Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
6aef514c7437a60104ab0ce451b95d10_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6aef514c7437a60104ab0ce451b95d10_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6aef514c7437a60104ab0ce451b95d10_JaffaCakes118.html
-
Size
114B
-
MD5
6aef514c7437a60104ab0ce451b95d10
-
SHA1
a1cd8455e4d04cacdc67eab1637d31b7e1fe3edd
-
SHA256
8d94036008b3c1763f3dd9e46878f69817a2c73bd300668726a2a24164760440
-
SHA512
66120505a594d87d532f003cf3f07271612505d6890f0ef25a4211631d5bb38526c311ef58c4b6d0c676b1d1de017e401158f0a42a6c46bf947969b778b611a3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000e8ee5c5765017c321963dc331162646ae8c028d2bde0791c26374750b1b4f3b2000000000e8000000002000020000000cbba05e4644c76dd24fbaeb31689b0f3044deb3d772cacdf3dda77cd89e42b81200000004275117ab7c07833a4923d8f175e6db416304d27cf2b410c36818cd8c8fa6eac400000003f4b4e4b1d4455a28b005c81095006d8a13c95c2710d90979b4ba08e77c1d2a09e1d5fdf9373af19d3e9952911c468b2a5a816e65de28a7dc0136642077c1095 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427971878" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68701D11-4997-11EF-8FF0-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3056de3ca4ddda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2540 1928 iexplore.exe 30 PID 1928 wrote to memory of 2540 1928 iexplore.exe 30 PID 1928 wrote to memory of 2540 1928 iexplore.exe 30 PID 1928 wrote to memory of 2540 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6aef514c7437a60104ab0ce451b95d10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37be51e9b963854eeb1dfd66fec728a
SHA1f91b68c65731644035ae3edcccce525fdffe2c86
SHA25664de0efa3b35839b0c9f8d67e822ab6b33add8250480bed41bfbe8db78879cae
SHA5126464a5560acdd6ed7f9c1b69fd2021f67306018359c43c454898fff6f87d06579fb9264c7461a09edcaf512107bbcf788fb80cb713952c61a50c2dc769177ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f74d635817f633841b65842389a76c7
SHA1c842ecad79c5f2bb2716e250f77831b5a188c1e1
SHA256826d8a504f7bb0bb0c7d146f1072ac89c40e4c0222e1bfd70f9a04dfc08cd093
SHA512dc2538b92d24dfc8915668ddc546c7fa8438e7d1a095a4039f1331eb66054ff7d54452b229dfd553238f5628a18d86a53bff946d6066de146797fa47d9dad200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eee65987fffae3489728f049844f325
SHA1ecf03566bebb0e9eb08796ac67365e7ae80b0e58
SHA256a3faf87e0c688a83b5194eac90d94e19bac06950e794ca4f9284ad166d5ec162
SHA5129e211cfcc4d3756a1e3abf3d06638b755b0ac4fd6887ca0a4d519fb22f81405bc67c55670ee94fe1ede0fa01cbf0e4c5daf357a7849fb9a45748fced0ba4f41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845c9d9cba7d228a1befff6c037ed410
SHA18be9149a2d0c72449c4cbaebbdbb0faafc37001c
SHA256da9ba062a868d591ebef476c5a70ccad7b10a606262b468331052a056bedf5ae
SHA512c2c856ed8ab9d90fa4c25245682206a8fbc16ed7413818b32d4c964758f1a79cc7184aa31e7fe1f6840b7604911141e34d53828a7178da3b141266f10ae7293c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba74f6e936d2d5bdc16afa53c2ad4dcd
SHA1d401783cc28d13ada3698001054fc34513f0150b
SHA2560b63fc807d8d852765f6b53a2f8ff595f081c9a743bfd8f51786e749edcb0398
SHA51233f7718fe055a683b7f7bab1e1933dade2c53f448e7cfc7c07fde8dc225b340ccf91d9ab9cb596a967ff2cb83ccdaf691b9047a6e2e1ed4f15da1e78b8ecc266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6298c36b6e73b37eef948991c298c5
SHA1a6d3f5dff30cfa3ae4313da16a02f050d518ec90
SHA256a595284bbbc84b795416fbdd9c1430a3e770182be265b3326b1133dd31799944
SHA51245f4a412ba9e56c1ab83cbc4da7c66c95bd4872bf93d85a5f3b6a70249377cffb31d59e45c7e5ea86b42adab09cbc8d659495c3ac31b41ead2668b7dfda442c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1318274bc2401c7d79bba7bd0c425d
SHA1e4951fa71ad23b810f61998456026bff54c6b076
SHA25694d76ff766bc80db8f8573290a2e568de75fff5902d09c8298540404f4957331
SHA51299f1f3757a749a0d1e1de8a4cda3e1785daa87fb9843bcc10ac12b49d23195c5a75ee7de02d816baa96d58b8202178abc308dd776252e2c396b58d21ef311210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ee0f8b5acaef370849507e8488127d
SHA1645b31a66469ea227edf27860e4a9dd5b7a47c16
SHA256f0f772cce8c9e8008bfbbadb5d22af3c26e975923ab7b553d76eec10f054a7a3
SHA512206da3455cac295dec18763b2b7fd76498f10886036bf8e3cf2070530a8a3266afd7a2a973b3bdfc3612f05ac21bcc9a9186f4a5738279ffea7be8190f7039a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffa5b812fdfa375376fb497d41f1583
