Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
f1c21b73a8bbdaf98f9df0001699a8bb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f1c21b73a8bbdaf98f9df0001699a8bb_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f1c21b73a8bbdaf98f9df0001699a8bb_JaffaCakes118.html
-
Size
432B
-
MD5
f1c21b73a8bbdaf98f9df0001699a8bb
-
SHA1
780efd6099cbe30ac4cfb8de5b54466235bec48d
-
SHA256
b21f88fff70a8e1e15eac1199f260f7d7bf5800ccd21fca5a6a16ab08fd5dd56
-
SHA512
781a81dea87df45af434b66bacb683f265ef3ab396cd860f1a86d26a2f578e41e40910bca33d9ad9bdc2a827c1204916fa1fc1eb671da6782b1e80c5edd3b7c3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 696 msedge.exe 696 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 696 wrote to memory of 1996 696 msedge.exe 84 PID 696 wrote to memory of 1996 696 msedge.exe 84 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 1856 696 msedge.exe 85 PID 696 wrote to memory of 5004 696 msedge.exe 86 PID 696 wrote to memory of 5004 696 msedge.exe 86 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87 PID 696 wrote to memory of 3468 696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f1c21b73a8bbdaf98f9df0001699a8bb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe33a546f8,0x7ffe33a54708,0x7ffe33a547182⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,17076535205357327134,13487657307417094093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e2f0fe48e7ee1aad1c24db5c01c354a
SHA15bfeb862e107dd290d87385dc9369bd7a1006b36
SHA256f13b3ebe8d71bd0086d5bb82364c35f59a95d32b39753af251e8639360e291a9
SHA512140d026437fd5e8a874cd00b03950c8f010e1a0732a0a1cc5bdde477e7f8315ccb95790bb4c15b8dbaab9468ad532eb885b6c429300a64e39412d976d079324e
-
Filesize
152B
MD57e0880992c640aca08737893588a0010
SHA16ceec5cb125a52751de8aeda4bab7112f68ae0fe
SHA2568649a39877c190ec740a5422284ec5f9ff509b30b2d7896635476873dd8824e2
SHA51252bd0a38ca7f43b26731966035045b1cbd8b60b2d81bdf9aad791cf444da8af8b722ebf3cb364a6e660bebdf23084eb0e30bc23562575b704801669817549f8a
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD5549bf67acd813281bc505548288458d8
SHA14f71249042dc062bfbbecbd2cd268a44860bbd3d
SHA256536d955f9dfbdd1e2261f95f9ba9c460498b9d981aeb4ed2878caf04a09331ed
SHA51217984121b8cd4cb974daf39a2474c66ab5dcd6a9d114ea490125f967bae36b1a4c862b7f9b9375e882ceb1f4e7190aad4c4d8bc4bb6526102a2d0e9103bdee9b
-
Filesize
7KB
MD50539c9f6b2c56bfa2601a67eecf735bf
SHA1024d7bef3ced858507c3f5637880d97db8c9f5c0
SHA2565a322eeb0bc0df0814ac4d65ce825efb2192b48348b78d03c6ac5aa9c3ed64c2
SHA512c885e59ad0d17a9d9ac0f8909de7f192259fa07331f3cbc9ad8d83d9df6bba702042b36175be28e9b3512e5e457e70e389b1e2cb0eb77b6e3a95e182ccf5f235
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD584afec40b06cc9296650cc254f44295d
SHA114194177357bf079c972c6fc6217aac0b135f91f
SHA25657f22c982956f6df3b9382c39f6f837c560882f484de58cc50e1441c7cb57f9e
SHA5125990ed3c996eb7855a4b02e96de0a3a27126876e014ef38d414c855ad87740e07a1818eda66ef8166f64cb415ab0c1ca6b220dc820b2fcaecb2f10ec2548f2df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a037.TMP
Filesize48B
MD5b3aa153895cbc65d41d395d06ca9c0ee
SHA1d6a10158d05ed640d1bd46a4da818f48a991aadf
SHA256ae6a40664285b56b5c28bc0916878be63771a9e229021ba52cac22557e8d5397
SHA5129c4546c2db0df326685fdcb907304e4903a190154be195a61ace29717f0553854670c42c5625983975360f0d90b01154d0abdca879d740e34b3b297825a7e1c9
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD539d4a91a361207ae16a3c3cfae737544
SHA1e646bb31c4bab61c3dca5c64d274ae48edc1b97d
SHA2560eb287c6e6b8b9724360df64ae52d9bb979f4ca2f76aff2ad7aab333cda5e65b
SHA512d717bca23da55557341e9f35b09fa109b1bdb9649d333027b2ec085668136cdc627e66f3c76c18323f19c167b196927b9fff99c2f13ebf52755e1e285e9381e0
-
Filesize
11KB
MD5f0228dec0b6e2040cf78d811dcaadad1
SHA1d892711f474f90601494bb4c5eaad243ea217159
SHA2569d61caa19faac3068b685efeba44fbd532eb62d05ff5049eafbdd14c424d06be
SHA5123fd8e0df3f39429edeea3fde25a7d65a17a37b5b329e9eac6d0d4769e13c88ed6de536e1e02deac1c3a08209fc8b35d3a9876c0995bdbc2f6d6c943030735d0a