Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe
-
Size
73KB
-
MD5
1048ca1c0a40090f33a95791b62eb70f
-
SHA1
9ddbe409cfae4e667daf1edcfed9ae3693052293
-
SHA256
662d7a58fe91f3203929dd095e002bce2f16e4b9aa13451829f9b43ddb5b307c
-
SHA512
136276de4220c0eb72ccf18ba6602ea7d09642827c30d957c86c3e313ea280588ecee909ccde76e5791e7f7cca38615232739b3cdb160aa521e872df9c897a6c
-
SSDEEP
1536:ttS8HYI9PB1W11nll58wO3vjbZm8JF1BR36NSqy4:ZYIhBSlllRgjbnF3B6NSqy4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ForegroundLockTimeout = "0" 1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2ACAF231-81C0-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434146650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401bbb01cd15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a939702375efd5448210695762be6ad0236c93c132a0bf48eca9219e0820f8a8000000000e8000000002000020000000b91bcce10882e6c9ff08783f9f6a57c7b927b345a5ec54e11d15a8f68fb0d42d2000000075f3ce29e5a12a5ee21261a75834a7dac0927515455688bde21275e5e356961540000000983df9f50ae59b1d2f5a17360822d7e80304bdfe81ac32feef482d022035dfa68af721c9db5199433ef93c485bcd5888be8e4bd8d4b9e971b25492f0791bab29 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2520 2332 1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2520 2332 1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2520 2332 1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2520 2332 1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2368 2520 iexplore.exe 32 PID 2520 wrote to memory of 2368 2520 iexplore.exe 32 PID 2520 wrote to memory of 2368 2520 iexplore.exe 32 PID 2520 wrote to memory of 2368 2520 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://cumtv.com/go/page/cams_view_randomcam?pid=g2422372⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b878009637e05e5cf6030de15ff30ff1
SHA1a7e5ffd0073ef36db03923fe8f741e09a5041d63
SHA256d15ea7c2df65a845a5a87b43938b3eadec3e051bf40a799e691fb0acc0574e8e
SHA512949355612b2bb3f96b2bd640550b2d515bd2e5cc24be94a494efe1e641387ab01706005301a0092bc11ebbbe0c4a995bf0aae4fc3e4963afbf72ebc85c1339a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3425a354be53e8a855cdbb5f0f606d
SHA15a250c6da5694d5e19c4b8f1d06749b2688671fb
SHA25610c29dc09c3515652b13837ac3819fa06bed75bb40635b0c0924b193d9f4c5ad
SHA5124977d62fc63e0c3a38f66f0a056d1a9e66e657880b9ea099a70fe8714bac478e64dda099f65c992a0d37b2f53a708421f2aebf9d18c26ac5d0460640dd690427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1882f3c814bb7032ed17dc59419909
SHA1200d8e2ee13475223e9cf8338cd52e853845d006
SHA2567293b2f5ad51c0d76dcb35f9d1c7becfd1d6c0e00571b8b17cede06742002c79
SHA5125a68a4840cb308400a6a0effe4b698a8194ef1740656fd4896150faebd6e16676e8e347561dbaeeeb1f7f3066207bff124810e51d87204f3e152b67bb9a73dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cd606bcb4d0e17206c97ecd8af0533
SHA1b7eaa97c5ef733c89ea44ca05e3221450c0b6854
SHA256d0cf002d3e3b4e8a70ab0a2ad76b0d0ce8caa3ee3f72d656c5d2044d92491d26
SHA5128b4c726edce7a86fbc5b1565be59659ae820614761ea19826afbc81360123635512da6ea82998bd4decfa071355adc0d8c7d25d7eed99c97e2cf2bcd8405231b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57157c0701d7ed86ca242e14be47cf3e8
SHA101fed3eefafcc20ee4de0d1e127f71cca65dcc50
SHA2566aedc5ed2710869d0417b1486ea93f925a7a9221f233e6ec9449f885867ef6e5
SHA512e359336c1672b12959b018abcf44d70e16908bfe2fd343d14c04f3d72fb525cfc7b09b5b91d890591aa67dbef3a5457db7da1c05618336985363406668f70e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530779f61433da3cd42119579c5a9a8d
SHA17ec17d8edcdf7806c3e4e87b3c0f68e8bb98df62
SHA25672560ae8dd6521e76abc871761ad0674c33f6595f3c8f56af89c610c1b16ed63
SHA51244ffda80e6a3c6d53f38edeef07f6144e097228a8d60c259fcd9b9df353cc080ac6c2320948352fbd7e3d5f74aa95eef7eabe6c4efb27bf7aad78e6f0883961a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a303c543fda376fb4c76a32803ea6648
SHA1509e8971f4e91dc16ef900d6e8053cfd96d6d8b6
SHA256dc7bfef9bcce31501aaed1b814e7bdc7f3c5f05f22e1f2cc9044f72252ed6e1f
SHA512bba55005fe2a8dabca84c0eab5332b1536b34bcb41f5de9340d08bc879efc2699a9ab7dadbd1c14f8a3b6bd25e110461fd1b06d8791558d6ae55c357c9f1cecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527990e3073622506e494c9a5e3fa96a8
