Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
c100116e3aaba41f551309f9490e355a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c100116e3aaba41f551309f9490e355a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c100116e3aaba41f551309f9490e355a_JaffaCakes118.html
-
Size
1KB
-
MD5
c100116e3aaba41f551309f9490e355a
-
SHA1
06723878778123c8bb49995a0b8b4fbc2c3ea24f
-
SHA256
6dbf88c4f12d773d02ece55675085c56cad50f8238b8b1e80c9c7510be92e7fe
-
SHA512
2f7c0da43774ca09db5643219cb8bfcacee2c3586f56b37a991ed36a2f3a10ad016f2e16ef190c3d1da5e7d72ea5a42bb6734c0de07d9b15fade397403cb6e4e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04597ef00f7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008a0a41c7bfa0d5553095163d284cd247a7378ce1670b47d74951fff17ee3a01b000000000e8000000002000020000000fa9a3edc04525e60dfd404d8d0384a3c39996c46c46e355b173935f73edadde9900000006bb5b3f751a8eddb70d3c24cdcd92daad4f4f4d415e29b8736fa3fab03d9fb678834dee65b03e7df14da23675bb03997e197b6574d0392a13ca321ea3399d7ab9d6270334795acd5425522842d9175d7eb96379a97ce1af3c09af50be6b7dfdc1af604552a3a95297d008112833e57747c27112f0b69330e5c59afa0cd1a20058e35dd1e401884069406acf8b7b21e9640000000304ef5f3436088b70d05828bbab549012b608bc7130cd1dd31d08efa49587d253a9253e6ce9a3e61df88e75a7ee52658c99e9cc470ad72b7ee1ac2475ef51fca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430760467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19018131-62F4-11EF-9816-E6BB832D1259} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000137903206328990247c2488738bc705c6cf4571133f8d64abd80ec1efb8dbb8d000000000e8000000002000020000000d922740fa6b1cd6392529fa74bbc9c069afd55947252578abaa077b8c00b44ba20000000b2dee085d97bd59b66bc7ad2f73e8d5aef636584cd028f1c8aebc8fef6b07aaa400000002aa701bc1e33a91a7f04f5996914234e23098e9703e0a4c112ff9f4e42d69380e8c651182da9995a2ce00edeaeae0bea7177a72516ec8f570beb79972b0a5c53 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c100116e3aaba41f551309f9490e355a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e68c1f673092171fd4034fba6a1ddc7
SHA1e3d594e07724347bb172fedeb41bf64105e1471e
SHA2565cc8e1e69d71470949d0fa5e1509216d3e0d9c892ae3b42392984d479e2d03c1
SHA512114c947915096c49c0053dc230b3126876a0afaf4de12f93e57062a6cc30ae4d20346de4364f08b31c4abafa7d77fbe1b13084e577e1b8706d353ceea8e57e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9130734234d6708131d1e0a4f8e6f02
SHA1b1a73507f09857f63abf3270d1086726f85ba06c
SHA2560f190d18237f73a0df20c6ad08bbfbd6f7d1cdd557cadf29443e0bf402992fe1
SHA512b4ce70152baa3d5de55ecb37a2ec3f37e75287b8e1c53121f273a46591515084d48e51f354c928d00615169c9ac7e9a358ba97d3f8859f6eec1a0260a5311fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c258ede3fa900f5b9b36cb96d87d2d9a
SHA16daaee709dcb1045038ece64c60436a0a770a543
SHA256f6ab4fcff4a4819fec1ffd3c7c51474dee2e2bd56b2e1d64385f6d15b719b957
