Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2025, 10:54
Behavioral task
behavioral1
Sample
JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe
-
Size
306KB
-
MD5
0b68c817cbef7fa31952855cb0d07180
-
SHA1
7b092659dea9fbcb7cdc5acf01fb67b3a2bd6cfb
-
SHA256
4ac8e19a6a44e1f111f59cc4fdcb546f48b5d6ccedde82ec60ef54b0de615bec
-
SHA512
9d1f98ec11126a51ecae0531307a6d47d1754891d2c96a25aab829bcd3265aab21b863f7bb7edc7fd948c68c6c47ae999a756f012092e9239579325b9f5801c7
-
SSDEEP
6144:xfNdLF0ocp0dyd+97C6H8nnMHPer11XgUfcgxFomgXHsMjoSm:xFdLF9S0deQJ8n7RkgxFZgXxoSm
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 14 IoCs
resource yara_rule behavioral2/memory/3104-38-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-55-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-57-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-59-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-62-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-64-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-66-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-69-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-71-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-73-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-78-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-80-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-82-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/3104-87-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Updater.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe -
Executes dropped EXE 3 IoCs
pid Process 2112 winupdt2.exe 3104 winupdt2.exe 1044 winupdt2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdt = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2112 set thread context of 3104 2112 winupdt2.exe 93 PID 2112 set thread context of 1044 2112 winupdt2.exe 94 -
resource yara_rule behavioral2/memory/848-0-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/files/0x0007000000023d59-16.dat upx behavioral2/memory/2112-28-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/848-30-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/3104-33-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-36-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-38-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1044-41-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1044-45-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1044-48-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2112-52-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/3104-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1044-56-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3104-57-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-59-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-64-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-66-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-69-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-71-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-73-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-78-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-80-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-82-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3104-87-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2772 reg.exe 2192 reg.exe 5048 reg.exe 4248 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1044 winupdt2.exe Token: 1 3104 winupdt2.exe Token: SeCreateTokenPrivilege 3104 winupdt2.exe Token: SeAssignPrimaryTokenPrivilege 3104 winupdt2.exe Token: SeLockMemoryPrivilege 3104 winupdt2.exe Token: SeIncreaseQuotaPrivilege 3104 winupdt2.exe Token: SeMachineAccountPrivilege 3104 winupdt2.exe Token: SeTcbPrivilege 3104 winupdt2.exe Token: SeSecurityPrivilege 3104 winupdt2.exe Token: SeTakeOwnershipPrivilege 3104 winupdt2.exe Token: SeLoadDriverPrivilege 3104 winupdt2.exe Token: SeSystemProfilePrivilege 3104 winupdt2.exe Token: SeSystemtimePrivilege 3104 winupdt2.exe Token: SeProfSingleProcessPrivilege 3104 winupdt2.exe Token: SeIncBasePriorityPrivilege 3104 winupdt2.exe Token: