Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/10/2024, 23:22
241012-3cmydaxbjh 3Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
3c90f04414d44ba385c3a614e08b6b0f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c90f04414d44ba385c3a614e08b6b0f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c90f04414d44ba385c3a614e08b6b0f_JaffaCakes118.html
-
Size
12KB
-
MD5
3c90f04414d44ba385c3a614e08b6b0f
-
SHA1
74ce99cb229a0c431791836ab4f17a4af04cec8d
-
SHA256
6bafb31fe0991ef30807b835da20c4f6a83f12fb551106baf075ed32cc6a74c6
-
SHA512
7e0507337ad8aa5749f2e90ffcdf447a03342816599a494fac386bfd09d0efe213b16fdff5ebad42741c87e8c4251734ef7d433a4e1a3a4f12b3c1a6822d1a1d
-
SSDEEP
192:csz7/gAYS/+ogOHPfUwVpJ+zuMpOpBpl000nPHb76f:c8gAY8+ovHPfUopJHMpOpBpl000PHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000084919f99a53df3847c14df8f16b16c5ec8c2ea38eb26f314e32c2263511224e000000000e8000000002000020000000064f3ed94d34aa586754b192b49685289dff9c27bc5178780081286398e32eb2200000007c9a0f6a4fd656bae60951d91134a63692878094bd66973d707d464a16d40c2040000000a627ecb41e2b48881caa9a3e73caee91ae1fa7299348b269f120bad2b5b892b150166229b1634db34f0ea6b8a618df0d1ccc76ebf6898200de1086bab5c1e88f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000069ae62f4b6a4a1e915315afcf178bafbfa292fe81b81e9c67ba868a85c056ab5000000000e800000000200002000000070d2b4ac9a5d714c80e0c133e27133afec05474a9711c7eb3da874230ac29f5190000000b8ee735b6fef7fd664d4d22a0872aa5655aa73c66332a170a4587e80ee06375d33192d646be635d89caa2e4de10fa496fb6a80a286d5e07f02ac091f819ee3f43d698d5ccbc545801beb96901e1d6aded49fbdaa0c8d6e089e653a7dfe7df49a07d4f18fc022e3794bec069420d44ddd3f9961873124a106f9c26f420329eba500753750e8691b9b74c237bd6616001e40000000c182aaf540dd387775e58423a54b686867b5a7986610e78e5af20127dcd30e09ee3047de38e1e96051ce7c42b89d88679941ceff1be41cac37eb1501b287a0ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D355A261-88F0-11EF-B4AF-66AD3A2062CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bdc2a8fd1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434937207" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2792 2772 iexplore.exe 30 PID 2772 wrote to memory of 2792 2772 iexplore.exe 30 PID 2772 wrote to memory of 2792 2772 iexplore.exe 30 PID 2772 wrote to memory of 2792 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c90f04414d44ba385c3a614e08b6b0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de205cbdba94dbb972078ea58f904074
SHA10f4618390002d9bf6042c1d597376bb0944f38bd
SHA2561f9e36e8b6a1fbd21b662187abe4ab879833494b4ddda63dca9195b329d10092
SHA512b49b26203a32febfa82de04fb8ceca234b0ba39eb861ca65f78ea1c0858a016973abcb665368794afc36f1ccf0d4f47111e83a7a486021d35bc063027259636a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713293af0e303c2f0e536b4903812c95
SHA1728160783690652207edbaf51bc9f8f6b43f7974
SHA256beb9738367769d3ffbaabdf89ccb43ec3d289fe9b44af156e2e34ea8ca5020b8
