Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html
-
Size
53KB
-
MD5
28815c33fceab37e841aeb2cf300b6f0
-
SHA1
d94e0816de15b74ccc66ac99dad667fec8509907
-
SHA256
c51423d2282aace4d3205cb0d32972d3e5ac83a11104c7f876570bc44a67a83c
-
SHA512
b7d3e067732c2d85d3c16ab2b850fa0572378d3bc2ce1731d3379bd4943af665cd1affd7689be1c5bb4f3bca2ad3f59cb30dfe6e24bf94efa72949cc35314797
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYm63Nj+q5VyvR0w2AzTICbb0of/t9M/dNwIUEDmDf:CkgUiIakTqGivi+PyUXrunlYm63Nj+qw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f054d1ffb5cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A0FB131-3BA9-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426440189" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb6f7f4a7d27f04d9641e57fddf7c94600000000020000000000106600000001000020000000a2b8f694c6311c8100b8d2ef26ea2e3fead515fcf103f938b6e934273a94b0bf000000000e800000000200002000000065c9b1277ccb5d5b9fb99d35e552f6a80a09a126a53a68d244891b9766eafc3d20000000e5490e463e5b931229e3d0c139dcf8d21fc4bac9395e05b6b0454d632eb9e3fc4000000037c7179b3fc30eb7fd377cf5be85d0f446d93c78d6f5ee8362d09708f679f47235cffb78dff49986ecd884c2fcd728325eb54ac0398743b1c65d02bc29e1d3d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583496af10d7815e1641473e68113691e
SHA169d75fbab81fa6a6c187c8aa169627323a9b87b8
SHA256338ea9e67d9731872eab7ea17b8d3b2d37f1c72a494c478aa0f042356b04c639
SHA512cb5d9665851e69c99713010b144dbf0c99fa0733a313729dd2103ad307030b76a37a6298d89e18b1b2dcaee15feffd6a8c0997dea64e05eb4cb21a971335ba17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510fe9f254bcb5a6fc9766e9687c363dd
SHA1eeb052c227eaf99fbe9807bbd3ad230d263a83fc
SHA256e700ad7eefd6e63cb0d60580109423dfab94bb31fbed93e355f5b05e12c2b621
SHA512115017cffae749cea7dfef62650e82024e50ff6cf8f7edacc217483e058f658b8c98af7071adfaf2ed019c9a9ecc7d07bae87a12e0ad7e7b590150b4dacb0c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da316c3de44a961f8d1faf714947e2a6
SHA1f09fae64a489c9ce68e9f9a9f66c53c829936761
SHA2568b485142aae2c5b486335668f09e32750dba1035567f4b7da655f87e96347766
SHA512448ff0f59447ab79e62f14a443feb402005718e70c71a59c42ff8a2e7fa5a77dd9a21ea62093566893bde6b78b5486fbac0dd55e47dc7791c159a8d4256ba10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b44010beec68311285ce5c05320de1
SHA1a7be3e5efe2bbaa56632f65ba0c68a511f654dc5
SHA256076e50da080c888e779e723c74f89388dd41320cf5b6fec63e4ce8caedfc05df
SHA512563aeaac6677295a987870eea00d66484f69548967b44a704312e39044572e7fe5432fcd2eb0b8a670095541b56b86300895d2611172868c9600e763b883896a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592e08c67826d2bb49859a3f4814e27b
SHA1b97df33b914ad72e1bf2a3d213b12c463577fecd
SHA25668bf28d61502c587057a4cd048db032eae8f69088c172ff691243c5de5269f0a
SHA512f0bab79c276fd18e7f982388733dcad6eb3a9e25e6bc6a474d6747a8be20261a3af91600fc82ce0ef54589dbb72c1c947a27cdb41b393305bb4be3264d1780ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a627d418290aa829a0a76523c8e7ca6e
SHA17a94738b1e8b1ef40c014cd11bd4c877d494323b
SHA25600b2c7a4c6b9ccbff713d737d594056ac0d3e9e35c463a18b20eca9a22eaf8fd
SHA512d760fa623c4126c8d1e8a0b2eb996ce9d20a006db93f92ab27e00da2ade405b4f9f175f738e6c7595f80bb4dbe96810b3c91bf2e7a6ed64abf448bbc0eb3fa01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a0061abe746a8e6301966b0b93aadc
SHA10ce5ad3f6199e09ceaa654ae25aa66fa210a08f2
SHA256d0aaef6a1c478ab164b775f77c76763b6836b93618681bd0c4a9252075a3f89a
SHA512fe7ef5885e31d0e7fefe701c3ae00d9793072d098c0217b19a6e12f5970533ea8dc1a64190e2b5643abf89a8e5fae8a1da4fd92f2cb5f728394c57d596852731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f6937f565db14fe1b27ba5a0d1853e
SHA1517d06335b7cb9250e6af2f7d47af244c1190918
SHA256f12a89002034dee9d471bb143829664793444f902db7b62e12dc5e90a9c9c135
