Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
eabc24cf97dfad74bfc69918db75d56c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabc24cf97dfad74bfc69918db75d56c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabc24cf97dfad74bfc69918db75d56c_JaffaCakes118.html
-
Size
4KB
-
MD5
eabc24cf97dfad74bfc69918db75d56c
-
SHA1
cfbb03819c1f12d83e11ac6a77eeb88f7bbf31eb
-
SHA256
73a94168c3f8f8b772bde728a786707505d626186793e361677791f9091f5c38
-
SHA512
02f0aec73e9baa75871704792f42487fc929ed22a783bac01b6f6983dd0efe6a8edc2d9bdb34bd8903e84c462cbe3b6deb87852ab975706c2614cab313bc4993
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oiN0kOqH:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c902fc87d4e4123eb4127b3be25f5f3ee73a149b8828126bdab28a46500e665e000000000e8000000002000020000000290c585120e79cdcf26864c84c02584661badbede7f5b3a9882e496f9685b4452000000051d7e12ad3efb229b2d39a0707f13aa64958f5348d4a11f94f12914bac370322400000001c12bad0bef381377cfe93434a3d6dea31e6da1f95be0969cd362d1768d86251a110b91d74f92f349953653e36ac0e0e15edc424aa4d5b6ee48222dad20e39dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ffcfe6ba0f94e06ab0689ef8bfa50ddd3ff82ba0177aa177aa2b776f0e8eb7c2000000000e80000000020000200000006ffc2fe34ef2b691f1fdfaaedc3b4ea960081c251753b80442dc77063b1b318990000000fd046202e7b884c3c05e8e99ef46fefda3ff5c521b4db2922ada0d39b67b5c2dfafdc09d08e26fa051916314c8c251da752521b3fb2e1d1d19b5d383e1a4b0632d54abefcf1ef4e023d2004af4c3f0abe2c7b95cca41dca23d9a65e569e7653f243e0c331dfc648db3cab764aba84ecd19bd5ba4b90ec06d670d79fa11c3c6aaca0e54c7e3f5dd3099736ed481f2e60040000000dafc2fda8e5e2050fbc9fc6f40f69407121e59898c6ca320969fefe143a400e7b4ed1fce5b4d1bca03d9f791f02a7ec1726ecaaeb5cb3620868568a01a4e3754 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0087461-764D-11EF-98F1-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703883c45a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888126" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1052 2408 iexplore.exe 28 PID 2408 wrote to memory of 1052 2408 iexplore.exe 28 PID 2408 wrote to memory of 1052 2408 iexplore.exe 28 PID 2408 wrote to memory of 1052 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabc24cf97dfad74bfc69918db75d56c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b598bf7a63860f893809ad943547ae3d
SHA12010538bc6a761fb2c15fb11eab30bc8dc20cf7b
SHA256839fe45d64e81774631abf5da77e440eaeaf42061ad7e358224072f3cebfde4b
SHA5128431813f6ce61dcf4290329b6a81b65a25a6b9305afb4a2ef5fd3c00a94244dc1f3b8ee5ef1658dba1b1d25991db7f8b5cccfa187e7ff2f9d7913a0b96b4d1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1601aac6983a83987089e1f9339a92
SHA145caff6f9440629514eca05cee0139272e266267
SHA256baf73e985c8006ad607c42e57edc8177f0235d66e0ccb18558fcf5c82e53f323
SHA5124f6dcfdc9a3737df2a29ae67de09d5e15903384cbae5b3461cda5eeda07fc8034142453f7bfede3513b714fdd3b924a467e4afa44611278a4f93c7b41cedf6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b314c86c20f54fc6bf53b4d21758d47e
SHA14bc4e32b29e85b69d743efeed836ac98591455ae
SHA256ca74881731707119a01ee5fa0d1a3f0294c47eb1fa38d2cefb4e5bb850a93a06
SHA5121ddba6d6e483d3a0106bf569811bb0d024a91b612c0a8bb26b13136924f1eb398ef373c0fb29e14785aeb04359370fd51e39a83143cbabc0709a09e91a697878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53325aaf7eb9b575dc62f117630c381ad
SHA176222902bb01f7a425e61a1832522d61c23e2dd8
SHA256a69ce004f8c337b2551f599f1adf1af8b6c6edb9af7999da23f5a3714780cb71
SHA5120ba472d867001d65a93031e3837557de558fd1237e549701b81bce45b19ed5b114e858e121f0ed6750af33df5dbaed795756150d88393e21e2b69fbab92a6949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b72ad2c08e0d961e062b2c1aa97f8dc
SHA1ed81bf1e8b5482cdc7948f1de8aededa0fcae00b
SHA256d64138cf2d4efdc3efe4cabbc6842cab69ea665fa77485d2527f2f8ea7d2f2bc
SHA51208163573ade611e65fbfc412bb5a83fc71aa6468e002ee060fc08bf56fd08fc8c1f9b3fba36fd2a8a2e4fb8a954cdbf374bda1db4af42ebf4dad865e13b69156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d99140d264b98ca35161581d9b75d1
SHA1ab16fe487b482c86855fb57c24a4be6d38d1bae3
SHA25657d2d1571acb07256b9e0257bc9293401e7c359289780472a48d43f62340cb87
SHA512d0575b65abcdf43e559889aee62798ae4d6776fd104aa9b180982536e3bdbd59a9518c01ee46b466207f152df26e8f81e917f236e88baf419695b298b272377f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fe0477681bd84b66c52580d02f2cb3
