Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
77ad871c940c471804e144ddc2cfbfc9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77ad871c940c471804e144ddc2cfbfc9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77ad871c940c471804e144ddc2cfbfc9_JaffaCakes118.html
-
Size
20KB
-
MD5
77ad871c940c471804e144ddc2cfbfc9
-
SHA1
3fbd2598cda60b6f561f8d399456cf7caaaa531b
-
SHA256
d0247adc5d22f4d21bea90fcadec90c5b029f9b8a546f1065945f71e15091456
-
SHA512
7cf8b13111f8077ddbdde2081bacd59b47b707fd874f5ddd321c5c6595ff20e11e7a1b70bd514481c156210218043ec42c3d8ad23349497e66e5b52d34e85f24
-
SSDEEP
384:IZlIcgt34GRGTHnVti6a7Wn6Z8V/gb8AguLZ:zD8tgIAxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000009b64f5dead2ce0564fff7fb3b2b7929d3402728713e5eda4e6eeea1e1bf38f3b000000000e8000000002000020000000f59d99e74ff4f1f10fc37c015f281d54d209865143fa8831dc7d3709447da4ea20000000dc3cb50d4c7591ec364f149956de7675b60dbe900c7912be91486c5c743445ed400000006cddb58d01814d15b931104dafbb5f8fb373522ffa195ac240c4ba97057b45e0c348a3cf8fc76b156634549efbf50979614fd6e41dba804cded33df30b25c789 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a8e9fa57e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428488848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000082241f18dd07f85e134717a9a27aea28b269e6e44ac6372257bf1ec2d1d9158c000000000e800000000200002000000042ff667cf4bbb7bed9b3293d7577b9c649abd39d697601815c83a3969b7c6df290000000aa56cc3f8e8c36efdf41dda0f3438d8d1542f2a7c3747a69f54214aca619031c3d05d910d30fabad7fe9325a8a1cb32b7870b6a114c4b8836ef61d86fab48949297808ee84c8b09dd41f39f9f6bb1cb5bbcf7e0f19f3bbc9197e5c8d32b3695990e3d28de7f14e176be5bb34da8bd22e60d84e539377440e7c70461926da671a53ac2ca1b3ff38b66835c7900e0c964c400000004b8cf6f394946e606759cb268f1251e450cf31ead098d2763c9e6a33d5205dd0633ffa7657b99b5813de2d85682977b623f8776e081b46d18088c498f1c493a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1299BE11-4E4B-11EF-85EE-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2816 588 iexplore.exe 30 PID 588 wrote to memory of 2816 588 iexplore.exe 30 PID 588 wrote to memory of 2816 588 iexplore.exe 30 PID 588 wrote to memory of 2816 588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77ad871c940c471804e144ddc2cfbfc9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ec9dee881ee7230847a0e7eea56371
SHA18775d9635c12431bc45fa120049905a00335d964
SHA2568e0bfe8d29d2165c61a30be2ff6b79f74aa3ef56b884b12c1b3da353ee36c1f2
SHA51209e814080153a98933f169270bf52aa23ffc26c27dad3b95a3c3166160743e797608bcb465d372a1a6d298c5d61f51fc0c16c71c1c843a9690d4b04c0595927f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51451cd35960cb42bd9810e404059ed34
SHA15cd0ec589ed50be7d57d7fbafcf95c2b764c57b4
SHA25623633a8fd7d94dae115070edf013c10b21243b40f802957e6f956cf24038d10b
SHA5128a1fe2c3eba8aeca6ef11fd53caa14cd65c0fa1c7a47ef554ddb9934afa8e8591add896dfcd246d71479d93933e6f041e9c577624b39a2a795ed7744f5d89bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d7eaaa7d079cc238b15cfba79d031a
