Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
a0b2b372edea0ca86d137e8cc396165d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0b2b372edea0ca86d137e8cc396165d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0b2b372edea0ca86d137e8cc396165d_JaffaCakes118.html
-
Size
71KB
-
MD5
a0b2b372edea0ca86d137e8cc396165d
-
SHA1
9f7acfdf0512b484eb08193d9b56bd568fb70cdc
-
SHA256
d05b606aeb50a4487dd57f46f20db3b67fd885bfe7e71076b12c0f5647f359b0
-
SHA512
ad5cbce4315476cc992c19bb68583a935531ab5602fa2e1e5fefb854e018b2afd33b32fd05e4a8597bffd52256963891a5dcabe1f41129b885a0cda795f50b35
-
SSDEEP
1536:gQZBCCOd10IxCZ3t9Eu3GwKPpw+7Dc92h/AM0gGhlXJu0I/+8wvaxKF9OoHUWWxW:gk2D0IxC9Eu3GwKPpw+7Dc92h/AM0gGB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 1924 msedge.exe 1924 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4656 1924 msedge.exe 87 PID 1924 wrote to memory of 4656 1924 msedge.exe 87 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3916 1924 msedge.exe 88 PID 1924 wrote to memory of 3928 1924 msedge.exe 89 PID 1924 wrote to memory of 3928 1924 msedge.exe 89 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90 PID 1924 wrote to memory of 4012 1924 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0b2b372edea0ca86d137e8cc396165d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1466344620072747574,17530339735804877223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5890cb823ed6cdf8b2cb9b13e9f202603
SHA11cc93277deb77314f21fc2830ace8fbb71a310cd
SHA2568e16e2c9828128d34eeddb2af09d96934c898beac16f7b7fe59fb4ec21fa7929
SHA5127c3335ac443cd5e60867cb66c72bbeb866537c95c5f0de57a17ace91defa229850bafb3d0869000e0c12192881713c05b694be07c56ad465dd2c8c440c01a0de
-
Filesize
1KB
MD5e429c148d8a36a73cadca53b099c81d6
SHA1fa378b7807f53afd75c70ba8ebc921ea7256b0c6
SHA2562bf86fefc023c02668a5c1ff7445ac4375aac10bbceb887df65adb5698c3fae3
SHA512ada102690d16bb6ba5bbccae732aab19aaa7db65159fd715d7af3cd0c6c6f258c37c5f97c84e6c6036ee177830d8b2662c18f2a7963e5820664dfc8245d1f9aa
-
Filesize
6KB
MD52085017511b421bca346a152067aa66d
SHA190945e4c2d229902f176465e669eef634b2746a0
SHA256792e53986462c25a3d8e4f62e31962892c856489659e2eb3320093e11e0df0d4
SHA5124504330e23640e5991899c7ee8179b3cb6f410b4e0cd33301157f87ffe33e56d37c4c588f4feaa8a9d27506578abd397ce167f766402b16d2c3335b3be4851b4
-
Filesize
6KB
MD5ddd8761bd89640e388c26461133fa3a8
SHA1213e5c00ef84553ea264d6a9e8e433e491e7c848
SHA2563a6c63ba9102ccf8362a00a07fc8c89baa66d1f2b4681c6b708a92f6c6b09956
SHA512b6a6d18fef31ae1a63df4f2348c1152911fae56b7af76938275fc440bb78fc93acbea0828fc7a4548afd5985600b69b009a564a39b4e223bd67e317f83eab67a
-
Filesize
704B
MD5332a5f62fd2fc8a6e4564acabc76ea38
SHA1d76d5170d10045368282125b2df5a466c29cfeff
SHA256ca381c455723c17af976fae1636f7100ae8edfa1761b712fe908cbf718eea8e1
SHA5121e5e28d494d604948ee72919a9b7749e125e845b191f9b30ffa8485c3a64d32061f85aa97db57503b6eeb7a60e1b40d70b318ef245d395dce85e071e29f132a0
-
Filesize
370B
MD50bbf3566641fef8715e994d9ffd98d9a
SHA1534cedc0ddca70c49a18d7aac495043cae04b996
SHA256d73141763f1f11576e1a78847118c5d793f1f42038b19561b7b4325dffe649bc
SHA51236626598da63d791dd428fdf101755b62d2858df8691a52eac91ce55a2a19c7da8b333b31882b52ea453e7381ed928a7ca398343ba4c3061331d32a6024a3391
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54d17d7af2867749f8164052b72469cd7
SHA1267685bd4644a190cf16860ec566eff0124caba8
SHA256d7d87a2bbb92b621de1422840982c6923ef81425bd9f25e97f819792eaa253ac
SHA512159d625e293fa622078373968161971eb859af957b1c968b14f40117a4684cc17c0826c2cf3b831184cb13fb394395977f9815f207b234180ada821d477802f2