Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
3d28f98b334a99c4a467d4f431f81441_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d28f98b334a99c4a467d4f431f81441_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d28f98b334a99c4a467d4f431f81441_JaffaCakes118.html
-
Size
138KB
-
MD5
3d28f98b334a99c4a467d4f431f81441
-
SHA1
d03c735b6c0de3093bd73b84db755e39aca6db77
-
SHA256
ae242ef5df9f36170edce9716590f60824f20a89564ab22c47c82652ec17d30c
-
SHA512
f97f38fb13347ec2c67100f1f06360c08792e12580c9d869c0ca065e9b03d09f1d044a975960da4c64138a9914656256d6872fa56a2c30da5b76da48a7de87ed
-
SSDEEP
1536:SN5FDICYKllaiFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SNNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434946195" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c8c6d6121ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003434454409d1b5162b310a6785f05bf6329e2ac1b64207073c6b79cf9400d95e000000000e800000000200002000000067e1ec5fa4de4cc28b8ac90d1cf6238eb462e08a6defdce96bee05db42313389200000008ec95aefd973ecee7a99d1327d7f0d205ef65f52e1585f191901d98c84a0411b40000000639309a8674993be630c4312cf18ea745b7b1d6b66ee64b21c78d77a86403f7c51c4b2966792c50979e69de5863d036fcb555291fefabc8214a2dfca200678a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0BF1221-8905-11EF-98F1-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1052 2408 iexplore.exe 28 PID 2408 wrote to memory of 1052 2408 iexplore.exe 28 PID 2408 wrote to memory of 1052 2408 iexplore.exe 28 PID 2408 wrote to memory of 1052 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d28f98b334a99c4a467d4f431f81441_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405e15aa63a06b219251d6e78a1f6ae8
SHA1a44ca258c27f82d42b0569b967ea2dffb794f300
SHA25663f96f1a7301d171fe5f8a2a8387d250cb5b2246e51acf3cf528fa905bcc774c
SHA512bd919e3b8215e4ab222f65be3c8754f8cc1df95d0760ef1ceb1f989ea71abf67f3d23a58558690d8670a307539e6f0da92421c74d717316d3b2d9aaf56be2601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6954dc0c609950c192c0906d0032cc2
SHA17ef09cceb8bbdf9152a878ce29884aa154209628
SHA2562fc3c3f28b37f5fc03e2ba18f8a042b8536d4194ee0d6e7d354b015f6380535f
SHA512b6b90a36507f1bb8557ffba253b1e99f7c13ee14ca4769136f4ea8953b46925a2c77db9f75dbe6c3571fb6ddd7dc13a549cda04c539553537f0764d701170a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f202ac8d0113967da6ee964aeaecf9
SHA166aaa7a62aeb57ed41b7acbd9c060a6a8267d8ab
SHA25656a129d06887ec1732bd5f9884d9593684532bb926969d1e534a95fb43f832af
SHA512d0934330786338e6e8656da230bbe1af4a0d7a72e50e3b384feb6844ac8682486f530f41a0b5872162b3e5e2f6315723c0c5bacee01be1a003ba75213bbb48b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93908bbf8ad6d95aedb9edf5bab6620
SHA148e13559d4066a60f0fa82732fc1ae62de5b1e2d
SHA2567be5798d8bc4aeb7a95c4b31ffadad093ce648f2df2e83d447d5748ab39d2308
SHA51226f95a1ec2e06f365a5234d3c49e1748630f394b35de7db99e32b3b75a31fb7497a13500b368aed2b8d34bd18bb5105edefa280476b903a75b356091e5fd41b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccabaf082bea5bb0955bf5f929e74232
SHA191c475534b25266c1571f9d348700ed88bb07cb3
SHA256320d72aa8f6f3bd1457315c57e327128b06a5ab17e03efcf084ed8d080c9292f
SHA512ea1c01cba44d2ec86541a42d21b67fadbdf15f9db6b72e1a1d1fc426b9acece9034ff2c08b8be7c895bd402b3c6ac3b9bc32edc54fb28770dff4115dbda9687f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63d5ee6e3ab662ccdcb1e461a3ba78c
SHA1146b5a6b92937b438f88380ae141fccb15d66f6c
SHA2562fa82c7c92bb413be59fc6a2cd323f94a55a89f8724e7bec6fc729ec48a9ad48
SHA51291f900dc75a7f8a46cfc55feb451a3fcd93e90a4956f82253c5898cb168f13587f360afa66f08b1651391a57dd594ab4e7ce6bc72672ca12f09f997ffed3420b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f840b396fcfc93a8006cce800cb50e55
SHA1d1eaa7581b03de5056c3cd667f6e7ddff9bd3d3f
SHA256eae80c784479607e62746f362c5cdc9ee53f26c68ad45eb749cec0411d73e775
SHA512921458668b7c6d948ab44792ae4711ed0b3d263521fc89702ed6418ec5730fb0225138d83935cec906f04f80476cb3d0da19e81882dcf388b8c9d72494a45bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6e40b8f540f63dc68278e43ce91d85
