Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe
-
Size
14KB
-
MD5
328c2e30080e3140df0a31fa1b9288a8
-
SHA1
c9e83273ebed50d1dbc74e2df0e62b1afccd6049
-
SHA256
4b1c83fb2a853b7dcaedda7e78f0b135853fe21cba83ceeffa942db56a141c38
-
SHA512
ae54bf669111c64db31bc114840341282782c3a2d4bbb1bf79ca9e9a8631b3682ade1737c1e8ea55ce75b301a2d1229b717587b543411370530c4fab580b9193
-
SSDEEP
192:WnXROOgn+3pI5ahdoaeV4QKnyXYDDn1dueznptaq90aqNyJcNQxU3:qgn+Z9eV4NnsYP1dukCQ0ecNQxU3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2376 2112 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426732806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000074d1006e1e1742ca31813fc127a1e0c65c162b5465ab48d6a4d6f0e6780c602f000000000e80000000020000200000006fda57128e58dc89a2814815ab9b5fe47f82e124c81968ddc6047211c93ee40920000000566ddcb6dc3b766318b5ad3a60fe3614226575cac7dca6041d63b378a4d10a0440000000a403a8931ea4c9d0d7b7b56d69925d953caedda0b9e8acb37e2979183301fcc977409901d82574ddff022489bded8c3060c91bb2bb30e683573ce6544b3fae75 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8091ba665fd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77746D71-3E52-11EF-9CB8-C278C12D1CB0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1804 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 1804 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 1804 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 1804 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2376 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2376 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2376 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2376 2112 328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe 31 PID 1804 wrote to memory of 2828 1804 iexplore.exe 32 PID 1804 wrote to memory of 2828 1804 iexplore.exe 32 PID 1804 wrote to memory of 2828 1804 iexplore.exe 32 PID 1804 wrote to memory of 2828 1804 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\328c2e30080e3140df0a31fa1b9288a8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.windowslive.com.br/index_msn.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 4082⤵
- Program crash
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6ff5a8a185ac5517335d9e49a8235a6
SHA1a553b3f21ea30f4fdb6c9a91c15d258cae29813f
SHA256c0a10a2925d2bf638d3a0aa56dea3c8a731770470b5068b5687da0a41432b9a3
SHA512e11da02f2d76095e8635ea266799207102b4ea99c5acf059a482df1bdb194b44fdb68aaeab561d7e4efc19ab37a73afe1517610b33867d5b15dd63080c339a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c9c3255fca9d0c20220c33cc86119866
SHA13eb426e4bdda78847961f65cb8d737e27dcd285f
SHA25689f9c070204db80b6e2af969b73835c3e0808a87f96cdc709536b5beccd36c70
SHA512b1f9d4230759ba05619425e01b4037127bebdd16a95b8d5b284a5f8945e8978a5fd4a1c929afe4e19217acd5c70871371e02acbdd3025fb6bfc7cf76a91ede33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a4296ef9fd981952541417421869513
SHA16e1fac0c59ae18e2ef3801a20f97ba38fe04db64
SHA256aec8a87b8b3e297c425170586c0901ca87494674356f2156656cb8c1cf699fae
SHA512003e98d6205c78031c4ed23b5c44f719b401a49ce8a54c6b7c132b40575be10d7db0164899a5df8da3fbfcc68733190429a5e10030d9c115c94d45c9a7cf0639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d8ef56dd8f6fb225db623c4e6ae2f152
SHA100790cdf84e995d7946b2c23586f5d52b8294f98
SHA256136abd706592022351a59a3b4fecd4455dd694d4463bc0317dc2b8a2a90dc049
SHA51265efdcce6c5198b8e567c6befec5db02a5f023da4a371d13c4cc12821cc0237945dd0cfee943af675cd20eaa39ddfa69c1bdfac6f56169b2574d24483675d8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7309196d5ffbe10b5f13d4271ea43b4
SHA1ab3d5fc437d153efb98f48ef9345fc4c0fbc7885
SHA2562e37b4af0134a2e3d912ae3b5f9368870e91256e048a7d9fd15cb23e96a668d1
SHA512de1432dd5d97b1b3daee33c508c71af5c48de1af9f67635414e4e144dbb85ec3cdc00c534f9b24b08603c1bfcfed9f92ff9a4adc05da8d3cf4fe6d522ac8fe9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5075c9053fcb78f46e56cb420c17088f9
SHA14de7e57dffe923bf2a611d2545233756a8d70288
SHA256403b241790bbd979ce0a2e354ab9080acdf719e1d72bce890c72dbb7ab6dc04a
SHA512a2d6ac851dc55333edd257d1905839b3fcc4b37f251f12337e673d5762c5838d52823cf012c1f032823fd17fa812e04cbf03332a4f01d5e9d0e1992cb366e293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5633a5edc5470abebbcc3e9f86b648a02
SHA1eaef0d43fbfd4ea7996e756d3abe16328f620187
