Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
e205aab2b679095bb6656e67f32da9c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e205aab2b679095bb6656e67f32da9c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e205aab2b679095bb6656e67f32da9c2_JaffaCakes118.html
-
Size
461KB
-
MD5
e205aab2b679095bb6656e67f32da9c2
-
SHA1
96a14982b7a599d0f95d7e0313319b1bbf897da2
-
SHA256
b8cec3d13099043bdf7f201e381655e653642a46bf429037cbe7c560eacaceb7
-
SHA512
487a4bbc7253f07b9a0aac93309e1ac9c8dcf0500e5bf3f634dd2d9e9a55edeb1c84df29db1ffe1c6c628ca5ff55ba0049db3ed5529a5a39d8ab116deb3d221b
-
SSDEEP
6144:SusMYod+X3oI+YOQysMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X385d+X3a5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7040c5934407db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000007c1b1351a838feba5607c76695a602749f18fc9a1a4d5d40fa96bb15557c8c7e000000000e8000000002000020000000b784bb244aada429ff7b9f8d06e9754e22d3b2d9f7183655c57b8acb6f44d1bc20000000cc6b33f616f41c21e4b1143ac7be66fb049bf3a39ba29108554eb66b575d752740000000f851f54cd97f4d3b2e916c4f13985ac8105a42a5f0fecd17c508493d0bd691f5cc6f81415200d61e1f2a03bf144ba15ac323851680a80645ca18a9cfceb4f401 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432548734" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB3438A1-7337-11EF-A0FF-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2808 2648 iexplore.exe 30 PID 2648 wrote to memory of 2808 2648 iexplore.exe 30 PID 2648 wrote to memory of 2808 2648 iexplore.exe 30 PID 2648 wrote to memory of 2808 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e205aab2b679095bb6656e67f32da9c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588889d80c0cb78fd586385368675389b
SHA17edca027f566536cf0c634bce6c5c9913a0dcbe6
SHA256bd9f3ac1abd6253f855f1e5b0ff463e23a1ffc0ec84e48c78c8fde64056e73f6
SHA512950fa6a43c55ec2c4ffce261acca3792748007dc567cf56b519d0f0151768e36e3c550ec0080eab6c7f091e7952ec67be1518224db5866902ae893de4f022217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9df9467692a9d6bb8fc7c62e9601e3
SHA1c3cb8cc05e480d5e2d014d9bd7ddc9cb16e926ea
SHA256fcf4200c37f64a1dd667eb44001fbfba87dfe948d3afea9c3cbd5bf3865b7829
SHA51203a781ec7837fa6ab3e7320d01d5b6d4fe99963336ae0d8999905dc53891273ebcb59f105d15aa6d9e204dedc1f5fe6e754477ee2a3a940e34c0a4e97abf1f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5229d1b83df2f498bd57159f4ff482fe7
SHA1bb99929ff9f6363e002431376e750e18348fe6c5
SHA256db23b648d8ef8a721caeb8ca6027cfc91cb2473a52c605baade2af17a3cd648c
SHA51293d121b4a16e2dfb1bf522486cd6d17bd8543b8492ab2f6d3076ea624ec8c7b961c7fc86fac9b132baf58302f4c3e625dc8cf6919affdfafe36346072de8a562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a1e2fdb3f4fb9718ac7f64421abbb0
SHA1ed6d848b8350595ae4d073b589588a899e2cd5a2
SHA256687d76d276b29c1987562c3ce4fe45c87c76c718e3197f7903024d89f1080cba
SHA5122d51f1b94faccdeb148d4421f94a071a1cfb3e29fc6957ff3f4f0a4e8f8682b68a551e4c76ca370eab642a52dccda1d1bedb0a3716fc667a256a8fdc24a057e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50010f38267af9aadc3b986a6819ee9bf
SHA145d04408ad142175c1c444435df849e024159509
SHA25623f0e005e34739fcb30bb36e872b2f54ea7e2fd4a84b85d15b3a8448b4550807
SHA51225da754d5cda9398d92b8ce7e359cca16b7eea0df4152790bcec7f3d9dc4df1168cd43665a283d4fc2a7cc8d2e8aebf37b79de1131017326c0b3fa4a75245f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655cbbda16a9a7851a08b91a2c21a0f1
SHA1d6148a4a4d4360070a0cf516c578f6b8b2beccc5
SHA25645bd974539bd719c0b2488048f36f3fa4f595bac82ba22b22403d4f866219616
SHA51234182d9a7fb867c1fb3572c6aa155552e31128b061eb316ab80c293e847f4e1c822b869cadb4c245d2649ee318efc0a43f72dff57310b14fc644cdd68144d8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbd3e87b6683848bcaddf8faa01c163
SHA1912b51dc0aa2bdc3a798db763c4b81fe167d4e5f
SHA256b25656e83e91dd2ce3fd98d343b096b4e3952bb56e5c3a5385c7abd65ded7515
SHA51275d0eaa3a73abcf30bbf5279518dfc130bfc1bc42d9ef1af9c07b3abc69450fe5d0df1678d65f2bc8564fd7a4cac76fec3ba9ec0c98e033bfe940be1eb9f8a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf31f68df87cf834c9e46baa8f319bb7
SHA18fc83a93dfd8ef6bc04c3ff1cf71cfb64e58008d
SHA2565d4b74b5b23ec382016ac6c45d0ccf6b0d89e64c2cbf24a3463412921e5493ac