SHA1fae05cda45899e4f7e7b7d55ec76402ea5cb41f3
SHA2563460ec3d20c14a1f4ecdd61bf214fdcac2191cbcd528a436d2b60ec38d446193
SHA512ff850395763428ec61a49654f96907cddad71209a49fcb16612d95323696dff7ca6abcc42eb518e00f61fd3074bf289211f81fc3f5593433efce1cb011c775d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502fae09aff39f16d22a9a5be10690eb4
SHA1ec93bc138cdced01bfc70ff401d868752a20f0eb
SHA2562ee177eba9787e0e2827ead9cc151ca6c2a4f8e3bec6c97df331f954c10590d9
SHA5122e3f6895edc42de68cc2aa78192c2f4c1db3a86e4ea11283072cde615f52b2102cc21586d85f9dee4daee5edbd383a37b480230d08f71ce77ade2b3dd830a144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a989a5b20ed07b7718a98092912acf9d
SHA1495f5cf9425eb548a1ef6140e3472f42b5de190c
SHA2561fedd35de669bcc703d2dd589edabeb6d84326e10f83f38065e39a866c173021
SHA5123dc1820ab75aa171202b3edf3c1c82d8c67c669bf66b61089464de781ccc79d11dcd3edad24f673f80d6d04a1599cf10f3a16769ccbaa4c3ac24c4ad1755a8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5454af2be14eb54ef58904c0bf4e8cf7d
SHA103e5b26b9707358212b3865a7fc0d9dd32834473
SHA2565d5fadd951f0b04c3b43cb73dd9e6f22d3d5c595e2cade4e36575ab7e5275b56
SHA51212ada9d3a0acb52be3ce38a376329ba80b87e44f62e84f9ca3f97c2272533152df51a62236601eaf6488ab5942335c370348ab7a407407888838af11f2df7961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569705a8663b3349a7c0fb84a11bea73c
SHA1a306290950de01bf619caef235def7ce81ffd10e
SHA256e6f7788b3c0ede8d4b1123a5caccaf91cf4d4370f74354b9155e281d7b7825a7
SHA51200a62e8178e9f992fba1773530b7c8c28311cecde39a70bbbe6d8617d6c1057d98f89e1916ecc4101d171daef9ba2104acc8b603c66c0bf6ed7f453eee6688fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237a8ca27848647c2538cf3d5f1ef7f7
SHA1de9069b24466dc72eddbacecdf79599712d57949
SHA2563c3b5316c80664072008367b62339e13122b3ac478bb4a2afd72e7926093e811
SHA51218377e9b30c7f2444edb5828de571ef1c836a1ee80a448e3ea31c972d2c3f0c151f728283fe89a5dcbf8bb8cdf6b0b0307e45425f753e2d66c1f55ec9ae1baf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58424308b5e3f9275c6d7860cbacb0f26
SHA1c5eab256996561e01620cf78419725b4d1a57bd4
SHA2563733f89ace49a50b7e12c4b787d855687161299f47a6bfeddfcb83d47ac89168
SHA512ff7b1be7da3b22f9070cae1c727ecdd171f824930f09d36d255126529e421b21d6b69aad5ea4a7219472a79e97ac8056ffe8eb8772b4fff34c3adf9ac5ccb164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa875e7d0a0650e3057f3db53930e08
SHA13010ad9c0a08454b6205c8e15b2b59f58c66aa16
SHA256a2ce7a0d50e6e6d5fb1b128b760f8e3efa76e3107d6b20e1a075928becb42bc7
SHA512874a53913a121576121f108f6a31b60b2f0c3d7f7cf14437b8354ebf2f55310a09c56304ec00ec1fc03b72c8878325776f37c84a2ced8a4f32d60076c682981e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdebdf851a5739800fe3bdf546e6f5e
SHA19e7047e452665f1be9bd39a4989676abdd487325
SHA25673b7d702dc83ee39ede1acbc77e1a77e724b8ff9e5fbc5ec7a1305322d608850
