Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/12/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
eeb8ab698d70103eebd6e851dccc34b4_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eeb8ab698d70103eebd6e851dccc34b4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
eeb8ab698d70103eebd6e851dccc34b4_JaffaCakes118.html
-
Size
72KB
-
MD5
eeb8ab698d70103eebd6e851dccc34b4
-
SHA1
ee38e2958c83dc135ca88c6f367d4f645f359d2e
-
SHA256
ae6bbb4decbeef1b557bf19b2b4b02c4ac3d43376d25ad4ac6de2ef21fb5ba81
-
SHA512
9dd1026c03c3f7461fc4ae841001d01625c2b105fd6333443cad83172f450c46bb0b8980200b34a328322fda11758e65a6c1cc30f829f3abbbc7278a6f23267d
-
SSDEEP
1536:e6Ob+lVfa7beO82JO+pcNdcqYmJvZPBlydq5:e6OSl9a7beO82JjSNuq1PBll
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 2624 msedge.exe 2624 msedge.exe 2288 identity_helper.exe 2288 identity_helper.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3748 2624 msedge.exe 83 PID 2624 wrote to memory of 3748 2624 msedge.exe 83 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 3460 2624 msedge.exe 84 PID 2624 wrote to memory of 1968 2624 msedge.exe 85 PID 2624 wrote to memory of 1968 2624 msedge.exe 85 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86 PID 2624 wrote to memory of 2100 2624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\eeb8ab698d70103eebd6e851dccc34b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1b3f46f8,0x7ffd1b3f4708,0x7ffd1b3f47182⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2992 /prefetch:82⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9960971915805641748,12444509202584359467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD58cf13419176a93c1d46f7686f337bd61
SHA1525951239a0d303ba3ea506cf4aa6922124dc577
SHA256ff811faef988d290c53559c04efc0332bb30525d42857a6bbed8f4e6f8356a1c
SHA512b33fa84986f15019178d437d5160f7c324b00b1ab8509beb03053f2e0bea282890425a3d77de502f1a423ec66045fdf84ccd25dfdd1e23844d369f2893ec2f98
-
Filesize
1KB
MD54b0dba0d8de47d1db4d56aec3e28dabd
SHA1a494ac02c87dd0b718904dc7bea54bc53016ba22
SHA256f5999f3937ddc8acf474ff7f44b81777e448e0c9f462942370f1d1d055e743df
SHA512973ab0003ee37ea79d88bf91cfaac51fb8339aaaea396d25102b1d5b4f27aa273e657a0d57cddaaa35aad75da86cd43394d11fbab0b7557961c46ada5d5f43ec
-
Filesize
1KB
MD5bd1845ebabcec4f03f0ab41b2a8bf20e
SHA14150d1f79cc46fe13650a9b614493cf4be0bcf7f
SHA25630f38e79e951f18ae9f118faaaa488f4f56b0329da14bc26c736c284c574632b
SHA512439000a9ad2750fc402d2584718fa6737228902daae416909bf688d24b0953050e2d85a121c7a8a93842599e5b9326b138dccf665fcac8f4c2e4e17b0088bfcd
-
Filesize
5KB
MD5db5e27a34fd7777b6f2e87c2a0d834da
SHA1288941061fa5e98680e2a09dc317dbec6fa04f2e
SHA2560f182d00cb82de364a22b1c6c7a36e8d9f9e0b3ebfbf340db5a3243d0e77d0d2
SHA512c402c8d0415e7763a348707d465458826bdeff5409259bfa3ab34ea0cd48933a0ef79d80f2987c84a17d8fb3972fda8927b97cff7108870ac68963d86c585996
-
Filesize
7KB
MD5ce27a7f184fb31ac0fda77e5daaa2b05
SHA1e13a131465178f50f7737d773604d7d1d11f4a82
SHA256fedfd7b53e4a10178ee8655a8e99f80e151819d5743a39e2b777192a363b4e58
SHA512cf113cacf52e496da2b7ed2dd538fb621cdf5bfe58384e74bf93a293b0cd184af5bae982cd2359905acdc96998a8c29cdfd9f558bf03fff34734c36d80b5672a
-
Filesize
6KB
MD58014ba2b541b211ebd392d0d3dd19321
SHA1811a7d5e4c4499d3f138923bf9bc0a3f2afbed23
SHA25695cc55e96b38bdbca2d58f968c243a4fca9811241aa2106c2803904c4e3ff149
SHA512d0142f77ee24c5ca1ae6391c6576749a075f38dfe7eda0e86f0ecfa5b652b9cb33f9350e3de400b0e1b26cb762e713da39ac46d36bbc0c219b4239fa2be106e8
-
Filesize
7KB
MD558e89d81fb5a1318dae2a18bf62022db
SHA1371b16a67190120c0742c54c21c9c8a2f068486b
SHA2560c3d5ee46d75d5613875c9c70106a0dc84d069b507745928d0acc0a02a04bc22
SHA512a13a3f34eb168554412bd5284cfb62da884226fcfb7606143177e0878deaf692cf029500d813288213fe775c962e8c7654519f090d3279ea308563509571782c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD518445eb3dd358b20229bfce125751c3c
SHA1db69103e4dd246f2f67545ba669fbb43a233f653
SHA2564830b7c367fac9f20b95cc5c2e643fca014baa839693344ecd9a21243fbb07aa
SHA512c0f32d94a9b00902083b901d852ebc4ec0ab04e0ce4ea5ac1d37e216a0c60c77207e177f7c8951e59fdba4457a4a021b53c85bc8be991a5e40cd7d95223e0136