SHA5122e20c9027ea81d1e4f13e8f7b9498a700821e538e7ea5efb5689473ef5a07c5a2e41d1770bffa6f33f7a20e6f16f835f95110c4c03f896fc767a289eae471e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a4fdcbad2ea259dbb6981474a9babb
SHA1e450b6723c228d1e5235fcd728b149b1419beb83
SHA25605308661e2f7159a7bc4474db8fe57d1be6d015d73ffb454ce42151c953ba8e4
SHA5126635a5c250fd0949e60fb129d331f2c696f1ce8b950804784a128f97b2f140e8cc50aa70869ab407cc84d8d26a65738ca74c06cbd1775f3683e428c0ee0f4637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc20b0c103b465ea58d8b4e008d89c2
SHA18c30206d1fa8befafe8ff8918f08a1bc9a68c12e
SHA25649bdf829292309984c1249a0770a02abcc25e6d0a0deafe435f8552f1d8f8cdc
SHA512c860a1de137987fc1213e281c1349fd191948e075f96806c88ef8071a8460f159d8092706d8e9b73af7b10b8ddbce8a31523278353a207148d24f8f5de9b46d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c4bed8a21e3248226516db9d321ced
SHA1e0b3ff759883f572efe86929b25447b91617528f
SHA256a4387efcbabf91da8e14b232844f43d5d3b16f5ddb2c8163f20937f47134ac52
SHA51281f1f67b1b9a037fcbd54c6301c69657d925a1baf635a546f4751104dd87a13fc09106b0c944f2fccaf3356ffcf887c65c354a66f68065ba1d3acf71c0390465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6c57de0cde5cd6fb4198c600d29881
SHA1d62af02d93c13d6ef3c84cbdebbdf6eacf0fc4a0
SHA25639f14324576d83d43e6ac0ab5d7a33d335db0a7921b748e046166b62f6892378
SHA512df56484770ba89883302be6a193253b8fea561755eab97197e919b0eedef7ac74b7ba0fc29b4e6ae0a6d4699f796c3c27db7d9c12c3c994da209abf76596f768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552bf0805023b3ab49bca2e7c27b60841
SHA10ae6e4092257333973c3232ddb1f04f295483c07
SHA2560aff66b357c459aca9d5639f0a79a5a8b9a02b212d7729c63baac67ce0c25ca8
SHA51293b433c7293ef402299d3bcf00f9a8c0e76faf5a697e1cadf6c5c56af02f69333993a1c0a2a08a0d93d8dc09794a3ad6b38ddda3018dccf14d9111710670a046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b922f6abd5de3742bbf6b437c982eea9
SHA101d327d9ba0b71f9b068502403c84bb5e0464ca7
SHA2560fac1df9b0730af4bfb5d80f30f9210242c69719a9281caf883a5572adba7d18
SHA512bb885ba53024bf6c3a1349ca7844d022b8675420b36d90ec42dbcba73cb2b8e15fc0f05dc0bdee2b54af60e8d0ed5ef7fd5f49f7a9833dfaf92ee6c1b4f8b745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed5f3d6aa791234378b3f7ff334f41c
SHA17f8ad9f4799d9e6cadac0d32cad43c930a34751d
SHA25625a1d8925c766a5e623df50d65f442618101afb4b8f7b36283b0f7ec69baca6f
SHA5124d10cdb90618775ee256da2e62c4763bed700fbca62414398227a647c3ef199ac19622039e620aef75d487d4a7184d4631ef764be65849e3ddc044c8a6e25d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf36c6dd351fd96ee33167990d34d041
SHA1733134c1fa2cfa6a98b2f19cd83a6a167e484557
SHA2564e2352e11be5c7a887b6538093422a108e4f29f37905eeba71d46c16b88754aa
SHA51237feaa0614ead72982fc2f3bb7a7b8687dfd33381dc385dba25b57bc57109a8f8dadaa5534bb374d85968d24b83021079fb2cd4f9d7895181d63f24c578f2ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524997f8f4b6b7a3d192f368da10bd2bc
SHA19398ad36ba19d0688b50b4750f21b5158070b9d2
