Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
2580aac3f1a7934473ba86fa927ca78f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2580aac3f1a7934473ba86fa927ca78f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2580aac3f1a7934473ba86fa927ca78f_JaffaCakes118.html
-
Size
53KB
-
MD5
2580aac3f1a7934473ba86fa927ca78f
-
SHA1
e0f01bb868e66e537663a676ed51f1b015805daa
-
SHA256
2f36e4e883200a44a87dadbdf27703dc875aa54f7fda89cf0c264f247a7badbd
-
SHA512
b080fafa9eb598342a9b14cdce2148a47c5d52b3b6fb5b54b75d73099be05bf83f42e12f8092bc43eae6c47c10f5e1e552d25bc3466ef670b84b680cab73d2e5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUtrunlYk63Nj+q5VyvR0w2AzTICbbgo1/t9M/dNwIUEDmDl:CkgUiIakTqGivi+PyUtrunlYk63Nj+q0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ba4171f7cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c17a8895826bed4bf3ad12bb4cb63c9842c4783292342ca3eeb59fce20ed7a49000000000e800000000200002000000019128a145c5a761b2cb558a6997aad35a2951cbcc204a9768f2900ca6779ad08200000008b26bf2d19d0405697cd7773eae70218a1009ffafb79b03d7f290353fc3169794000000045a9ad1c1e72b33c0b949128962bffe3658384b5786d2e717af6cb0f988608b7f5f118def28934b8ac981f2bcd82388068c9cadd9c2e6030cdc469f22b3ed67c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BF211F1-39EA-11EF-A649-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426248394" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2160 2168 iexplore.exe 28 PID 2168 wrote to memory of 2160 2168 iexplore.exe 28 PID 2168 wrote to memory of 2160 2168 iexplore.exe 28 PID 2168 wrote to memory of 2160 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2580aac3f1a7934473ba86fa927ca78f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cb36eba385cee3b7ec32ad6043dedc
SHA14ede4d0417c8fd1ab520bbe7e1a4ab5b4cfaad53
SHA25629d6a8cc3856e11f1c289b0137bc7f77ddd7228030f58f8afe253ce7ab981ff8
SHA5123f449ba2b6014b6faa3c5953f08aaa9f34401dcd98688b04302c920dec88bdbc8b1b3d959fc99078925f5c60bdf6141880878d8a41a45c33bec82fbeebce4e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bec3c302ebd839013308f5366d978b
SHA1bfcff4149cbfba86ca8cd62fb1676c366247d989
SHA256f7755f80fad579fa6505a1c400d22205d7c282d6e777600af1503443b4d6ad36
SHA5123944e3cda1d3164ff53f1acabadd9c7655cee0f72c84d7266cd6c485cb3d2d81de69b5fb1ef82890eace6c9da8932f46a47fb9498ab8710e4db5d74736f38b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812ab1a44fc38a9b6e9d022b037d4eab
SHA1a411ea6ed40fb09168c8fb02e4dcd4d9874c5858
SHA256df86f6cdbbc5cadb49191978aa776f5dd55b280825e421c2d4f4691cbb88f053
SHA51201f6979efa73ad7d5fa64e1e2bfc6f0dee2b2a7b8adcaf76378209063dab3b25f0ba1ddfc3b30f56b2495523eacf146d743e1b3b1e1b25e6c5641a19258210f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159a53ad6ca5873273ac84e35e7af944
SHA13fde2d28ae9bd44837d64490be5c507762f0c884
SHA25680dc920157c30bb81719579fb6bd19337daadcb58fb167d5b4cce641db2e8384
SHA51269fa1098cf02f95f14ee058ce08d39138d8202ef8af211600dad8829044f1e62ad4f6878a4d35e19d5692f9b0ef1334f764d2d34ea2cb1b68e4516ae265ba63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed5e1fedacc54f67fbee4fc9232374c
SHA124d5f444607b22a3cfad4b4fb2d88cfce712cd11
SHA256d02503497fbfe214c93b183c27481253fd651753be7428908bd6770b99d1089a
SHA512d508420e12ec6fbfc48de265f86a31f2257748180650495c91f7d5d1cd75dc6df946d762f07a4df823709a2ec07dcd0f29e53b1531806d35f2f936385f38c8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f223925753ecdebb42fa2b1ccc6001
SHA16aa04992972cadd657eddb545a9264a6646c0ee3
SHA2569621652dc1cfba52bbb67c9f9198324da287dd342b666fd675efcdff7f730349
SHA5125ff7eecc859d643091dd47a62ef5ef791cb8d5c999112067908be914699b110654a630740ef5b74ccd66b8a056d5cd168e0b63aa727ce854d308213906e1cb96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e295f2e9c8133b6975ed78123613f465
SHA1daab8ede63dbd7fcd4b738fa1c23eda063d79743
SHA2569abf918c9b3b9cda80e53c10a0c090349d04665463a480284ddaa82baed4d125
SHA5127d5c932ec8b998c0109a80fb38b15bada3a446f15cb51927a58cec008d6a2f1e652bcee232918d51d4b91ef15f303772457f4b3a14ad98174fb19591f3589f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b59261642265b17c03c75c7bb67e4c
