Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
d48173dd82bd7f67a109aa44c521bc86_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d48173dd82bd7f67a109aa44c521bc86_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d48173dd82bd7f67a109aa44c521bc86_JaffaCakes118.html
-
Size
11KB
-
MD5
d48173dd82bd7f67a109aa44c521bc86
-
SHA1
afa8edb7ea9b9895c041c0c32e917dd45fc716d0
-
SHA256
e30f6aa09e5596d4f4878ab669496d3bfc04700277c9528c7475aeddbb6b1232
-
SHA512
f5008fb75242c34ec66e42e9e1e51eb4df5e8a30bc13e30c98a970a2b33c6f1b6d8f806b3392464aa15b887d9e401b1342b113c20b6a5de441d782f8631079ed
-
SSDEEP
192:bJPliPyRSUW62Osg1PzfePYzZH2HFBpdG+t4c:bl7WffgS+H2HFBpd3Cc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32C7B0D1-6DE9-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007bcb07f601db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000af2b531a0306f8047f2fa9cc05138aea5270548b11ab5668503b618df59154af000000000e80000000020000200000002bbf50a92ba1846a43277184bcaf2b286563fcbecc8af3f0a5169de39c280ba290000000f9018ce749da144a03e16909497034f83a681bde73333b4221cd140a866b8561aaa8949327ff4415813138d12fd6838ad818b78bc85f4da0422f41a8645e0825a86fd067dd673ca3ea2a3a30da9fc08cd2813424f5a836dc2e45150fdfe844055759495dccfe63d4251eab53b6193bf236fabb64cb4e507caa58cd1d42e266fa3271bc38e69b801dde1a7ad56274899440000000e6c7db42e0a4f51329a25ad2e60ad9b83a9a4ac2019d540908f461ecdcd622a7c865269b39ef442eed945b9649545b8dce317cf9a61755e6eee552ed24031434 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000001b3220d0490fc3ec53da57034615b493d516d36534e711c0c66a1c46633872000000000e8000000002000020000000e63c577260ce4cdd095842ed8422863546999b2eaefeffe4329755cd4f5f0fb920000000e0adff0c958567305bd79e56f0f18dd5b5a7f758a5abe0e068cb7dd34f6579ce4000000090cfd6894a17f5d017f86b572282e18b4bd72ec346dff885b9a89748ea6920c13e962b843b2c343f1293530a6bfc75e58454dc52d615c7a57d21a48674800f21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431965251" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 1432 IEXPLORE.EXE 1432 IEXPLORE.EXE 1432 IEXPLORE.EXE 1432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1432 2056 iexplore.exe 29 PID 2056 wrote to memory of 1432 2056 iexplore.exe 29 PID 2056 wrote to memory of 1432 2056 iexplore.exe 29 PID 2056 wrote to memory of 1432 2056 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d48173dd82bd7f67a109aa44c521bc86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d665832d4439a6fb73bd5afa06cc1e
SHA17dab2583dc51c3a766f1b35aa69f508a7cf691d9
SHA2569b1367fa9caaafcbb7ca1e36bad8202eb940d5dda42475f760b9909d5ecd326f
SHA5129cd51869db5dcb202eb13afb17a166b4f31fae786a9cff5480749a349aff08afc3b75132859aa266a9d43e473d9f5ea3bd76cc532178059db8302246ce303cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56898c01130cfa17255cbab65598fef1a
SHA1365c2c9bc271b5a532f0043e9584e4fce32c223b
SHA2567b55681a97d176d598106ce923b10d9892c0689e1d645774e1338812aacf52a3