SHA1429fe615c4fd0e689a1ee522b4de69f835341480
SHA2568354423b6fcaeb643ae92af820cabcc7ac0668f39c4ddafe48425e997b2d4fba
SHA51242f88eded890fe3707e1244f53f8174b1a0555abcb8dc1a8e01e3bf4056994f81126ca89413694149da3e0b37f3c461a05988f574584f81364f70574c1aead6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227085112d077dd72aad0897e8c8d779
SHA118d63449f25346c7ff06d89607f58839b2962d5b
SHA25637c379fc68c6ecb4080c10e528ce628195e9b344bc67e15e3c14448bf2559628
SHA51226d58d057ae38af92a2df63430f60ea6ec58cfa10823f23074c34c65ad89e3d0767daf51bce50507cf364e65d60c97db67cd603d7ed28fd9efd0622a46e32ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557afcccde70dc3fb41f0640f8f791ca9
SHA161af710a569b754bb8e3eedd89fc5cbb5d4d0cf0
SHA256591856c700620f2516fc84132caa4f911aed82f7aa37af44a081e677cbfffb64
SHA51259ff04b47084159e9af758249367ba53d8ae9534f4f90f2dc76908f5c8235f9ef5143849ed2bf8ed7cb5a3b5244942cd75a391b427cc451d284b9a15b2758471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c63671331ed032c6597ba87116a82a7
SHA13cd59224dfc3bc217d257f1c2703b0736e78cd13
SHA256382e505167e244f6e60f27cde78bea20750fa7fee11d58611a78f4fcbccdceb6
SHA51264562dd941c2662421b59624f823e46f310f79b964fc79f7d90f00fc46fa3c9b80343b9633eae48df10ceed03db1158861d7329c1fd5e4045cf4b4d49e49a2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a6d5a172447cac16ecaee2f3ccaf13
SHA1b0cbc41db6b1eb8c341d47c9ee487157b127a932
SHA256385ed5e30325753d9d081d944758b59576c7f562fd41d752c8325b3afcaf2374
SHA5125c01a7c1b55bbf20bc7aecdcd1bd11ab033add41d184dc8df508881ba0a2745c0e3a97cc7afbc5fa7f5122a9e5086182203e271452bd0af99c37f4a9cae84124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88f4959c7a78670391c2a9ad92b37db
SHA1993559ff4357946d56a28ffd53c0f8cf2d522595
SHA256ebaaee6b1cd61045a24bdf0d8a1238aefbc7a02f90849a042a364036ec370401
SHA512a3ecb5d18ca432fd15906e47a54100a5f76cf80f015a965170f10275ba0029129024ec16c6cd8bb2b7357ea2a18ed1156881253496cedf6a00b210336112ec3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a8e1ae2046d18b3157643c8e205a00
SHA15cce834e16bdb30e3006aec506f17a14606b2e58
SHA256fc08d6a0f2d810664c85ad4449b1dfbc98f6f2d444b9932025df032059d87e7f
SHA51213014a55aaa9c70ac8ad11273c0ee067544fc6527f11d02f52e9d00282056f81fa2cb4833f6330aaef64df65465be9c3b59e0a64dfc37de1ca0fe4adf9524949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9c317cb23f76188a90672f56e48122
SHA11460d402e7fff654a63060f1cfefa5b34b85befc
SHA2560c8dfaf4a06ca705871154be4f74191c5d674a15a57d758e348d4c4196a7541f
SHA512fc15b5e759aa86097fdf4ac6e03e7811bba62f6c8f48e308b63907a2b9b9077588a0009d430624642c8d4a10ba2b3987146864f26c44813a37c51c1962558a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e32e12857762034cf6cec664bd9ca98
SHA1b5ad0b87691a961f2b23fa7089fa2de000123427
SHA256e043c6f99833447820c39e6f90fda23ca64f009c63cb12fcadb15c12d223db33
SHA5124d0981c8f2ee15c98ecfa2607a88bf251ac428af070a85837621002b8c93f1b8979b63f761b273ee082afdba1998b08f7e75268e1a8d0bea5c98f143c39677c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4d3bc0d2788372dd9780dfde1f3046
SHA1f9d43ab066a3da903dceed1fe38aa319fe40d401
SHA256ba118d28771d13de914e55c2cf0de992afa15e9a2923d98dd478e3b0de9a7c0e
SHA512b5f7f4d1eb9d9a5147f872ced5981d0ef24d12226b3f1ab8026398bacefae20338d3ee8d5d2b5ae7ca3a9ca5a34ea73444c21d6e9f60e55cf97cd489ff7b3935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148bc9ddfd4dcf00810cceda110f0313
SHA176dd7add96d0d9bc05cf3b7f1eece3e8c8ab4fec
SHA256eade196c6079ef54271e3b8f185b5a4425d246ce85b4b92be00b49c63450a02a
SHA512c0334d117daa1521adff28afff902d6a235092ec38c04b11a467f0af400537114b6aedcead4856697a569ee803b3260e7c31779eca8d3db17a99b7aa9cd8b905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca17f1fb7e776bb338a18b1a1c12cad
SHA1de5ad963ec527755a3e3fa3ec1c5eb80d3a991a8
SHA2565605423e2c950a9e29cb9c669f9ca9052625273bb43146743abe15d5ad744943
SHA512f5d893c528769da7063f142d23d8c118aea23daf9319c8d9cac0b887335ae5b1388663e96fc85a22ce84d1e2a9984487f92d9bdd2b180b07f0a5d03686e4d7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f624ed4287a7d835c97d532be61e34
SHA100e1de5bda0d7bedc1d47ce18b2abe14180d3e75
SHA256edb68cb91c65a647e56e0f850fadcba86cb38710d9ca23756e998b2107df3f55
SHA5129e07d1b30288d6d4622224d33d6eaaf33b53301d156a45f1cde9c7227f7b8f97f39d6fa5d93864d532aea85718bed47d64a9f0175ec380c0cb76fd5532819692
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b