SHA129d4d76dc9097c1b70a2e83abb8460696f5f4a98
SHA256cdc52059c81a4cb5260560bec87c511cd9200ae3321ca50861292ffd28baf056
SHA5127c2c3285af9220a17009106b8fe3e774756c63814a799f626cb722edc0958dab0bb0b8ec536f98a6027a810ec0271b1792b22899f91832081c5ed00ef1a70bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3ecd8d95c4fc0ddea956a4cc41e51a
SHA1a220414b50bfda1c4642c14e39edfb8d462dc4b9
SHA25689c0e8b4f2a85815213617d17785a9fc16f5b8c31aeccd89b7ba8f62832e5b5c
SHA5124f1d155d27221ebaefba4da45286a42422c43e3ab0951b1601fdccc2d74dcfb6415ec1d38e9459baa7405c15b64bf45c92245ce20b7eddece4d07ab1d8f28457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421b80d48e33da5f1b6a154c0f89dd65
SHA1cc1ca935c5a7cf707c12f41b41ba42915251d419
SHA2567c604416b89252bf52efd8e7918aea750fa4c5e2a4b8a5a5c79eef9f49f9b17a
SHA512976147038a93092f8ce6ab28753d3d8ca98fba58a31483a8b10bf1c6f163db26c924835b4c239cbb6db8e5e36b0446fec1292fba4c1c59461e9ed502b8c73f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf3f82ed188ec9b3ef91e142985519d
SHA13a236452211ffe48759f790d79cd65da20fee1e8
SHA256459c393379bee56c017364e3293ed5a688575c434aa6e8b957ca0f53849d91eb
SHA5127e65371f6fa819d7d559aa4f48ca7cbb8dfdb8a47ca10d0e1f95c72615c67fee8b60f2d8fa72a681d62994bf2efff9b10a42dc262a5211d2a6fb0d7bd3c7494a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d97e8912558d53e171267ccc085971c
SHA1562cfcb86c2c288615cf720a94846aa97375ba7f
SHA256d8529e00912bc4a03848d100c3c06252aafe3158e93fd7c8a5b20064ab11ed1a
SHA512ee9b9ed55acd807ef2d3fd7b7c44823e2860391e6d6328969ed7722ed3b29b14350a5d4707184d30f22cd444ee7c5bd63c0328d4227fbe308c5c6ea1bcfebe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba05024c27da2899459c6d6631369dae
SHA12b1e5364040e8b41c4897ae7d4055be2df2c76c3
SHA256554fbf39c1da4ea8953978b1d76611b17f2054e861b0b287a44eff468e913d63
SHA51233583a13f7339e167213978affa52f83875958768b5ef8d2a93a2338316c5ecc51862a5c337a17b3735c1898ddcf3064ba910ffe457f0b72c6eda095f0569396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04e146a4edb836e4c3c169d9b3a02c6
SHA19baca434497137e6995bd9bae6fc00d601350ce4
SHA2563b108bf8029aac03ac409e2b6e4a1577083d0193990494f9b00051d6066b1570
SHA512eb77f3183151d596a334e57d4079323057e97a89a01f6d70ce04cfe716b900b5a4fe0752a254c353d8a5c4880a62feb3b4392b88cc31be94038b3ea6804c01c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52685ed3785eab8a6f7ff9f1c8824e0ff
SHA1bbabb44573fa40f410ef75b3ebe6213bd61a3ac4
SHA256e8669f5a399d64388b272d8eb517de2a7b007ef6d777c02215b35416c71f6326
SHA5123f9fb8294c0bfa8421bbbfb6f00cc6f8b2e1d19bf0b085e791c870c9c26fae7af537b191f17db59a607ff22d6ea0aad49f3f65db84746647c400f28d32d8f486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e772e8844d75ee831882b0306d29bec
SHA1bf9bcf93905a111b957495cc35c88451df63be76
SHA256ee8255b43108d4b88e4bc22cd477c092f62e076553b5c1253cf11a4e585f31e9
SHA5124883d54f7db055d5189d60ae4b8a05f3332f294db1372249884a8fff4478e823722214e70124d9d09673712d018c3a3a9192541f83a9cbf54f7e4d5a42130653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51170dbb03ded9de88b0d306c05e49329
SHA1a88f5c408969c306a6a513511ec7c8c0ea363448
SHA256ad78865f0bd3ba0961e67f38af2618ef5ae15083efb855b924eec41838234b2b
SHA5124cc80a0b462c7dcb89cc4be49bf5eeaeb13fd82f0023fa20029c91703f51b3cec296decb813a8e35ff8ba92fb6bf2c34e70ba00e003351dce433f46e6758f431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d381280f7aa058b6d0e26e51b186977
SHA19f5d52bcbd5aa0bdf37e2d7d6021e50d2f610371
SHA256b7c5d630df75a3b2ece4e7eb0dcd442314365d3672436fb044e3c069c6b24db5
SHA512a9fe87a5a8dc30c35d67969426f92e3fc412ca84ef04f9a2261471f1fa8cd7175b9a0c7fd3c3c83cda857ca10482fc563624a819696016e6792553df2ee3a998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91b5742b5882a9a05742c0cf31accf9
SHA102b45ce568319670d5798ab403b588ae30f4b95a
SHA25627289b12a074fdf9f252be736535224af37804ae50dc5a0c4108eadc0634f3ff
SHA51244aa04541381cdce7862ee5ed2f8b16fdde465a652fd694fb9d89582d3f5b025f566a0a44a6d378d06b574c34d8cdb8c3f05d7794821b80bfdbf568ec36ba5e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b