SHA16b06a8b672c7e6516cc3471d32f54b1c2c819b48
SHA2567fd58676931845ed73837afc9002fedc1480bb6c05ad4c7c2376ee5ea7c34004
SHA5120f9b65006f607f454732fded6406fc7a10775997aaf472e453cd7176b537c1d32913d58217bc6534c4ce1118bb17879f35f36bdb7891399f7174702cd5015bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549410ba25cd6c81aaba8a3c26bee8137
SHA12ecb7dd82a29c855fa4892a425c90624deed9d92
SHA25641515b7181fd03b439d960538518f7631998438205bbb67db0cc402001f86b59
SHA512872e509715a419b2e273f41a6941118a8c59b0c2d98434e90fdecf7d9257ee7990a600c0566d02388db5024db752c7f1060eca4d902526fea2ce069699d52bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8dbb22ceda90ca20177936993042d9c
SHA18df6ce88206bb94aefbcefdf8265f0cdcb7d0a21
SHA256b2edbde4902cc2c1f4d5622eb7726e14026a84d00e881853fa1f65442c73bb68
SHA5129065ea8b3c20b9ce0d4027511033a62d2b480d3a5ff988b37cf909f76c10fbb43b3e65251914d9138c761001b15cfa2d1599355b95fe903946f749ec8eab7ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c47a66c23bd46006a491e40ab691e5
SHA11c82a143583efbc83d3ac02588eace44d411b716
SHA25661990882490daaf58f2fc25829ca0b424956276a1af7f45645d5098e1ccb65b0
SHA512800139d9683b89596b5717940688f26a2a64a145315a0635d95bc2795690ce595568da74a3af78eb2edb8b25a2a7eb399834f3bccc5645c223e831df3f0aa363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4f156a3e0c6a6843c255a4e7e6053a
SHA1af83d79665c9acb33659a70a5ebdfc55a96d0668
SHA256b86ecca544714491a5a2d5b495a8f187ed515b34d6129f45080d1302fedbc510
SHA512b4600ab12f2eebadfa538572036e4aaca63eb8101aa932479496456a7979aae7f4a381d75e0df1346122fe8fba36fcccd0d29ed75effd4a7e02c225bd5468043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccec5c1a1923c73657a68845a871bd28
SHA1a7ca2bdd51507a0f3e6c7ca53757a3c54ecd6cbd
SHA256ffea711b14f38ac9a94e55d4469349d0c59720099a6acabff223603e67257d07
SHA51200bc72a097d2eb01d1cae99d857676d4f18e7b64234d9d73658bd0fc0215d402ea10a7fb0d55eb863448aac4ad957eea19ba592b02cc3244a03e5c4a5d1d308d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d874641a4b568f59f7624e5e20d381
SHA1bc1fe88996a2d4ce91d49241c5e29ee4c13db42e
SHA2569a8638986da7422798182c29aff1282f49cea9984445de06201a8a909f58b3ef
SHA5127acb7e2b75ea00f470bd289662da2fff0e08f7fc6f04f6ff9570ff6e8881a89c39387db525fe3b586a48d69fc2452ab5b9c8015abfcba3e246fdef1fd79a8c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f17aecfc819894ce1d753921ed45fcf
SHA10f8b122088f3134642bf8b3a67779b10931406c3
SHA256c11cd0b49678bd55421f93661d286e60334989f32458010c2bf4b3a04d8b00c7
SHA512145cabfb99e2e27550a7b2598d51cd0ceb3101fce6f1dba0601f8eb82697b01ed161a5c2b534d51bbdad8e2bab6777cd235083eafa6af0ed2e3dcc69d33975fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb471294901fe0f7254e7da9b3341f2
SHA11a2b312b7e564c666c99eefd44c2b9568e977954
SHA2569c86d32be8f6652291816402e17a77e261558bfa1d4da885ac22b9b299367a09
SHA51208805b91fade7609fa5b03c50035226269ecd0d9751c812d6c8a7d8e921213a0fdd031d1fd15df49b5252251f1247a73a17c759aea252d2226acc601c6f87968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a484cefe0b2645408a822f9f7940e934
SHA110737ee31894caf3c6831586700f42d209c7f6bf
SHA256ba4fcf8ad276e760f064a76c4d76e2f1c52793534661ebbb8f64037e15774806
SHA5128c2284d40ab150c69e3587f066135f0bdac5e555b7f7fc16c9354264794e615562faec444252a44d5689f9f331ad083788746cefa312ef8ba6bdb6f1369c929d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591af80c5f3113c1326823c1a9445628
SHA13febe77249336ae3b8d7ea4e64188d15d313ef0a
SHA256cd19bd4d9bf4f8a715c469da0b2e873813014ec62eabb96a1027bd3643477e0b
SHA5129529926ec453d67ff29f4cf728da842285261f19e1763df36b117f4ca39a1d1c9a93d5b22e4411f38b3387f813962ae0a107e5fdee7fe4aac6e29a4f66c52a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b824ec5d281cc7828e04244bc83198
SHA163237d8a304d9f4c3b3432a603cd632fccf05225
SHA2565d67da5fa3808c19f7dc22212a7a1b2ffa953def8da6820513ab9249d83af2ea
SHA51280777bb48ab5625fcb292544cbfeda19c4fa2c790dafea6591ccf25bfe00907218cc30149d20d1925af8050ba6773b3b5f630f341c8e96d08a812976ce6ea70b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b