Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
afc15de3c33827beada7c5fef4078f76_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
afc15de3c33827beada7c5fef4078f76_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
afc15de3c33827beada7c5fef4078f76_JaffaCakes118.html
-
Size
28KB
-
MD5
afc15de3c33827beada7c5fef4078f76
-
SHA1
7ff536b71355d24d0c8523a5dd27c45cfb1fc450
-
SHA256
9e1229a1f2d7880aefd3d9409509198d34307988ded9e5c65c1f986620618424
-
SHA512
fcafe6615948c90ac848fe2a5898cc27cc07fb20d8495ad165ac69f74958fd38aae6c30ef7b8d9817faf6133d4a2747c45826a5e6a622b564fc650240bb481ee
-
SSDEEP
384:Lyv5QfV6Z9Rjx1A6v8k+ST2TRTyATnTzX/bv3InXPlyquQuQA4Tw6pEpMqWg/K0T:a3Z4yAvM97B5FPFUJ9QYn9HDExwce
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000007c7e2cb8964756c5ec3f36009a9f509f12f57755c5eefa9f7597415f7adeb1db000000000e80000000020000200000004f586047ed8b313bc368dea21ea1d5a19bf5bac98377e1d5e64fb20fdbd577d32000000017788213af6ae865f9ac4c69edd13cf7a03c6ef3b1b5fd47eb42b6b1eb350220400000005bb4e820b669c48ffa2b2d1eddc9db447d0bb04c771b6a6248025bd20b929ebfb1900543d8542adee0c31328db04dc1e40eba4ed13389a1e1087a3763eca8387 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ab09e050bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424637538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AF7EF31-2B44-11EF-964E-D2952450F783} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2056 2236 iexplore.exe 28 PID 2236 wrote to memory of 2056 2236 iexplore.exe 28 PID 2236 wrote to memory of 2056 2236 iexplore.exe 28 PID 2236 wrote to memory of 2056 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afc15de3c33827beada7c5fef4078f76_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701428d1649be64fb1896f55a60c52b8
SHA14117b21307e27a0472a6af1d3f87737b9431b58c
SHA256df7860511f431bf10add4a6558321065fdcf6ab62e6b175ab68e1ddc78ad0507
SHA512eb771b5f6eb8e3e4b075dc0ce1de9ee7dd1a0c4f208653e1e41929f34f60cc11db1811a50e6f644972c151770b38a0cdcc4e451d4b5db6af501d7810292a5252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd608354ad50e072679c6749155618b
SHA1f61414e50a9397a43c53063b2775765909a3b1a7
SHA2567a0590349d3b5759d114c903b692cbf614f368240d73662dd63e1ac396ed402c
SHA512d20e31903eaab9d92744e2e0434295658217ab2663069ca078d408d048831b19bc65fd1e828bc6b495cf6bc359005b6270865344ff796761b5f886324223fa50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb931ce0168b443f9e2ed20c58628f66
SHA1c63cbdd5d262055a787cd487194578ecfb67c471
SHA256d7c0af9d29b4e0f6b8344f152c8667e663bea9f21731ed036cb74f367dbb0d14
SHA5127fda671e9167709ab1faa6d5cd52f33f646135e577a7d52c6965e1bf2ca618a9b15cf10b36e1ff730f09e3f733603adc68d2ab3bcd5d88e6d619b526ecf86c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be31d6a7af35e465d4ffd9a68719285c
SHA16991182d3eb1d92d5c31321d8a6fe77c59731678
SHA256f89b9d58823efc150955d7ab7fd4b4b95b62b49ac7e607aa8c61ef68b1ce7eec