SHA512e2871326d316000d13bc64427396e3eecb42de03ddf3f77e6c986c49da84998d163190801fca8a50060972654742d3ec888f62108c78c7f3d9ca95c44a33a49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88d9593e4c55e5846bcd4c8e998e888
SHA183f13571631cd1ab92047d769e442a37289e82a7
SHA2567389701d7e5212a4eaecaf1e8801dd116e6f38c492af674abb13ae920d6ec57a
SHA512091953d67ba5f52a8a1f099ac27ada1ce7ef7bf1f862a12e6e88e1e4e05ddf49ee95305e0ee1bf1ff9e0a809fd0e443e1c029020462a877e48bfccc21f4f4b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f186a52753d9af5246de895d59e0e54
SHA123642bca9b2fac8f527efae92626d09960c923ef
SHA256ae41c76708514e8cb6ccad8cd2d2112012ece97876113cf8c2f81b967b3d3a0e
SHA5129699ae6e999ec6b20fa9765e820ac08a50cd6ff0c8abc00f20c643b3e2a8c9bb1154c81e9c14bc8c04d8c64670c1d5ea6ad3aed6699156acb5d9bbdcb7d1f14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0edb6a51700135939f816c2fd87108
SHA171d6484b6ee3fef9db83f7ac81045279001f068f
SHA256491fc1d2674fb0aedad2242a9b67d2e1b64fc7396cec17922ddba74dbee519fe
SHA512ab73db937dcf60c6b7453ea97ecc1ce1d28dc751d75849de9fa8cc4e556cd40e1b795a170691f8e9c4185d4804037af53addca7a64fee7fe7d30cf9a8627092f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550984c581f669745d6f512ff809c1156
SHA103b33d515f0017b36e8be1797d28f2c761ed28cc
SHA256c3a08120b2c5c62ae0bda622504df4b9ee526c30daf3128d782f17da94178f90
SHA5127389bb4b88ad684b4a7d8f4a182c0d87b35609ad7ef17220ac9c76419ce7ba7da31da7776c02b2e983e2277ca45b34f3ec594e855b2fa85e3bc38faaf3337972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea265621793b262b1e2ffbff1728ad83
SHA1f1645f19a54bd62d8692ec2fc200eac4f23ffe42
SHA25627e22522e03f46e3311faa8011c6ec7969ddf43c609c8822feb137a8aab8f886
SHA51213afebe762b0f0e30f7c7b13115dc2ae3409341af438fdba26a3395a57aab1028be7b2634aea38f5a19c94a0c594d6c189260f00a66a326f8241dfe015539d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62d07dd479191954e28ba1de7fcfd48
SHA11bcfeff734dbf61226d3e8db9e93b7ec93a426f2
SHA25670aef6ca1d94589204ccc040a18880fae82e1596c06cd9be58388bd57b148597
SHA512fa94a68a5790d1cb6ef47bbcdfbae1fba1c2503c5cdb57a7f2f75b87196956e310fe66bb62f6ed6179ce7f20ec3da53feb8fe9a8c351920d9bff5407989a8a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ace43b4ecd24b2cd38d01b209289f7
SHA1710e4fe27d55afcfaebc5c2e8d5a70cb57af2a49
SHA2563dae751238bb7150cf8f15b48f8bb3968bbf5f259ccf59e69cef83499544f046
SHA512abd78a382f1b4a109df2a7a498e829536c7beddb247b018a79fd1f618153f2a725784d63561bb347263645cb99ee291fdabbb62ff866428f10b4a40194a0e4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55400e945371a5420abdfe016ac0e3488
SHA131ffb4067cde74a79a6e5d7f99881104b7833a93
SHA2567779c1a11d0d0b9ca33717fc3ffa2a1cd58b8ad752d3a31a335fac8103015ad2
SHA512380b5240b5c004ab6dbe52a2475982f8470886c7b60e2aa2a0bd3fcc06fa14e7ab92b20d37ba66b370976ceb71bbfa00cb595ad100186fefff712927db308fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d590f9c7ae2d646666b4828d8836e71f
SHA1a0d1457ae061f26fa9eda9abc488218d92d882f4
