Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
8b4790f0e5bddd0d90e622a645775ec3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8b4790f0e5bddd0d90e622a645775ec3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b4790f0e5bddd0d90e622a645775ec3_JaffaCakes118.html
-
Size
75KB
-
MD5
8b4790f0e5bddd0d90e622a645775ec3
-
SHA1
78b31fb667cc3d4bc36a07afd3472a087c9c10b6
-
SHA256
1f302764eb06619c2a4649122c11ddbfe050b1216036755dfcd616fb8696255b
-
SHA512
3a7afdfe3c21b46233593148e467e5c2498c0a79a37e48c5b85c108f7da73e460a7bf7a1c978124c2704cae9eac2127734f3fb126169252816f1eea990326802
-
SSDEEP
768:VlBNbOE4JPgGJb6K3OilJjAD5tWz+DGxc5kC/Rq296Q:VTGPzb6iOilobtO+RL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 4360 msedge.exe 4360 msedge.exe 1532 identity_helper.exe 1532 identity_helper.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 3644 4360 msedge.exe 81 PID 4360 wrote to memory of 3644 4360 msedge.exe 81 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1928 4360 msedge.exe 82 PID 4360 wrote to memory of 1652 4360 msedge.exe 83 PID 4360 wrote to memory of 1652 4360 msedge.exe 83 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84 PID 4360 wrote to memory of 604 4360 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b4790f0e5bddd0d90e622a645775ec3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6ed746f8,0x7ffe6ed74708,0x7ffe6ed747182⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17023518242192375436,6867389104160208965,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
Filesize
336B
MD55385cbc02742cf0fcb1163061c67f70a
SHA197341e2913ae344ec29e860650665dc7590ad1b3
SHA25624cdddc63e82faf65f238b980500c21c96b9c2d98574d5f4b962043bc23ab2ba
SHA512fdb587bce9c7ae675cd4fc57a756ba3ed21a8565eef889525de4c4a78af64ab1584b84349b2c2b0271444067ddc6209a1b79588191e7b07f8e0f41a94c379300
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5269154f0cda0e38a7402d9358e9481ee
SHA171e173bbcb25564fa89a083da03334fb5add1a3d
SHA2565a09b7f54e5882bee6484549a4c30a1ff131d535f61e86d922dc4c2369bf8ddc
SHA512b31629a28d5feb42ea59101ecb23d1b0d467ff032d1019542621c82b8af41a4325237da0c07158d659fc0ef72751347a1865e91dc727c20149f1ce2b437c175d
-
Filesize
2KB
MD5b2abb9d8c1d08ca2f75d82b23767c39d
SHA18fd8cda95b1eaa3db87f012011ae64116aaec977
SHA25644365e288643250deb52a0a29448d30f3783eb605bec344c55deb0e26be60af8
SHA5121f77b498cfd6fb8c7bb69deb3c8cacdd3885985115196a015dd8140cdb240d816e2e34508282eb61164098eca0c1ce0560de8bc252070cdc4b06c22ba3a173b6
-
Filesize
7KB
MD5f1bc9badfd24810382568e441715be1c
SHA1063159b2396230221814fa2a9bb06bdfaaef286b
SHA256e4334a1766110394b5cdc8fe8f4f7cf7fbb0bc1cf9c9b5ef73f24fb4ec6ab307
SHA512da74072bdf3655ee9cd4c10d76fdf5a428c3a7ceef43e8ebfedd9a597f47360ffabb7e0b3a6c11a708c7a7568289b5f19b533433a1cc3913d24a2a1c32b9f6dc
-
Filesize
7KB
MD57a2fa191572664df3284ba0c52c8eb1c
SHA1e0f7ce294d5a613fad22ca5d07a175388bbb9a4c
SHA2567f1e8296dd97d7b50976fdc734dc29c9efb4df529673c4efb869385ca1e1c945
SHA5124fb29f7d38c22355ba7747edc9dd3ea9ba9b6b3db9c42a9a6e80d32696d927bd4057454a1eb197c44bff43fc8a6ce7d38861d3c94fba715a271f55ba05115904
-
Filesize
7KB
MD5b687424edc0d5e63e394318f586df37f
SHA16a2d44ff96a6be12b982cf47c84ea8a2eb9ddc6a
SHA25648d4a0e4193c46f1a710289e51b8efa7b68693ac9b2640c774dff118dd91de2f
SHA512be49ed61709774e0dfa73eca3b02c6a339e8d986fa5feca41eb941c6c9c11bca61d223f12ced245ab52f71a7d877d739ef74c840bc99ebde4d6af1f9e2ea62ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e3b2b7bc-0791-4210-b1f2-2647fc1702b6.tmp
Filesize5KB
MD5fef4aaf7e30e28eb0c3f04a23e9631fe
SHA18e638b6920197a2cbd75be45214cfe495f54f675
SHA2566879fb6cb62bf233ca8bcd70f01f07ae9e17864209154d6985100dda6afc35ec
SHA512940bfe91a4fd406c4e8916222a8de3b5ac4469b354b86924f193c271973b608a32567f7f028548e96f137cd1abea685dc7b046d95473ea17e86d40120e48e69e
-
Filesize
10KB
MD56870402a917f5da1d9932261ca06c87e
SHA1f89f44582e217725891c9e71dd70bf19a60e7a29
SHA256da6fcf48c9c984802729727662f8a338b524618e49423b6af5c579ba11c64555
SHA512f952cff61d0d0b591daa50051585754cadcd897d3d7d86479726a94872d7196a238271948f0bad1b7d797c4dc50d961875bc034c80996efbd66c2a83677f4289