SHA18657cc4133459805fde25eb07201c3eb1b4a70cf
SHA2560534e5a28f3bb606d366dcc1a626ec42c78475ffe0e9bdfe655be0de91af7c92
SHA5121a82cf1720cd1ea9b8acb888a9b960b2adc93c35f07bc48129fcb82c246dda1bd8fde9eb1523175c287294c76d9399834782d9ca0ba55daabf036073fa880d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671f6dfbf4d22379add4b8f813281233
SHA187b75e2ac6c67e4baa53d5ef0d72d39674fd2e34
SHA256c977316d131f3eb8a9a496ea73bbed211e5c0e7091797e23602884d41f9d8f60
SHA512b4a4f436f3618944f5c6436be83d3059955a27bc7ad459b3243000e7221b30fc345e916e517a9f3416f1293dd33b8f34f221a61bf7c83a0122bca39ebe4305f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcae4c7f2785ea9d9d78497f50ac3eee
SHA195c2132f793d25cf430b63dae5a04a5b3430c198
SHA256cd51b9c31d6c2518f89fe16037b36c257c75ec0929132082f79b94c9f1cb0180
SHA512442ea36fcc317916d2522d4bed0c131d3db42a6c1204092ede52c8c63ed057ef6dbb62db5810ec0ddac31c19fe0e3edcb2411688f64f0db32a23b260e56dcd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f1abe23433d8b9e076f4d6348ba073
SHA14385ce904a76f3b53131bdd79b5449ed777ad0fa
SHA25676a69895d0fc54a170d90a601e4d862d793fa438248984d08ed7b288ed5146a2
SHA512d586dd1d5fb09a6dda22b3df43cce69de0020636be109804f2b548f536e3e6323a89b64c6690e43338701094845efe4745b01f630e2423400481a4fe88d02333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d747f2757a1858d5de24c8a3bd9087ab
SHA1a7ea7fe89dae8510467d6001d37aab85f109a9d5
SHA256358fb96d04e441ad57e90987528aa8d2b1d174733678ac9c3cc815e913bfff5e
SHA51265f983b95ab3b95a593abd2c4dab3e77f9955ee06cbf2c8d2407740fb54fa802daa814c85670e080380cc6e63ba25f5fd4cbfd068cc51b71a8307a48dd42fdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7520ecafe1eb37933d8fad5018e9f8
SHA1add1bc826bb9bf82fb341b60560d3043f92da6ad
SHA25677c3decfd7aeafcdcfca3e2d25880a605f2fdbcf408ebe3a1d0459c886e92fc4
SHA5122d8ba1ea214617a4c12ec58fef6177ffd561ccb2c860841e0fe456f302727230e8ee8103aa043953e9640e6fa4f912f080d115013f663c2f325341bfb493b02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e766d982a333ff408c781e5432b231
SHA1bf92e9f570dba04b545a9aaf5be0ae6e69779ba3
SHA25603f3c257f35e3e666309c2733b6dee68a6b4735f3f610b8b20373a5050a266ce
SHA5122eeaef5ce0adbf41de3c0647f82d218733582142b781d01a3286ebf7c689b892e66d576c3b82342c5ad0e977a5d3b04ac00852ab1c4a48c1e47ff372bf781063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df66547883270316b39a6f7d5da51db
SHA1487e220ac8d7b4b9576c2e3420150b265f2bdf0b
SHA2569eba28f02c413f9c0838f9407ece27c8a33395cd38aa0e9adaada455270c617e
SHA512a59329df45198931df4a7550ad2279b5967293ea242cd77bb0daf19a0757630244fd5c8237c6e48d9e975f0b1b99f81dd4a0838434f9db204a07b503e605402c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3e00f23d25d927585260164468af13
SHA19607751c802e5092df5dd29af44f339e63180242
SHA2567bff1c72a3236db463af0d04cf062d558039d17a9c78f0c9d2e1e9f9b7055703
SHA5120db948cb556415f2a29064ee7c528fc107ff47ab834bb483a7c411d6eac2d0e7a7cf4f21bcf8813d602a2956c61966f8a2de743dd497c408704aabb9ba91c2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9e6c4142f3ae42d44a6f60e3b6a3fa
SHA17047857a8a128082a8667afde4f9b8b951de9cc6
SHA256bd496b0a9a37e387bcfb0aae6adadadbd4280945758c22a6a3d2e441dacee086
SHA5126f9b6f26d1787b67f5a524783ffbd6a45c564b42479f6c15521addab5583946b3fda4e0ccfc95b9aafa568e9476d4e428dba0f5b484bf068d9eed760acc807d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee6b2c8edf1ac5fbe405413d813c1d6
SHA1c31c41a11527ba1f637c3f4f8e49b94ad82dbf56
SHA256b30733dba57a8bbc59c98e953576f09971024f410dc4ba7b81da5681e05fca15
SHA5122f4a2c1725a2281fba5d455e632ec77ddebef991edc5af4d49e235d82f2fdc30799798315ca243d81dfaadddb2a27a8f05be9241dd79f6546a30c0275226df04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac594c16e7604242d5df0fa4be10a6d
SHA1ad1a8c138423d5a36d02c6d58a612367cd11d531
SHA256e72f5d258f4c612770940c2b1a58a3e5bb3a4dcacaafdd80f28780ed8884aced
SHA5126999550697acb4aa5ac48e903d48f658e644b3ca196733da273f86a49d511b72bfd3e849fd0716df395c5378c5f4bfc4aa5b881a64df8b6a1b2edf595c9d7037
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b