SHA5123b086e2306b61d7238711b94241b564e29108755dceb4be45bbcd9abb350ebe545739c0fbbe07b58b3835e2983745c527ed2e5e2d008c01b0812af34f862e1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680a5f3c4e5622d6a600940fb11b2f50
SHA19d628359a686167645d36aeac0e60ca3ac75141e
SHA256422203b828c269280b4cc111ad566afffb6144b62c3cd4a32308f1ea4750e007
SHA512edd903a25fa9e25618ef7fb5defb4277331917e627a3bc1ed8074c18148489e99ddd82a1801376d71516664dc9913e0888aa4c788dca014316ae4aea9b72293e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6aa4739f499303f1d02dd7ace95e54c
SHA1dcd8888f20168b4ef96562799705ea042130cc2b
SHA25631805b1c7692a3d976123a3ec4dc31bf5d42e72b35a3fee4fda26f7302a4d274
SHA5128db899acaa2c276097b9d3de20ec19b0063f77cb3da4e75a4f8184856aa147df3c58afae5141c49b47710384f8a5bd3e33e90d4be8d237a2fa4adbb099801070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad4faf934fb359ea2d56516571a0ad0
SHA109a051b6e2a092ac459ff942c4865356ed4ddbb9
SHA25647b55f985e181e4e23b9eacec4281ebeb3f2688d559c09ac5c58f6774f134b43
SHA51270052285d2823f416d6b1dfd2abf0a5745748b30033f5802e98ec7b3e8f3da073513476b52ab47d926af341565fb6f340607ad7f8f25a8d40f339afaf1bedf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acffd08571763640d3f421c2bdf877f0
SHA1baf86ae6896f5afb0cb85ea9772cc980d8d7d4d9
SHA256934d9984191eece28bd04378da2dd32ff891f5442bd6ca3e1cedc213fc54d96e
SHA51261b84f817dd5b397d3cd88a4682ce0f1f20f656451b95024659c9087fc3dc3c360dfc3d966766037dfc3ab77fc0811e7c517339e1928417bea0dd6ca9bfd8b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957b268145e34ff33bb43809710d94ab
SHA1ceb63a2b6347fa0fb71c18fdcda2be17cdfc9621
SHA256c1e3dc17dd9bb9fc508be9f7d9813624821bd5713a888619a5d9b908a6da39d0
SHA5126ebdd7e189bd355a2fb2bcba70398216e2544e5ca0a3efa65eebb98c661e801db93c200c9f9380d5246ab997f48e9fc0249b79472c5300f5999213295481a1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cd17a26d916676e8b7ebb3f4c5f38a
SHA11d92563d869b7f89b4670eb588ab22ca07f21653
SHA256e4a583052868cc89934e33c645ab962b315c346631ecb3195de672f5ffbcb090
SHA512c791be25668c7ce9cb9a217bd44ad4c90d0cb1dc2ff9b81413c299d30bc9e351869076ab6aa22f9c5e7bdedaf7878bdf9d8cfb7394bd2f563ba5f43695a795f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb08a2d2a0dfab94370b3469f298d149
SHA14821c441c0bf8062c788cea9ea38c6a60c7fd541
SHA2566f78e03ae6b1f7a63c79726b7a99dafc8fdb9f028f707753ec4c2a4b6237b977
SHA5122d3cccc3c7ad8ddfc3116c87f4b8978251d4a8dc7177dd9f878053c2da0548092a5de2134cbe161432175ef907c5b23afb45126df7105844889d21936c86ebc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfdb5c08c88b6da8e9c54355b1f8c6dd
SHA147f6a8f49561ab66963eab1d50281277e4df1999
SHA2567293a2cc65cf35c8653a1776839eab722d70bca6efc025df91498e516c38e06d
SHA512e610a6722c09f2ec62f03546b6e8bcfd91d5bdde77d019cbe5eb76b6032e27aa4a4b6556caa10f95d39f63384f309012654862ee2ed32d782bf0a4447430dab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af11a49b33f02487eea0a8ffeb8bec7
SHA1388531c9321ef1da34c59221cf06d77ffc1a1082
SHA25638101298b1125519fb5afa0bc41a89556b70395c36d53b0e427ae17e7b3a4ce2