SHA51267121dd758aa3278614a76f78074a13f8a426fe57fbfa678f01d84132dbe76b78c5631a14dee0d1146d83f33e03c1cef875dbae01158f58c9f69710997f21fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dfc82276f21553f8640a87a727cef6
SHA1ea795ea944ae1373419532929e5543a735dbb82f
SHA256bf2a77fd4ebef1da73b62e30662cc4dfc6934b4c28f9cfa32a7fbff38630eb0f
SHA512f0936d53a7779bbd056e81d697ea2d7763223c401d8e7adb9146736057eaf7e73b821638b4ae5b90e90234370cfc7cb0c28085825a6facbecb89b1ebc442d832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53382d6b4d3a1fa2f15798753487fdfb2
SHA1dcb2dfcd58d59d0384987240c7039b2de403f16d
SHA256ad0bfaded74adbb0e850f96e5f8255b7e7c13367d9609311cc09570aedef0bb0
SHA512777c4f5576416e6a954234891c9bf4c1da30e4fb582f2b30a7c950d9e4946770b307b4cf1f8d0078af63d0005276cfe970b5bcd407d8621deea997c16d228bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ea17efc0457d9d48a7b2f9ac3fe444
SHA164c6bd0cf372f6128b0caeb53d298d701e46b7a9
SHA2561cfa067ef50ffccefe91d0a1ff2ae7cc2f8aa23c764d24f3225eb16823944a3e
SHA512ce211e076e361c0912398be72481d25744e34848c1f71089d0c0aca0fe040cf3a14439e39eac80c334983c8938f51579012152fbe9a201aaeeab933cde2d8a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700abc01e81f890cb82ae0a79f89f947
SHA1f4fb24262491a37ed3bea1311a1b5fadcb1c0484
SHA256fb21563ff5878e49d14895429876f64f3d351dcf3696c69d04bcab051f88366b
SHA512ef4c67e3871e07dc4e33e70289c4ef5264ff686144f5262b88576fbbb08adc532fe0319f012cff5c6a6f86c56ab0f8b2a01bd88ec9d7fb8e05333889969c6d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593749e5d91da1924722673c0e3c6c026
SHA14650bcb44f8fc0b968c6f40f8d9541ebc40774fe
SHA2567ccaba92903262bcb05c43b39e8178c0bbb00c0a8bbe581036bdbc2cc56159c7
SHA512229dbfc999f4d5987768e0379141466c0a8ab707132447bbd06aac5f0cc21a5348947201d814d27ae96de65964fc88aa7c3a56e0c32f0c6e066d15a1bac80c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548fdc845d8083a80edf004f312024afa
SHA1ec7f5fd5cecfaf19e9d4e0447c825f2a112c6873
SHA256f71e2a366c776c68b5cd6e4bef7256e22ad21736bc47dd0e00bc292ced7a70c7
SHA5126b1f9319ccf844229c5110eed0b10c8b4e265746af165aee4aea79443ce123d61dc4d7324da76ac1b53df5d562a0335d785e80c93fe0bfe0721010717ad5a7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569070751f01d72058c4e0e1d24fb33af
SHA1228593f3866119b55c17c32bfb766a2cc6696eb0
SHA25662042655337d8cbb8e8179b54b28817739ded0b5907e6fb8a5ed79abf5541fb4
SHA5120edacee6d65eb8fd61ae237a219f618b3a2c4ebc2c9246ab27b8c4dc62d86131c29a75bde8d20d101199e140df383c7c9b851e844ccdab423a51d0752cd69361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c30e9b179070dba4b0a6afb5a0a44a
SHA11c6da18663059095cff4d7aed0ff202456afe474
SHA256dd133245caa826599239c9266a3977f557f449d860f3df42bc0a51dfdb300b8a
SHA51240eff4e875d068ff8012c4cbcace67632841b3bc600ec962923da52faa4fedbb0c0a63b27de5671c3a4f5e5a3abcf784dd24214881f240f75bf85bf4f72a9552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7abc88dc7c6348f045d7337eb8fd0b7
SHA1eb85978240d1784807ce86b5fa3d86993309910b
SHA256fb3431cab60d6165df464c857a688c8d196acfc2aed02e8f386de203f7449deb
SHA51207909b1115318c209a74f47b6a9cb7a2283d048eb06052a07934d32222b6fa47e17245df22167392415fba78c86aeccf76f94305799c04441ddcfa74ed04ac8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56371c1a7505cb1029d9214645ae8172a
SHA1bfaf9d74c5dd7748b8d00fc286375a97793976ff
SHA25675cf77191ed769989d0b1e9177aca8497ae7b4c106cce2a10853540b2d28d3f9
SHA5122025d725ba6c0d3de89224bb93f8ac00fd741137ef6655d1f96656ca912489a260d13d9da113426b64010bb9619da623aaf55d6a102c8a93f7bdeb6a64ee9c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19d0a649a1b5e0d0830a38149008025
SHA1b3123ed93c7723e67c753bcb19d28f358e1d2b5b
SHA25617da3b3530d07fa85bce0d62b5fba1a4f5ebf85816368cd5533bccc69a74d2c2
SHA512ad76743f903c3259966c68b1c65a01a46836e5153afd37c0f6bcca5fe52d2d2ced06b875a3ac18e697416acbbbc1f92dd59817fdd3c268adcefaf7492d252762
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b