SHA12249a9a6d070fc2d2fab1f3e784314ff2aec6489
SHA25636a909f92d36df1332dc26a3300231eb0dcc297640920f3cb35428d361490a76
SHA512db142faf1147da93052b36cde812b95e3d7769cd7cb979b310e1e055e3d19acd78d2ad34165cfb15c0eb394ccb458cd9b2d99fc51142def2e3e5d3ba331d604f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174b2d913d5e7eee2620d957ecd82fad
SHA133a292bad1ae3e15c1ccf0af620e67a9fab6a058
SHA25635182aa648b82597083fd3a2c80704e9ed2ac8fb954f5328317f91a71d1ded0b
SHA5128af4dc5dc84feb13a5c0edf839385e5224ef5ff8346361209f794aa8bea8cc03287f08b0faf397073f200fac89a163ebfffe7ac7b9ed46971a7e022efac4ee0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414163ae124abfccb2d96db76e84a024
SHA19bb91278edcfc2cbbff749a0d1d8f926455052ef
SHA25603d925f6aa9dbc88f648f0362e15e50ed399fe308600987b9fa970d794405263
SHA512f4210f475c794a890fab16e8658f146300cdbe75c0eea66770de30673bd784fb0401546fbb4137e92743eeda5b3fdc853b879bf05cb09ce50d8f1ff709043a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb271b866b0caf38aa0b6e65bf3b5bf
SHA1e4b886f4945a42c2e3603f91fc0b239bf2d50d7d
SHA256be095f7610640c5c0aaddaccf10ddb3abab3bffffd25dffdb1215c180b04b1fd
SHA5126659ec7aa279da3d9bc9d824551141a0b6ffc3449807a308f984cce65f70de0c95dd9ac856b793a61d36c6868c0322b31f3e4b8e3eec448868971ee3e1599c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527fc4a2067c4ca701c19a647027ca383
SHA1d2bb8ff4a294020fb37bb9e0834a08b20c7e7e8e
SHA2567c322466fd40b39d8961bb7fd310e08bf1df26857533da78511c92b59fa7db55
SHA5121204b58953a79830415cf4d29ea45ccb5d844982a5ad3acfc3a37855a9fb122ea476763812635ff5d723f8fc1cf751d554146075015ad442a58054af4f96715a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1eaff45d50fb833059a3eea8f65a37d
SHA16b0809fc2e9699056026149fe2680e728fe3427f
SHA256ac37a99b7dbaadc84626f97b9854c61074989da1fbc28a550d4d990936db0adc
SHA5127b6e41e9aa58760b6cb2925e0aed791c3ea59591164b9b16923fc0e07163ef4067b523523826affb6a763f3bb97d2b4b5e0deb629c2e1a7fdd985a5d41b6c786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56beaeec7e3421f3a054ff59c018d7559
SHA1bb89ce68f1a519e7ca0b38ae78299f0d463862a1
SHA2568247e596b0e0272a6e8949335431abba875707714fecb749f00ef705bfd6afa1
SHA51295fb9e3acde5650ae90d1d7208a7fbb154c18636aa3340c9bb026f490792833936ece8665803604adb1ea3583393567e13b89e2c44035c99a090c391a86cae25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbddac94b7d1d40d01781093a4f921d
SHA1a98576d11d1f4d189a908ad6c3296aeaf0baa339
SHA256449c8c08d08310549a548db1af5823e7313efec24bf110874fbf824b2b9d829b
SHA5122eeed209d881150b3c394f09b1af079e82bf519b5a32350a854ab4d975bc5ad10856a8f41875dbdb3bb93ec75276a374a732e1dc3b229dfd7f5b9f7b73a9b34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906e53c313f125d97c9094c51d09f78d
SHA1d89dae5ac4c7dba115cbaa26264d9a5a1c06470c
SHA2560875841468b2b6cb89f698a10faa99808db53dc1d7758b9a60965752712b0848
SHA512088523fee98ddde4ef80447f73b4fd7f96851bff0b3778e840097fbcd606cc99ec79fb1e58acbd0ce74886f17cb11d2c6cfca85ddaaa5570ec081cccf148201a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec83c51f7443042a1cbb6fd84cafc3f8
SHA191a9529ed13173f4f49b26946300d1ed158bc763
SHA25606856ac7fcc17d38113e8eece860f8c3896a69b42e36bfca6f2ed3274787873e
SHA5125c2556ebda35f4d372cdc83fb22653fdbec65ea16e38bc26d264872262b490403d8c9debaa484f5c1726b789787466923dd88eb62edabd50e6a8fe863fff53db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53491b743adc52b934642aaa518843fae
SHA1381017914cef430eb8720fdc0ab9a2a49419ee78
SHA256d8ba9cca830c31fb36188195397daaa07d5b1ff48f0a1ae416425a1c684dd932
SHA51230cf38c6a17e184f8bb403ba9b0c24cc88ab7391ec88d86306fbe603602c257bda4780c872fc36971d9a28c28cc3fe9c6ba9106550106a1a2c4ea95e723e01a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208b95852596f668eea428ed52a0e25e
SHA1cb93af9b278b0591a40834a8514b3fe2ba3eb25d
SHA256cd352f8359a1214366bd6ced4d1e8574b66f3d7e9135a2b54ca9f2e87e4be882
SHA512e3d20ff7a69d265f406590b2f4339740f1d4c884fa432e68a3977b98eb43167fad4370958ab4a3e94b0ac7348fe2ccbacea53cb6eb86638db4ba37ed9538f443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509413f6e4733e732f80171a96ed923e9
SHA19db6a1143ffaf4862fd3bf706a6b832d72f1cd32
SHA25693e00150de53ea693cc276418d533024d2219898eb2dde830e39f389f1f7d398
SHA512f1a2757dad50b818c64ae9d73599ad0e0ac68810365a0e258ffdf71b25db042ccaf6e7f205a3a2e089436fb1d4f52920af785c1868a3fad133198c4155cf2a4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b