ced0fdfd8d7a8e717211fcd7d709
SHA1598605311b8ef24b0a2ba2ccfedeecabe7fec901
SHA25676693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571
SHA51216e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993
-
Filesize
152B
MD55578283903c07cc737a43625e2cbb093
SHA1f438ad2bef7125e928fcde43082a20457f5df159
SHA2567268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2
SHA5123b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5e45027877f9b4bb0d16aba23cccb2825
SHA18fdbbebaed041ee3d16f8d8c9d00c907ab173aa2
SHA256d2791892ca3f344129b5b9b3251fbf138780edb7ea08436f01607b535ceb414c
SHA5123fbc7f5a5e59b96312f8712dd17a9b2bcbc14bcae5bd0cfc5640efe32d865f2b1b40946ff7ec0a4d77bb730e5907cb42199ba6d910fbfae42fc16283a9d6a847
-
Filesize
5KB
MD5c97304f410f70d123f28ab655e80cf1c
SHA16ce96665356e231501f91f7594fd886c41e86ff4
SHA2565c8f70b19c4ea865556be5f9c042e0e2c60d3d4e76b79c3ff213593606fdd443
SHA512f1ade81a4f256139e722c22da3c4cdfb5aac3f21a712df2d69b03d1ca5944bd80bd96a77121e437e31d4f859ee7b2bc3b36dc50a55869b33d487b8978b3936cc
-
Filesize
5KB
MD51d746b300220cc70c02f4c548b1fdc46
SHA1a8bfdc86d80b1a155dd80ddf65e9994bbc6313d7
SHA2563b309b2ca50a33ee6c8e0f315e4d67120a50170cb307749e9e5845020419466a
SHA512f44c8aa5d0895d388a884ccb8819947af623b4773b5431466723e59218c3cae25214a1f1589132b44bee3224df3d8aa64b8254fb820a85c09e55c9e524869986
-
Filesize
5KB
MD555a2b48e2048bdfccaaea4c0fde51c03
SHA1490f2c94a4ba37dec7e9c7d2728f3294cadccdcb
SHA2564ada009e1686f59310460f397f1ebcccfad8d51e1e1179cf0488a1727e215187
SHA512e4c709830a8ee385e2a7cd7d287d86593a960ca8535ba798f6b6c95cd60669af16f0848263ed5646725206a366a0840adcce28c0b725e9d95a25de6df62e8dff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD546b054e49adc3df3a1bf91f73d696f98
SHA1f05f5d0224e345f8476f5b677c8932cac548f339
SHA2566a36630dc07e096b0af7ddef18abfdbe061c7ce91b05a9a3e856fa94032de1da
SHA5128a3d7ba8c6ed18fd19b0d4469cf6fd2639d87f0deaa6d4d1a9ea7f5ca5b08188fc136d73060309b0c960280df7247fefcfe647126bb874279eb236a15958e71b
-
Filesize
11KB
MD5e468319096fca8fe5ab00cf25a5d750b
SHA1529c0a68eacf9edf6033d345571fdfed4b8e36d8
SHA256fed5f9531b5d58428a6b7daea8a340003fc351567cd7282bf9631277a7c0aa55
SHA512134f63bcd89546d1f65d58d9f8d804126d861311ca5de8603a640c2b3431451e1719c3488ea360a5ef929df51b70b13e20359b603d98261d62e9612635a313c3
-
Filesize
8KB
MD5d73a03c20468d2ee957a1595f4a8d217
SHA1efd4e6b0a444c93146d1d486ec1f521aec4ad838
SHA2564d9ace93eddb58afea5b20871f260faa0e886201fc95e5ea01e0a9ece27f49a4
SHA512ac201cff968c3929264b337a7f93e3fda202b3b70de5237e13598651e40bc2cb3d1fadd9f51bc366e3f648661e96026de651075b87985409ad39bc74455c26b8
-
Filesize
222B
MD59ca0d4d96676ec779957e2ef96784af1
SHA19a6e3d43cbf23ffd90a89c9debe1a7b5fb19e10b
SHA256674c8a824fac2f9f3878d935770bf633758b070eaeb599df1f1cc333a02b0784
SHA51216f9fd346f1e312dcfc77ebd94c1c14a3f4b097de1abef9362b7661f8aec0b5e003aa6db85e04a050e2cb9d6566e7fec4e59e0758b7fac10254995b95bf28d1e