SHA256d217a48ddc92b09550f06a6c93561f585014e007d72578ddcd6f586346bab3ab
SHA512d4e209af7eeaa09d8256936b2dd135066fadf1f84e40b7835f0d04a66bb70e51e137f745249fcf8bf03e206e7c81447550bd4602dcc78aaf2211066785226af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d5c7d802b52bc2245b48347afc143d8
SHA1d05fc782a2073e5b57025146153eb3b0319ddc9d
SHA256b148e3ed481be4269178354d29d88976ed9102a3d0a992121be4dd1c8ed0bb1c
SHA5127d8db0fdf8adf6b715bf2ba2f0998c5f19130824cde31aeff14ef026e328c270b072a1f2c7f19c2d7e480c7dc1adb26decbc0d6e287d9eb72bbee10b1a5f6f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55825e05b777ad30d707ab6078b4fb658
SHA1eb9ea928de7397505838cc69159fde0fd12cc55b
SHA25660e0d7412ff24a40b26b9bb4890bd4f5d2dbf5a8d70e255e5dba79b21fc8b097
SHA512419396a9b93609d378af1b6a6d2c83bcea5c94954f3a11f1e65e5abbeccc98b71b28a12b9effb158dc284b8b2093cefb2105473fce075c936d2bcb3e77d0fdbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526d699dd2f22f81eede258be59597fb6
SHA1871f72c2c68b49178e6e647591858a7fd3e1200e
SHA2564c5d2e4acee9af72a2e6e491d2b810c2a6f1146aca263677164538ac7f05aa83
SHA5129dd2ff8b545e23dcb6bae677965cc1c7b92a700a3785348f0ade604c45ef093ccdb3a6384741c6f1ed91884dbe169d3d6213252856ad0b679a12ccc0890a9622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fc73b64eaf5e8b21853f695b9e2d8a3
SHA124f00d08231599f4e0bb8d5ac9124214ca193fa0
SHA256a81489c45272ece046f95ce8e3ac45d00cd91f1b5114698cf513fed8dbe7dc44
SHA512c49f986071bf9d8201b3e22d47b6e6b788515cf9e28c48eba6d4cb4f53d47a7e67f149a19686e1ed2974b4bf3e7753289a8efe37d2d07cda35214d99cfa6bc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55115ce8a1d651af00bd966ceb4a1c86d
SHA193054daa765d746d9d526d2da55efccd72bc4c00
SHA2563372a402c6739f2928a58cae508fd1e57c21d57b7d4d896069c40f343834b51a
SHA512711afbc210630fad0ad1440d6f3b02ce3a3030e4de6c5ce78fed934459187fe43c31f70295a601eb56b8f0be7d63f5c33bf0185ab4a73c283a0a15db857f7e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5989929468665b7a96e636c36c9b2f8e1
SHA1028bd4f9181574192f5d496ddf3a4a8e23ffe2bc
SHA256d6df8e60a26c1346527c3f6a2d59207d6274a8821f778ff8df5b51a6957cb403
SHA512ce2940cccc320886fb53675a53f0793b762ff2e4a3909db178042a46f18a66624b0a778f3af91fb0a4117f8e741225ef6da740452e3c5b03078df70fe23d39f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c98a65315aa89e3d8bf30a08132001b3
SHA1d07a552d7a314a42d34efe013adda83c222c04a2
SHA256f4608daccdc878c8e4dca12e797e49b15cd4c4fae9a1a766170b1226949d5c6b
SHA512c3ffbba27dda9cb218d1ea4215d5f02ca60c4efb57a1ce636ccc1a4a0c486fcbd1dca7040a4d514138469da26e1e9db2b271e2b18ceb76353a97b2f5917a6336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5624f6f68387155185db1f01ccfbcb83b
SHA11938cdf1da8a1960cfef8cd1a3a99e16d3bf62b3
SHA256ee2e9e9e13256858da2edf99cf00f998dcdecdbc573b2d156bc06e5681ba524c
SHA512553d3f79ce02ee8fbee75bcfc2b87a3352dd5778f595d377a976d0241ac14a851722bb60cf6abc2415e9a6be7a9e7a548aa9c02f9e928fec53b8ff0b378d3501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56265010c8c503da715a4d0ff17042e69
SHA116304db24da2362e3f51aa7c50ac39ba325cbea5
SHA25681c393f9de33c4d5d04c8cc972d2f497caefb97a8eb0442e6b3f76cdaea7d3ed
SHA512d68ae1316319ed00075fa71d71e53875947015504cff0ccbf3175bf1fd67098e1dde8b96397b489d5303ae41d4fd68f93d1a5247b306386f3c1c68a74548afc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581c5ac125ab4d9b00f69986376990b8d
SHA1a42fe667786a41c46105866ae098888cb1fdf676
SHA256c943610a929036722c471790060e4e19992c1395a49f7664673b99bd3e30d6e2
SHA51287b0adf8fbda43c6cb8c771eb8bd76a7d70a76d267026d37e6fa8716987c60df4eec8488a9f3011e47e5d2a9f079374741d92579ce2effe988d3b16ac914f287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c57a37890da4e633b5e5a4b42d8f8c2
SHA1cf94ffe01b9d2b9f969f04111c2e45e63fc54a5e
SHA256d287472651f787b7165b4a29faa17335d0f4299264db6835953682701ee31fb7
SHA512438c06aa6f4deaac6d618fc389314eb291501c5742655d2f3908a84a2b456524e9b36b126f734be230a3f4e4f472d89e36f266c4f5cb4a75ace6c33bdf270237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa52fe3756da706a4f6e895f5d3819e8
SHA1850c45634cbd2e0be379d4c2d968c8e1e8728dd3
SHA256610f45be3763bfa781aeab5cbb9ea786b71de7ae94cf345bfd374638ade81b77
SHA512cc017be74133ef2bb7fa3728412c97f023284b1acbaec6b4a8fa4c2f6452c94465246cbab93ae83753ea54d028100c25354f1ce22ba76587715850c23d2c0de3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b