Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
40265e82e577e318444858d5a1f4e313_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40265e82e577e318444858d5a1f4e313_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40265e82e577e318444858d5a1f4e313_JaffaCakes118.html
-
Size
58KB
-
MD5
40265e82e577e318444858d5a1f4e313
-
SHA1
856cf941013b7d808b4f1eab7da464e31221c7dd
-
SHA256
49db59d36c420967bbf68b0d4e781165ef4f1d1815cd84b8490468848f45c9a9
-
SHA512
1bef247377cdc1823e53b83b96bdce8162c1b509d1c7c9de3f10fe74a94895c8d6ffbcc3e5a7cba81b68dd86313e932bfa54b415bb8af82926dc438a4b0351af
-
SSDEEP
1536:gQZBCCOdj0IxCU5wXflfUfGftf4fRfJf8fEfHfCfmfffbfrfvfrfkfrfC6fEfBfA:gk2V0IxSts+lgZBU8fq+HDTHzMTlspFO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CD9D7F1-40CE-11EF-861D-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002039f2dad4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008bfae1e5be21d2849aa85a5f733ef982437c563aeb96902b3b52d49041321be9000000000e8000000002000020000000caea5e628bc18b9e79be76a7262a1f8b0306b0d0454721bab9be4f27cda6a0f12000000091ed5616363e0da4e03d5c081ff828a1930ed279078d14ccfe48f078666c83cf40000000f95cc6d61b1ab7d1fde3455be390dff990e27a37ec1ff56c7cfb983be1b976f84ed8d537df7ab975560100a0feecedf818d2537dab9ac7e376f9d93e91cbae53 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427005813" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2732 2104 iexplore.exe 30 PID 2104 wrote to memory of 2732 2104 iexplore.exe 30 PID 2104 wrote to memory of 2732 2104 iexplore.exe 30 PID 2104 wrote to memory of 2732 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40265e82e577e318444858d5a1f4e313_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f1dd5ef6aa547e80049f5ff985ae40
SHA13a3e73b19f55dd247a6991915f04c7b64e2f80b5
SHA25631124d50be4da58c4828a5371b4a15d5c21dfeb639df189b87a59c9de6c691aa
SHA512e2efec70c01ea8623d44d34ba7b4ee3cc895daf4cd5ed78516e9c59add268b40148a0a74a18849480bf20fbff19768848eb69135e8fe670d4da09f2427e28686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14317575f881b691638e6d48341c327
SHA1e16a07533042a33e1c0ea2ab0256b6b4ddbc709d
SHA256646472d712d13c7fe158f69bbc09a60530e2cd12ae5ef478159ad390651557eb
SHA512b9ea94732459209201c6cfa4808c79f4a100886bfe7cf1953401e77900da9d4de38b578330592738f2ae6c1bead38c49d27d6999e519ffa64a86502b8fb9379f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56594d9674cc75b058c0255567dd78499
SHA1e2100ded44480bcb0c55027ee752805cae9c0a32
SHA256a4108539be8d2a4f83fd674bef884f09d8ce003d95bdab8af2e38c4011634281
SHA512b141a6a69576aa55531e179a00155438ce2363f00005cf228913c6127155600f896548f2d84f8b3074cae911dff980c6fa1a66ec40c916d43cf0fa4ad5c680c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d11ef7b37fd9e563a02f75c218a5f865
SHA19746c160a1a244dee12bac336aafea89ce9a138c
SHA25607d4d598adfb76b44e50a9f49f0f3aa5fa96658e9b8d49d23bf890684a8796a0