SHA256e97f51e19d20f6befd9d49ce9e34f2e3ba40a27c18c8cb1fda6d6da7cb043733
SHA512d650d299268705bc9ac3c06d93d76e7000e94bbedcac31a05939d885a2b5770b60b2d1c821f64d64312910a71435bd3662df7c32dcddddc01c47b7d51476880e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a706c87d2f68c4ec2f1bb4ce18d8328d
SHA16eb60183b98ac68fc7056e2389f2f9a2aaea0b0d
SHA2563acfcfe4c1c1b81c978e2d09db91cc239d1a4865235b06505cb6e6ec7809d944
SHA512065d65a90db2df93f8a3ebfc55430e3239f951cf82d8ffc508630d3394fd0223069bf146c5b8cfb33b879f0175b6db778492cb3eacc413f637b086800f921845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568f24465c8cda740ca05df1dcea3587
SHA1eebb0017412f9699ccc38df217f64b344d504f37
SHA256dc3b2fe908aace972c4eb610f676480b952bac4f6e5db0179c09ad21275ac968
SHA512fc7c8c7ff4dcbbe03e63b864e7212cb9b1a31833b479a075e3082e61dd5329dd0b25daa7b0226ed2831ca037f1d576d62079b259c027804f1344489bff25051d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a2b93693035c37931c0140e780745a
SHA1551240caa559d5cb97838ed47f508de1fcafeeb4
SHA2560440f6202eafd473410e9b18d5f49d7c27095bb31e213b26d877cf426a6b9681
SHA512c426a65090ba301728a454aec6c8453834a5d2243249c21ac72b2b92d79f52dd435eceb3a3e433da9ed1e86c26bdaf025c565745364bb2ec519e24cd43884909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a4d564becf24a3545f93aa0049ab5b
SHA1b2fc602d6457d9034dcfbde5004ca3be6a15f5cb
SHA256fc62c1b689de240d6611c4eb1a1725ea462853f35989326045050861cdc22067
SHA512df411f3d6a70e91f46f94271a04e6ca2f18440647b4259681aab87204955520498a42aa9bbfd8dd7c81a239ae2d9c2af60ed544d603dd2470f832a18d8e29582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc241aa71b4edf8e0ec032ae57fb6e16
SHA10967cbd050ca33e44b5a8e9a733b8632afc4c1bf
SHA256b478f4231ccdee9e68184c65bda1cacf37ff1e86d0aa355f0fed5913706b355a
SHA512b1c1eb2c7ab4aa21b01d466c77b7a0bee29146d0bce5194e395dcacd90422893a459668a2f8dfc425baf2c5423f98f560ed6c2c35b197ad86954e8efc6fe5004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565713a2b17bcef09858746d8714d6dbe
SHA14cb03b655c7ba599d14f8b1257c8beb3761d72f4
SHA256a2bdd9d3917dff9f2146b178b35e3adc7afcbb2f5df2d6f1369a3c3b4d7e8d75
SHA51214940930e58df9f12b084cb5751054a48fc958c1c586c531fcec223eb73804db01dd9a7f0903f609a6b4d172a279f17fb14f06d1c5e10b29b1a707703a9dc9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268ec11bb941913e74f43bfda8009009
SHA13379a3a6a290a2110a1033251e7dd38d87bff1e7
SHA2560a8a2a6d21e35893006ae113ee0af0e31afda95c578da6a7e47dd8a6e748b013
SHA51292fb1796e04d6fbb851f497cd86e03b73138b62fbc37671a32674d1fcdad6a8ab9717d2bc0b103a1932fcb570c0764b5799985d4865627b81258a48882a87948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82aa24e7efd5005f6305ecc49577c38
SHA1905463af962d687663e67778077cd13ff9fc038d
SHA25671d834b28cf9727a8b01aab23ae7a6e9e2f997872dc7d2399f6856c3d2695e55
SHA5124f6e8dcaa727f809e3f2a072d81f9ead251e68a1cc30b034292cd0878a203bd5244c395d97c1609ce207855f42a70bce7628f06f392ca3278c6c9a05420d655b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b