SHA512d33813c47a80d307577803fa62aa2afb28e484bd45d4ad00f84af55bdb917c11723e28d0a218a80e090b18a3662e892ff776cc9464009daf70e70ddf17068ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a231d9e1b6b39e3794ebd4748e6e071
SHA1fd1af63ff887c71bca7875bb2bade827fb1f3ad0
SHA2561abba5623ae2d4a943fd2e2d5baa2b7f738139bb2f7c0f00b7aa1204dcd7d424
SHA512fdae12f8678610660c7dfd74bab18b9c818840e5454edfecbc9a1abd344c3c540b7c014eb0ada3ba1f175e4d346e5d8568287e1c66b78dc22d896cbabea31bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57484b48a61d32c312b59dcb6d1aaa168
SHA1ec1762704d543870388fa963c3676a30fb9e52ca
SHA25694b2e8eab79ff6d5b2bce9cd8f18f9a43872112f5ea19f67cab26b839bb876cc
SHA5123fff8f80301dc09c1a054dbcf5b79edaca7b7bf0d35c5830baf21e24ec8ec15ee26f32a7182f0322ac24cdafd6cfac785edf87cbf8200921a3faeb5cfb18d8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b362d89ec95dcae7e87f246b4d4382
SHA1e694ebc81a6caaebfbc74c3b292290f46cecc701
SHA256831c0c970adfdb81d2ee4f265246f8d80752bd556453196ff73d7ca6a7363efc
SHA5128faf150652d1fa749945afdb55b097cb4823c125ffb648990e1263818805213240f3db02c04c0e5e1b368361811c20f200f910ed83d3a5654909a1cd4cfc1b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a61cf8ef4cf854a387c367e9ef2ca3f
SHA13eb17faf284de0b91159b3d9c0f139b1ae28fcbf
SHA2561466e140bfc3e9ae41d74ccacd2d6aef49fa9c74ea46cf1128a7bf1500f446ea
SHA512cb918a8858d95333f6ca2e61282c4c4583b024551d9d36765576b8f43454836849f644e8d6ff8dc61aa8181127163e09abdd00d051e2492accef8f8f0c4ae54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531087bfeea12c5d5494285a24f7f75b9
SHA1c29ec4d571c2c38254de433cd8308c41c9c8e316
SHA2561479caaf2c90ae5851d30c1793bc936defb189401e5a444670d9f74d2a50a35e
SHA5127cd45fc7e8d036d3ff7c24f1286c7d5b456c8eda9c6169290e28d0dfb3a3404e832b46601fd85a7a9451c65583a80b92b48f06e331a6a53d2b77ef191452fd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f39b65136132ceb87d84d74a65c07b0
SHA10b6d2ecac9226e67b85864a4be1ed1bbdee55113
SHA256a322e811d25c0dd28708e17dfb51ec4641ec593e28fb7e5297ca2f8f389e0c6b
SHA512b0b502771ad301d6b4fa67716ff970c0a5337fe1c404912d422a0acb4363585866740936a8e47330f1a3c5b4e3b5d07ffbbe7673f5211aa0f38c0858f64d6d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f99b8caa4f7b128aa7e8a58c9bf3173
SHA122f3f084d0ceb837b2e355bccd5cde87eaa0dc19
SHA25629fc302eb6db2c18f597ea5388e1b40aa7f67ed8618116250e6c2ad9cbc722e8
SHA512c094a125cb775a0eab2d65e586928a79dff028b2e0656cd4420527d1fa360a4f7b7cb1d32a827e1a07e9efcc8c6020e1c8cb7c615e257c6dcbe4169ad4544577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b4906fad405d924dac67a8ea81c0f7
SHA17a0aad6c325e33cbeb1266554a5471976d898378
SHA25687a0fcd7bdc8a9943709db75adc472b64c67c67d1acca61bd337961badbbf0f5
SHA512aca33686d0a164d311816ec609a3d9bebc6c9a30f8860f6d38b1196d6c6ef68d126a5c14fa8e2e705c4e009772c3f520f3f38200ec626124b27f54bba7ab66f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42d2868a64d0ff4ea9426c161adb7f1
SHA14c9da9da78d1d8c251e5731f7b819cb069143281
SHA256a8346c0c9de5a3b3b0f935c0562a2f589afdfc54ab0af06877c5956b07b4278c
SHA512501f4a9da4888832881e1d15f8d91505717d8fa9eb0435f92c07ce9554114595e5edbf80444cf35ea0d370ba91dcd7603d43c677a8f535e1fa11770618841c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86bb58c6a24fe0094efea4d2bccba23
SHA138fab3c83dad71101d0e183565e5803e46c30c94
SHA256ec1bfaa0c9560799ebf67841d885d14280124ddd4581085ac181b9ad789184f6
SHA512899e3b9b2738da725fd835f63cfeeb4731092f0a8ced39e5b9814985aaf0cb63dc5c2410f8690c2bfcbe6f42b5eda56cd060aabb3e3189a3ff81a44f19000404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c6ce70bde04e36e4d0f1df16f4750a
SHA1193e20f167431af25434b27b73cfd61e0411d271
SHA256d6688a673c11004034f6a7cc0f9ab41130135b5f45a963212c2c43dcf1bc0377
SHA51213c13487da5109d23a7f09516b1265f3bb65373a5ed2aa1aa24913265eb194087da72ff58076f9c1df3741b3c321eeca7e02509d8f358b2abde8372293778143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c039824504b97942aaf7558697a20c65
SHA14f628e5d5b8b15c8a295e0c3e66e85527358b760
SHA2562111654fa28a2d189acdbc01251629edc3e613313ff36bb9f992b3e0a3bef876
SHA5120a33cec881e180e64fe3b307c26698213d0bba9d2f2df0aba07003e27e3764b20353c0ea0aaf49fa1a1d3369e1689ca712b6817d92aa0245fe2a4d04e022fd2b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b