SHA51258f5d02a3249c1cfca3f6e82765d62f0236abbf372cb80910cd4f9c888a12b9791fa85038847f9951578b6e0200203e56bb7e5a5286ec291d96d3a119313b22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d64bc46e5c18ed3050e40491ec074c
SHA17794f85b40ad40a7382c8980185abdfab9b71e57
SHA256e29108cf62e0f6e9d48a5e0f0cefa40236ad6d9d038c70efde1a360b75598e94
SHA512a4bf2aee7e0aefd3840e0a08c96757d2c15346b8d279b829e53ca054dab6378fda0d31f8d18e950714a1b9e58e0a9876846546ca18fe27ceaad0d3a1a3f716fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df6f6dae78ee5da668376e7cd706882
SHA1f77934cb825707b9024e1321c031aea96972d374
SHA256badde1d7a8e5ba8e967c303e6eb9d95ba4e3c1a64757b538e83c8a00d7ab7406
SHA5128715ac994533022d1bbcf8c7168ce0c2cfd473c4766eaa989eefd917d6f763ce3f5ea438ab147819bd18566efb4f0323d877200516db6e77b4a65e8aefce2300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f63153010815a8e70e219723834a02
SHA1307d1b7fb824fe4acadfb01459f4d6922015c2df
SHA25628ee1cd7416d7312ee4831f3ab33a1e1347b5b884054c6c5a53306cd2ccf6d39
SHA512216cf875172a3a0ee24d40bf5104a601a4101613787f5753c0b580b13e3bbd990b5128badf577784cd498dad01690858031ceef68c4be8d893a04627249d74ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f98a72392ab830100b21597e5b0eda
SHA12716e07a10dca8df1a152daff74451b31a91fe59
SHA256a57bc3ba5f2a5611614b9fe1132042626fcd87a76b0b7f761d91d29b704e7a97
SHA5126770ceec97b6aa225e67249101e41143418e26c4d415b6013884f3a17170f89ba9e7ac557c32d54cec516bf2c8103946e5455a2aee9b677664e36a1146e10a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547406e2fa815b1b94966c201159d21b9
SHA1f5d7b48b61bb292c8d4a68f0528a83a99727b051
SHA25645265032bc8e4f62cb58fd712665507d43770849fac01817aa5d16a9f6c19cc7
SHA5124f86396b9e0c70236f255de2d20baba2c9c5ad4b8072221226450f55b951c512e183e8c2654e0f9e218e1223e13e6c6647a871ec05a5368d92060a6c99482ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c005ae321485e47429a0d24d6bdd19
SHA163c25185e7f91db2d63438e87e2a6f09a0584ddf
SHA256ee463f3fe485dfe9c85d8b5051f6af319d803ed2fdf956025539d6030bb8bc88
SHA51237cd9b79ab16bf49d296ad56c55e67448ab3532ff9f4394c44b009464524f4f6d8471c48360777816bb4b264d99a8912701af41d8c91b4994568f9254a4ffdab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0741425201f53962a0b294bc60c6a6
SHA1e62f550e5d8c50c7bf36ed2903b403054b50c98b
SHA2560e2c335b99798f4d2c5624f3ed685629a1bb3bde8805a8cdeba93d6ba1e1df1c
SHA512ec3428f47c5482f57501fb1ace2dc1c5e547288bfdb85f1df1f648fdb01121e2ddba362afa312f2903d0986c04782809d6f7fd27b62ed1708ba20c04b29f6f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d0457f8117c9be5d358ff1a54aa278
SHA175b5e6706789a4455ed169cfe839d034e6f388e6
SHA25642ca2c99bde9ce47ceeed245399b94005329362bede36bfebed3936f731d4139
SHA5123b5e631c30a681edbd6d1a863dc548db50f14ebb583877956c92381b2b8da03df4527367b4fd8df0cff92828b63da0f7b4bbb4060e98fe2cd57c65bdc9f7a34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a779de294f7b45073b50e4c427960ea
SHA1386f38ffcf4c2595ac7311c60301b6e9f6897731