SHA5129a46d8d804ad57f770f97bcb88dcedd98a1f281509c810c47af997e43f7657d716ad422f109e8e81ce9b7a4bb71c88261d873da2eeeb6f1ec83508d3be334db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040bdbbba0af5c4c46ad89a7d50b259f
SHA1bf37f63acc5d7d6b5bd3405585d065cea9e525a0
SHA2564bc258bbab200be68d1e7f943cd797f466edeebd3ca975744a1531796431decd
SHA512b056490c0edb8245520fb2d2fb26b5f1ff574cdfedab894839402d88b25be7b05ffe66aa62c98b1b1f73b514785674f86a28d4f4cbe6f45e12144d58d22cb19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595a77148426fb0789c6bdab4aeee63d
SHA1e4fe2bd13d96dbe9327e4a9e0615dfefea0a5c1c
SHA256c950bbcef380c42fdb6c5ccf3fcd336fb36aef7333cd811673598869540f8e90
SHA512a6ba0625169acde1ebdb6df31438da1613a707bb5870c563de20a9d97c5f43279bd0e9318d1e953e1049ed59d59f81c431de282c7d9a0657de361c3c9bba6c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549017ba64df1e43c5f28ed8780c1cf55
SHA1d8b71fb6274eab77dbb4beadcfe3b8c5c9fde4e0
SHA25687e62b446f27cade080fd0d800269a3995a0e6492f9b11a9c6031aebc537b187
SHA5128c04dfaaab21fde78109d1ff947187a56ff647c5bfe0c1bc23cc30ed1b69949c584f3abe817539c0ae1b19fbf8f13c089cb5456c9c084d6fa37c9ba536746004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501150cb41db251003f83537aeeb4352d
SHA15b9d7641ab8721ac4f27ae84faed5f23069fa9f4
SHA2568dcf45488158538b2a0bbd2b8f16e68bcc90fea345c07ae3975ee156dd07ae0f
SHA512b0929935eb80c92c5e34d0f41eacd0c72f755133ae20615e6314811df391450b44cd77c18bab482483cfaec8b3199ceb7011f9efcfb74a5728e67517d06a64a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528742b282bd8ef240bd81cc7143073be
SHA1bc46ad1be830129fb8426ee7304d18de35ba1ee8
SHA25690c9885f62b940fba996a3457e32858a07dfb3317c626696cd87ac805d20f76b
SHA5129aa2bcf8dd897a80c4f2ad9c84d40d202da02424a360878b24886243048f7c5c764f045d151ae3151c04cdd2615cf11986d3e1638d2edc2004aa037b39b2903f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653b29d43d6126957877f38ca30f967f
SHA1ee0ee5e398636ec00df179dacdb6bed86abe7771
SHA2567cce493eea5ae23e220f737431faeb32d0eeafacb81a0f3322b636b38d6026fc
SHA5128455ca37c08a706cde50fc39381e27aa97b6cbb44578e70efa98758a5cb11f513c8fb7d2e0aa6db0d7117f7bc43e1d5818196fac043f5359e5187381b8e4c6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b590fa93db839ba1c6ab2e4d708bccb4
SHA1d71b3fd876bb803e81dca4fccd73b28739eb0e5c
SHA2569ac8a11d3e0589d9265f6da3340a761b48cce98555b66149db261efaa5c5494d
SHA512191c7ddd0f100fc53851ce7617e450a495495bac88d3fba1f4cabaa971fc8538be9a20270e5f920dec279e0d292221e1c2f9588c307ea9a2d1a6f4f94e9c814f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50923e050e1443562f01ab12d368786c7
SHA13ac35d8c71b6540a55e2f094c024b06e3ee6376f
SHA2568d29392291800425da179e98b2b81d7a218ecb07b3dcb66dd3591649c212f330
SHA51227423d48f915a7607a4d63a175238ccdd0811cb679edbf76f2b666aff6112b114aec3b81d87fb57e0c1695dbc1da3741c6fe0bed67fd8c703404da4b33af0273
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b