Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
dde064e1a45d87cadebf9fa70673f28b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dde064e1a45d87cadebf9fa70673f28b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dde064e1a45d87cadebf9fa70673f28b_JaffaCakes118.html
-
Size
67KB
-
MD5
dde064e1a45d87cadebf9fa70673f28b
-
SHA1
cddf5cd9a6970039bfc763d8a91a97656f3443b2
-
SHA256
2e86d89b222879ef3cdf3f50a9c2a1db9395ef947fe056b392aaebc335d629bb
-
SHA512
c0e1c104b0ada9e6d7dec4488906dfc57ac87b47a823d21192ea2c05b95e6e79a3a3ae4c09340b42f3aca18da3efc08d433ea6f15a36258f988023310748e912
-
SSDEEP
1536:m/bqbbbnyrUlcge6O2o4lm2Y1chL/pxI/IL:sb2Cge68Ot
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2912 msedge.exe 2912 msedge.exe 3576 identity_helper.exe 3576 identity_helper.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 664 2912 msedge.exe 83 PID 2912 wrote to memory of 664 2912 msedge.exe 83 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 4484 2912 msedge.exe 84 PID 2912 wrote to memory of 2296 2912 msedge.exe 85 PID 2912 wrote to memory of 2296 2912 msedge.exe 85 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86 PID 2912 wrote to memory of 4088 2912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dde064e1a45d87cadebf9fa70673f28b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7cdf46f8,0x7fff7cdf4708,0x7fff7cdf47182⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,623952303263502878,13077854763722655307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5306cb1801f931b9bc38e7f30a91a727d
SHA157ad38a9627cf2a83ef1dce38b72ccbc554c3c9b
SHA256faa196f9316c5e589bcfb47e10d53299f2dbaf2875c729e96b9f970e8dfd5eb3
SHA5125a61ac6efb5105ca0edc261fbe2de472310e88206e0d96a8046a6e81a15426ac792c42eb232e1c608780ba36f581d2cd65819a4abe489cf41c6549ff12738e52
-
Filesize
815B
MD535f8465515d482a53713a6f2241040fb
SHA1d502c6fe9720c461eed1389a1af5a65b77c520f7
SHA2569ff8cf2023385325dfa920312c9ddd3a92e09eee06c95e639812e1be7d71e3bf
SHA512307ad8aed962adfc534edeae55c1c2621e16441a0c8f319fd2644c3894c1e32e75b17012538fbc6a440b0e51016b37002bac5101d03687e8e8fb4e1c41efbc36
-
Filesize
6KB
MD5a0a40d53f16cd0180f4c52a0ddfb9dfb
SHA10b86164fded140f651730e3ec939390ba3ca1a18
SHA256957676e6f5419697786df61ae9253404511ed20b8a1b4e2b508f1b9deae71b17
SHA5125a470ee71ba972edbcb295f7d232946c38b4a4bff1aca1c6d049c3c6549d8822fc7335c5f372e8fcdcbbcb9c664f11ba5be92affa4f118dd1646abded120b5d7
-
Filesize
5KB
MD55ce81b7f08b5c98bc4b4cef92372aaa1
SHA1267662bb090e54d03a2df51229720bbe91c520eb
SHA2564660e5c326e917bd4ae7605edca3820c0366fc5db59a99405b5c92853fd076b4
SHA5124ca7f95e8951f23442261d76625ca56daed4388ec802b010b4a93b0f2ffbee72c09466dfb0e7486dc386a2922d57ec4d3a0b383d0e6cdbccfa35117ce96d1b2c
-
Filesize
6KB
MD54f2d8a0974ab1d3d14225048a769f9a9
SHA145f1a065fc84a05cab7d0ab4e7f5f369fe88cdad
SHA256284c49d593952e6b9f221cd42868fcf45d4557511af5526aa56c3e2c9f5f2451
SHA51273663dc4776e7d69930d67048e29b97d58333743a07c0f6bb00e6d51f3864a7a4f8b93a88696f0d65d2b49b61f05d58daae40ea46fbf5972731ee2be1a67a5df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD558d177cf0da703ca2e4375900ce5b4a0
SHA1eb7967b58b566d5045964166e53ecb598da879e2
SHA256720eb30794f9589107d2bacc11f38bf73d85eadfe4cfed4d02c463374950477a
SHA512f21331e623fa6f1db8d844c97e7a52b6200035bf54713589defad9426a8499b1501a362ae7c33eaadd8169755972f5da820185dc8ab8090e17a4599830da3121