Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
72dbc049028227a30c0d4c31948a2e0d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72dbc049028227a30c0d4c31948a2e0d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72dbc049028227a30c0d4c31948a2e0d_JaffaCakes118.html
-
Size
72KB
-
MD5
72dbc049028227a30c0d4c31948a2e0d
-
SHA1
483835f8f7ff70034abe173bb797b7104cdffc13
-
SHA256
b478e4c445ad08f32d26213e08e6522c61ac5c52ebaa0aa51773b626ec46b3f0
-
SHA512
b8efd8ca9cd57e84772be80310ea9429d63363b56645a0a4b603726770f9933d3b078a2ada83a8ea22e6b81f39bb51a77e0cb7a7767da3172c2e45d98197beec
-
SSDEEP
768:v1lkSgOriWNdavoBgG0TlSSOs6zoxLZz1ycxsuzMGXaG8PHGVMtqt29YfC:vQaCTlPOfcnp8PHG6tqXC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4456 msedge.exe 4456 msedge.exe 1440 identity_helper.exe 1440 identity_helper.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 1864 4456 msedge.exe 83 PID 4456 wrote to memory of 1864 4456 msedge.exe 83 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 2824 4456 msedge.exe 84 PID 4456 wrote to memory of 4016 4456 msedge.exe 85 PID 4456 wrote to memory of 4016 4456 msedge.exe 85 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86 PID 4456 wrote to memory of 3840 4456 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72dbc049028227a30c0d4c31948a2e0d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8930846f8,0x7ff893084708,0x7ff8930847182⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,15367218460494282463,16605095983084974363,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5668718c302a27d37d208de8376fe5427
SHA18b92c87b3aed99daa7f072c95737ccb697c5bc63
SHA256c01c15941b9b2b24a47139a2a1ef82f99e52fbed783bbd7acbd4e9aefa5f0872
SHA512ee96fbdaaa0246a5b04937b7ae3c6938a974c38955de943e19e53b93bb9b0338a58b073cb98e82cfac24618117f8520a9816c330dbdfb90b5ac7d344f51c6541
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c4d0e8444bb0aa7ce7155d175d5bc8b2
SHA128eb55b6c809efc73f39ba0ffa2d8f821c80e6bd
SHA25647dbfb21371ca0ddc714cacc1aca8e24c8dcc7c6f3599916cb441f400f7a68fd
SHA512380d6a130db67938ee317e7fcfbe6b2cdc4256cae55dd25d80c9486d1aee55ebab58adfcb57700fd4e29f5d8fa97bb1f4c0ccef246e620cbb5044c2d66d83c6e
-
Filesize
1KB
MD54389803d2975f28e7efa6a46ccd0b4c5
SHA163ab790f697bea48c6a9f6a2eba50a087496001d
SHA256b6769917b01738937203481d9707aaf2b689fd30b61857b07a685f4d9b8f5813
SHA5127f6877ac139800f385047b20358f19479a68c13e2a9fb97d904f4ec7b110d78c3e310a8295300d896f2d2d8774d1eb182ca31b051719a26b6994c760f65528c3
-
Filesize
5KB
MD51f7778e42f63814b215fdc22b0184b46
SHA1ea83f06b8130dafacb8a76355280b466c51355e5
SHA2569dc6bd211152312a7b32373e10a4d39d0d062b4b2946967d4a8cc6df195150f2
SHA51232caab66b484e3f22a1505fea5c6f84555b1c1afd1221abad4f185b2c697d36a824aa25e9b622ea68ed501ef66b0c68a78c47723b6e1a9bb4d630c27790ea068
-
Filesize
7KB
MD50f7b99b4963c6dab39b6b3149cb7cade
SHA15c01094b9cdef5b96802f9fa2c10ada9b9b8a06e
SHA25608777c41bcaac9e7eb53b1414c2628330b49c060d53858c1cd5b30380e943a07
SHA512004ea1b2afe947984a3c53b90bec3eeb19b0fb6bb5b585cc40fe70a575251a4d562cd8f869b6c534f42ce940751120e153da4391dfc0f0bbe26b15e9353c0bae
-
Filesize
7KB
MD5e6e6a81198300d1c4093b845ebdad876
SHA13bf322ce733baa168f5a5696492ec865290727f1
SHA256300e212a13d3f35f2402547bd87a57f4fa5d7e0bc9303f00935630a8401aef2f
SHA512921e2bee93f6d22bfbf0135e7620fed663d86e11ec7c89546825760fadfa2c7a82981faa435b266d33512b207bbb078d2e65db20b5d10a5186ba64dff86c3c78
-
Filesize
6KB
MD547adb3a825f46a3dab9112ea69c2e832
SHA1d917a3c9bf1a6aa4f3daadf3b51c67a003a69097
SHA2564544af11f82a2a8346b7ef00c5494fdfc6d3a9069c3d06bbc75ae0e6c716de20
SHA512ab67e2755a42637c37954eaae77e1d298dd819ecb1c3e4b006561c2a6e11947b6911b83db27e6e7bf26291524ff1f856aaedfb28341a57f27a520699bbde7213
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ad091a6935267d6dbc94e24055bcf669
SHA15fd2804df94850d204d303c56affe92d45279fd6
SHA256f21b295f38b1450b02d4d2b2dec8e425aa50447d0520ba5a1fc3437d949a28ec
SHA5121a3f452f4bf2f7eeecaebff42d6ff7560bd83bc6442b58203edaf83c58014684dae24abe1e5a0fce7eb7248b0870fcad2446e008a473667879008025fdcf207f