SHA512746c94a5cb0277e9106fb314ad16c2e19c9134311e12ef2d614a065b376f72f43516fd9109390207036d9a507fed71ea5030ab77d5f8c7e1fa5daa6692b9334b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cac4b7adbd045cc7e3b6ac3f3f842fa
SHA138ae913aca35bf7d9d439958e0e9f1f853e37a0e
SHA2563e842f23f9f55e7ece9b8dfccf18481db47b94141854825425813aec8e126cc1
SHA512bb07bcace32becbddcfd4456be54afd8c6f9b45d53066a0ad834c2eee4af409b399d899a59cd2710820f553b2921094bd024e1b805bca1622f059cfb00b20105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59423292826ab58c6067af347fc9b02cd
SHA186024527890a8fe9a20ffc35cd3d75ba3848e969
SHA2564bc35e9a4ef6f70f7d1e4c835c6925ae3f8b37672c36298d6f5c66023b146985
SHA512a860320b6ba7270e6f3669f45164b14bf5f99f9c532404dcab15c841291573609fec3823ce66cd349df5770c499c56e0b39b7a45973fb156facdb769e522ff77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c9e235c277067e022d023d43cd0d43
SHA1fceeb1aeb6c3baa8505d2243b58d6fa631f1b0b2
SHA256bd5ddda43c71215d65392bd3411f15df9bf9e305943d596fef608949ff6d5744
SHA5123ae5cc9f8d6ea2569c3c9839c80e9fa517811dd0d683e15a0807391ff531d46fa0a99b6d73fab26cac857126a77784fe21bab3523c9d54cf59a7f928caca1c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5832ac7040461233f4b0dadbafebe7b
SHA1a9e7bbfeee90720d4a8fe07f77a3351a87c4ebad
SHA256f30a1a8063ac6aa42da167d013cae3b6d8d6915311e223065a4e7ea350fda092
SHA512d16ed19178caf0e37cc9aa45d4625ee6f0f0963de46856553f7bcdf398b327ab1b80d6048893aeb4635d8656193a165f1b51c22731c21f7fe4794a811cbe56a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f004e5e50898d3a23b425437c19a3865
SHA1eb0b36581b0b44fec9e5a4cd71f3b1579c3ff590
SHA2563d725247a0d291ce5ab1802112d3c410786d137f778471e68cce2aa61a92248d
SHA51232fef116e70c49c762fd337214e247075263ebc33339647ce2d5d612971515e9ed07130e8fe1dbfc6dd765c4a170521ad9b7c07652730d6b141c2f01c325ce52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57927fd26114fe2bfc1755cdc42543263
SHA19e41eb2b391ea2d4cc72a77ca2d05ee440919368
SHA2560e6e4e317c718e7789353bac9d710e09e9585c248305a23d444e42dba2d656d1
SHA5128091552b0deafcb75a32cc657bb49ad1701b08e9896d6e113b15f956a9d24909e037fd514525c3a55721ce50fe7f5b15118fe860a2ea3ac9fbde08328d0ed6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6a4b83f3084409fcb72947a444cbe3
SHA154c633836541fcf1899edee1c6d191972f88a1c1
SHA256d47131a5e60633b767c4fb8de48ef2f1d2a5454394e4944c767802c3fd19e44f
SHA512ef9401a9f74d0356af4201b0cff7d737a2d6173fc9d51bc1a5dac86383eb30e0cd2fa08f0567b53dd37d32cf172420071b534138baf20a723db008cc01473352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64c76e1ab23400124556262f38cc6ce
SHA1cabbd1d4b5c66f8c6316870a0ab821f3be2206f1
SHA25669582067dbc08d1a2a255e735d4974f7b4b894a1928d9d44f6f14894fed9058e
SHA51201c98151e733338c0a9dc9ad36a5fa01b18bd14d38e8dd7cc785754d21c9560f6110f2d98930add5d80f7b9c38bc3be2cf7e01789a79a91784fd9bee02d854d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b