SHA25679bc8ff013ec3f36a6b61c9bea94330bf146d437830fdbc65e0ea72779d93662
SHA512528119fa5ee2ba7b60885662f6718709760d73ccf329cdce60a3a8f3ddc2852d0c103e39f80eac1934f3298232015b3e325b60c81f7634530838f4de9cb9c409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527dc122d43a677891a85a49ff71bd6ad
SHA16bb7c2a9329ab4c3c3cebe51f4a48eb2d2a532f8
SHA25672c7ed251cca5c0311be64e2c6476843a6d32ae8a01b92c723ecbfac9f1dd43a
SHA51201ff788414ca9c9d83429d27a78b3bea71dcc61e3ed4cb1b5d1a0f35f6055fa0fa5a7c07ee09e6ce358586f63b20fa6c6f4da3e62d7d340027fd69f2b79fc5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2da01b5ec34c79be06b56cea6ebfc9
SHA1b4625ce92acf91b40076b86279fa417b2ca8536e
SHA25613cee34645f4a633ad2ab89a5fd4d3ac8d3d38233f2ba04b25cb278f873a3d4d
SHA512566862eeb04f03d6e65a1078caecf1f8645cb09416ae8e88785bd843e866a2c8a9bee9d5c0fff32d51fce61491aafc5d73d162e557520a38143e094fbb8d22cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2741fab635c587bdcef92adf6340cf
SHA199615871909ac1b7004e50aa4394982682e6b323
SHA25654ca9fcd3a98077505756f67fcc49c25b4d82a83eadcdd0465332dd615050ffa
SHA51229f171525d2b3d497146c31085df28447a1f79b8410ea67b67096758d3c8244e2a4e45c0738bf0ededabb20f86d678cedc4ec070f3a5765b11fbeecac0154982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef29d11f345fdfce3a0caaa3441e4bf4
SHA104a7e299e7a6691eeceac1313000a9bcdc1df1ee
SHA256a42aa47c7c20c69991f4c2b9867f25c09fc6dd844857e50e4644ce1634abc5f8
SHA512668471ff11a59c84b8d6ba62a0341cafda11ea9226b3626d3eeeba43311edfebe155d8fafae499007c558605ff1e369d06e70e4d0ee36eca6b248fb71bb76394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1a2977b5eaf2fd2013fa1fcb850321
SHA155703e3f6061abad09f4f55341c47aace471f3ce
SHA256298dae5af46ade0817c5e28a2bd42b07a701fcc19e75c179f71d52f492f37d21
SHA512ed00af498b664de5f8ed961c159605683998812871bffc1674de901b00880248ca5c189f52b9ea7ab1b5403a5e060cf793b481cf2c80a6aebc4bafebc55c90fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4e26e509fb683ce757b848568636c9
SHA18a59111cd224e7ef48ba512a2a740d2530599c50
SHA2560729753e641d0931fa7df96ef97f67c0f8908d20ed96ae8e6e0c2a1c5e68bcd1
SHA5120ff396b222582a396795af01c8133cdf099f138ab13b4036e2fe2d23584da88c73db8cd4bfeeb029cfa6c338aeb38927e615851b5af4c21686506e720d5479a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53522a88777f224d8c252a74f79ec5826
SHA18e3ea9f9da132a9d8df772e5e4b3eb5ef96d999a
SHA256135d45bbd198a1717a7dba0a847cd7047a2523244214c533efdc8f94270d2dfd
SHA51228f3c3fd4cffcb8b0bc2dd031da88bce3534a97b71f2d3a208ada8ae03c1418ed4ffdfa82e41a7476cc4b3bafbf00a01756bcbb2f3b230800624e535bb83822b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a9cfc8766c96d7014a9cec5ebff39b
SHA1cb41a2c0e1583ee6eccebc225b6c8bec16a83c1c
SHA2568aa4568912bb957893088b891fda2c7240532882f529554b3120de8aabcad69b
SHA512a14cf8afe68c121b7929449df6b2d3fac17770c64733a7e215658eeb15a140dfe62c2da0e0c71382a61a13a47a965351f8e6c10e2fecdcb16e3b285bb3febfcc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b