SeCreatePagefilePrivilege 3104 winupdt2.exe Token: SeCreatePermanentPrivilege 3104 winupdt2.exe Token: SeBackupPrivilege 3104 winupdt2.exe Token: SeRestorePrivilege 3104 winupdt2.exe Token: SeShutdownPrivilege 3104 winupdt2.exe Token: SeDebugPrivilege 3104 winupdt2.exe Token: SeAuditPrivilege 3104 winupdt2.exe Token: SeSystemEnvironmentPrivilege 3104 winupdt2.exe Token: SeChangeNotifyPrivilege 3104 winupdt2.exe Token: SeRemoteShutdownPrivilege 3104 winupdt2.exe Token: SeUndockPrivilege 3104 winupdt2.exe Token: SeSyncAgentPrivilege 3104 winupdt2.exe Token: SeEnableDelegationPrivilege 3104 winupdt2.exe Token: SeManageVolumePrivilege 3104 winupdt2.exe Token: SeImpersonatePrivilege 3104 winupdt2.exe Token: SeCreateGlobalPrivilege 3104 winupdt2.exe Token: 31 3104 winupdt2.exe Token: 32 3104 winupdt2.exe Token: 33 3104 winupdt2.exe Token: 34 3104 winupdt2.exe Token: 35 3104 winupdt2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 2112 winupdt2.exe 3104 winupdt2.exe 3104 winupdt2.exe 1044 winupdt2.exe 3104 winupdt2.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 848 wrote to memory of 220 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 88 PID 848 wrote to memory of 220 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 88 PID 848 wrote to memory of 220 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 88 PID 220 wrote to memory of 4048 220 cmd.exe 91 PID 220 wrote to memory of 4048 220 cmd.exe 91 PID 220 wrote to memory of 4048 220 cmd.exe 91 PID 848 wrote to memory of 2112 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 92 PID 848 wrote to memory of 2112 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 92 PID 848 wrote to memory of 2112 848 JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe 92 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 3104 2112 winupdt2.exe 93 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 2112 wrote to memory of 1044 2112 winupdt2.exe 94 PID 3104 wrote to memory of 4216 3104 winupdt2.exe 95 PID 3104 wrote to memory of 4216 3104 winupdt2.exe 95 PID 3104 wrote to memory of 4216 3104 winupdt2.exe 95 PID 3104 wrote to memory of 1552 3104 winupdt2.exe 96 PID 3104 wrote to memory of 1552 3104 winupdt2.exe 96 PID 3104 wrote to memory of 1552 3104 winupdt2.exe 96 PID 3104 wrote to memory of 1408 3104 winupdt2.exe 97 PID 3104 wrote to memory of 1408 3104 winupdt2.exe 97 PID 3104 wrote to memory of 1408 3104 winupdt2.exe 97 PID 3104 wrote to memory of 3664 3104 winupdt2.exe 98 PID 3104 wrote to memory of 3664 3104 winupdt2.exe 98 PID 3104 wrote to memory of 3664 3104 winupdt2.exe 98 PID 1408 wrote to memory of 2772 1408 cmd.exe 104 PID 1408 wrote to memory of 2772 1408 cmd.exe 104 PID 1408 wrote to memory of 2772 1408 cmd.exe 104 PID 4216 wrote to memory of 2192 4216 cmd.exe 103 PID 4216 wrote to memory of 2192 4216 cmd.exe 103 PID 4216 wrote to memory of 2192 4216 cmd.exe 103 PID 1552 wrote to memory of 4248 1552 cmd.exe 105 PID 1552 wrote to memory of 4248 1552 cmd.exe 105 PID 1552 wrote to memory of 4248 1552 cmd.exe 105 PID 3664 wrote to memory of 5048 3664 cmd.exe 106 PID 3664 wrote to memory of 5048 3664 cmd.exe 106 PID 3664 wrote to memory of 5048 3664 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b68c817cbef7fa31952855cb0d07180.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gpore.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4048
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5048
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD549bb161b07149b1bda99901c71d98b1f
SHA1e5e3b389c09d551bd8f3a4cf71ee30e566fdf6e2
SHA256734c4f48449a118dbdfbbe4971ecf112b26b2b45d1889678c01dea98eb5767d8
SHA512da09a2af9b7f9528916ab719ed97ee8b61179bba92016eaed64b3e7d6bf08646801aeeb0eb332bdde175eb64b48106f7cf2fe2bf01ea6128753e4ce1d48707be
-
Filesize
306KB
MD51826eb826f9dde9a87a0f5f36757c5e8
SHA16e97c98f715295197331e4b1b104aacc1fe47f99
SHA256f0436237bdd7cb07e8cf20cd60a15e16035dd8c633118d9ded399d23891b18cd
SHA512fae7981d510235e172905d9a3063d80cd4f24d82469136a96104a4056f89e8a066da66fe3f4e649ca2181ea3cad8f0359db18dda15f830968c9b769fcd8408de