SHA5128b5d2872ee4b88b0ebdb22053dc59265496632650fc1edb0a42bd4e4bd08d76b515e2a3a2b9faab515ca0ff28e8a3b7355d826763343bbb228abb8f6b9e1e84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da55db62ce96c6223b32301760671e73
SHA1ab741aeb0e0466e4232601805cdf7f706eaa5709
SHA2569af68c9210e9cf25f6bce9694fb0b996e27f69a5c63246b90ea995b77f644998
SHA5128ff8f0eb1252f5c149420e22466504597cf7cf3ba45fb09b4f5263bbf5fc43451d9e6032ed78ce86f35699ef8e35f5797e6fc061cf329f619e7757016e5b8fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c70447a60d5d411385d94e7a7a27b8
SHA13311dfc7cccf04cd3afc56625fc53713abeb6912
SHA2569a4bfd81bf31097cee9ddf0d1f398b7a39d2fa0c01b24b8ad223aecd0b42d050
SHA5125f0496a5b65e4f1ec1d301d9a7912fb412d3eea217fc72097ee036d15fd211c7bf4d7c9547df0f668663151949d915cc4796fb582ec7b46423cf84bb1c5ee31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b4feef7f5000637caf75c3e2a9c375
SHA1ac5f6735cf101dde9f517e200d1e8b7c128dc765
SHA256e016ff8e75a2b10e89846bf270ea222794be4c70173570a3de2169cec37b7ee0
SHA5128495aac25ee7e578d5fc9a9b9bb4d7bf7bdd1fab0367a04d970d735c689df61955029315887903774e40978450b083e8f97dd04f240e520e88a9428e726a8b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534687b2d87d6254b9b48edc31d4cd311
SHA100fb9ddb1d3ceccdd24f28da8f315ade1153fa63
SHA25649e895cdbb732faea69680002cb1c1e871145107ecd128991de7f3fae934a4db
SHA5127a9313d24c98c1dbb176001fd7dc79e00f10fdcf63cd519e1dce3bbba3872ec03a4db5e535a00402f3a45cb27e14a0ad54befd0ac00d6676dd543a72c9c410a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6b1b75d1a9d313996ec2583c4ac561
SHA102df52c0af9489fd36589a676bafa2da1a7ee647
SHA256c092d1df47bb65197af477e9194879b9494137f3e8821465941239dfbe15b645
SHA512049fb833b74d1cccebe976125e8affcae5dba929cf46fbe283f2d9994dbe1efea8674478400059ec22cfbc10234f5f4b888883769b47dbc98113207516187f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c950bfa42f079c91db26f681fa54569
SHA1e8d8e89595570f51b4d34ea058fa4449f147521b
SHA2561e24b52edfa112388192a46326f9d87782323763486e6b5f6b41db69f1102c3c
SHA512902d3807f8311af29e8cbb7c8995d234354abe3929fbf2d4ee87015d42c062e932e180b2b25038c1431bec80e4f5c267079757946931c0b836756beb79bdc8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c8623757852005d2e4f4ec2e1abd2d
SHA14fac3eb8335d13fcae5323e1190329d538349fca
SHA2562bfeff1114fd9f12e6bd21e6047b777fcd51634221d15dbecccd170edd947a51
SHA5127282c333f80ce9f16a7074d000161c4c238b6664a5ef1bf69d484e6c702f0332fac9cd2f86a16ac99afccca7b9d9ff72d1b1f9989e20ba45d8aae041823c3470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c552a4eb7c0f449fce0fce8f623e37
SHA1d0b52783c095a237507cb87480fde57e5fb8d50d
SHA256fe890a178421e9615adbb313eb790cc0c5ab8277f7a55b40c4fd67a5229fb9b0
SHA51222d97ae0473f7dc88138149bf1e5426a0050e084e080f4be0ec85042777b43275db922ce78310f0af200ca9d3abd7b8abb976c05b7670d52c1761e8e04ef67e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548305f53c068084a80394d5e1c5ba696
SHA1e78404c056bca355b98491c350f51c18ece685ef