SHA256926e07811b5652e72e6ff8a5d2e1f8bb0b53309826b1fa58b2f24ca95d752318
SHA512e1e6fecadf28586fbc990efa03a3720d162e2ca5a80ae376668dcf53e952f85cdd7d7bbd960b2fdcf50951963a7077ee28bab5981ac90a2e3f442c863a4f9ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502966435845188bc1b90a759fc71e42
SHA1510e561edc5f2274876e17fd8b30fec2b64e8549
SHA2569dae4850b5b035d176d0b92c48a2b334bd8993cdcd1ebc34cf4f46f00fb95e39
SHA512f8d2b3b78f8b88bf15c83e91a53d5a4664258afc16f054c10511b3e228dbfb6387171a748c9a2aee1d7a4afc828a2ebdff94b98de58c70d6aaf96a941b93c7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1f05aa355b46faeb019a690a46f3a8
SHA147519cc5f59ba7b760f0e51e5aa97a5121076b31
SHA2567b1b597d7e230f0fe8e83d7bc57ac1566d1ee0f53c18a5e1cc1dac1e382bf1ed
SHA51201fae2f6d074a82165901b2aaab4549f30e19db9763b3b1ad2cb71fece2b520e02d1b85eaf3814674ece2070df63f41f7dd378f893b22fbca8ca9b602640f741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01018ecf65ca51922a4f677d0a74210
SHA1820ba56be78334b08d5f6e96ee732c901a36a0b4
SHA25626dd0889f9c206f916bf0a27276cf90fa6447f02093cdd81baa3226880413d2e
SHA51273560cbfdacd4422a3c19d558e2f6b49a3f3d38f3e0cd03bd5f5600679f3d85a7f47d10abe213333894eba5c3e84c21e8be9e3ff720c0fa9d4734401387a3066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56129ff9b6e1264f2263605bf19a543ad
SHA17566ce5ac045781e1658c1da7fba25b246265e32
SHA25649d3299ec90ab70fce6aae55b71a97c221910930509d9a7bb709db407a1b921f
SHA512b48a446d64e69222d19f1aa1f8bd52bc03205580481e71118e45e719541b70bf3aa8bf8d54bcc46f847d04be52ca830ab6081231fc292fff5bfd223b9ba8ebbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49a5a51a593e02c484bf50269b85936
SHA131ed6b30efac75010e4d831b48d3311b8365d54c
SHA25647e52751131c6739b3a10fe37534888918243815f9e5013f119c9790b6325af4
SHA512515e4bfb22ca0f176afbc65cb684bf88f9121747df3450c6ef78b1bc3138a4f0317db332e72e0c6135466e30cdca86c11479032f66c687dc9f521154356ffed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773ca3f59d15f86e53482c4f9a6b7172
SHA1bb8e0eb61a9237a5e4ff5e314b473f1d566446bc
SHA256247054facbcd55e9f0e2496f6dea062e6c8e1100387dd1bc92c0afcce0c92491
SHA512a2180f2eaefbd418bfbbff6a449b7ec87d1fd9596201dc07fedae8fcb77b333d58c5bfcecb3361aa7a68e62c1b553cc93a250a65806441f6a68259533d0aa3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f614e3eeb42588a97368d8c323e2b09b
SHA15882cfdb6428e1d8b3c2e5cf9b37cc263eb61b8a
SHA25646b478882f367d498a78bdf0d9fa529e74a7a3ae50e68b95411a20b522cdeab4
SHA51297fe8a88db3c8d32d8a54048ec0bfe9f518c72350146559e37f91926203968ab351c59e5269e618fd6da56135739a466847f9f88dbf2cc35ca0965a589943f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c7ee0f2b222fc0fd34e69254a41f02
SHA1a4880d52c69cd304157c98773ca81543088bb1dd
SHA2563fc7afbff834ceeb96763d60dacdb57342c99c8654d394e1183a026d49486728
SHA51202064cf281b634693596bbda90a28acbc97cb408b1fd042ccbe39c39876cb933e8eb536396a62c8b5652b1d076edfc5b7bea77896f27c8dda44b3cb79cb52223
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b