SHA25677983548faa60e19e719896fb253e56d26d13349a606a5ba3d4281f096508425
SHA512255d88c8f2f86aa51c101b243d6a271fdd5af3b8dcc26846598f562f8e49a7551fba2a54ea1714ba01c49542dd0f846bc755b317b976f6d16ad9b03cd8cec26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56265a36f553f452901d3baedee108baa
SHA15e7c44c97c0b5a823775894fad5cd4e4e254e11d
SHA256c887c0df03d9cf2260840ee36d238d25ee82052972aef94d05bb93f2b5ee02b0
SHA51219849e8da842646e583e8e945d8ae382019c14629e4b5a80c7766bb0d3a47f8b78c4109a8a9c71d92fd71248ffa75cd331d332eafb7cccfa199ddb8be8177982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6610def8217e1dff19dd4c0713ec41
SHA11b88aebb8b825160847d6ebfffc0fb4270683dd3
SHA25663cc5effd1ea565fbecfa214dd81b0c57539d23cfff0b91040c77c8ac9a33769
SHA5124c0b913ab82fc01ba182aaee042f9a95adecce2a6e8685ccbbe3f802a4a525d0d5b3de0220e7801316b949a8856a5259e60c26c40244be7e4b85e8534fdc4393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db716fc830646f5b08187a01a611291c
SHA1490d089eea960b6476d15ede163919df64f0bf04
SHA256e044f3779489a6ffb7b33d701c7942f90d647db6e2e877a69290d7a91e4d3e9f
SHA512416b0b39e0256ed5aa5d43ddbd43e4783b3aff7d468bf351acfe40eea2c35c61e492a287f51cd2d1787bab3f832d3f4632326ebaf877dcc7c890f6a6e16e4125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e4530b1157d9ad211de82952b9f7dd
SHA17789dfc9790daf43a3b9028029b795e50bf3ed87
SHA256afc13ff7ec2f63f314d7416ece97f21842222cb607ced1c75562ccc8e7bc159c
SHA51254e5e876253b704a5215dbb3cab955bdc7c9beec2d0c8997e1eae0ddc4535933af3b1be0d5cde37a8eca96f4dade230b5d83d5207c0f8803314d69c161c5206c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6922f5dea578f27cb13e965d60b054c
SHA111257e2ef69091b299e4da25749efd354c4b269b
SHA25607f1c1ea3dae2d1629feb78964774557968ea6c09b09090652f0d588622cddfd
SHA5127c96a6355dd82c0b937febe248fbb39f947160a5ea3a3a8b0294200f02c405fde8cfaf45eeaa97d33f9be66995c70c1cbc62a20cc98c7e32f16994063599a8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20b48cb9ee4d45960f8ebb75091981d
SHA18dc1dc19e36dc01827c4e7782d63d33f83816448
SHA2563385b9e90b8bcda9b94f1f18dd76476cf221f430c0338065005756aa0655810d
SHA512afeebb0fdacc8296dbf28012b9621361088aa1ac3f095a757a64e66fb96f44c187410507d4bf4c20bdcea56f50a3bfba04b89c9cdff48a3ec047e0b17b90b2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a35e9a124d20d8579c1506220ed8c921
SHA170d6f5044dcaa9dc207065f376b622dc4d642451
SHA2561940ea40217d2eb56af1745787e2770afeefda184daaf1c137835914a3d786f3
SHA512cb8b2ad394102bfac284d9cb1154ac835fd61a6f842b41dd083702aa350023685fa172593c530586411370fa0032857057d8cc0f597ea3c7cb3ad27ed014e12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58977fb61b56457f3d1b83f9483e5905f
SHA118b4e617ff7185442a6aecd493b2bacdc4ddd2c8
SHA256f046e75de82a2b410a77096268bc4baaacc8d62895345f0d5f75b4ceb7fd6fed
SHA5124c895712c2cd1c748665b7deb666984860ecd450791622b28db733e52fa0249ce7e6ad63540261601c8c92a3214368800a7a26a503754eaeebc40d8cbdbc37a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b