Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
e098a969e5ce4d0a8d6f8c1916f0f54c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e098a969e5ce4d0a8d6f8c1916f0f54c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e098a969e5ce4d0a8d6f8c1916f0f54c_JaffaCakes118.html
-
Size
3KB
-
MD5
e098a969e5ce4d0a8d6f8c1916f0f54c
-
SHA1
86ebcce57529a1c8fda5faa5cf494123dd4689bc
-
SHA256
2478eef741d316acf276956b74dc25d1f6dbca51f86822ef87564780d1eb4819
-
SHA512
5699fe2e52ac212d9716f6de280053da2c34446459ca193dec937253fbd1cc9cc6d6cebfb17c587cfd705dbebf84658d7de998f14ecf10493117d1515c6fe49e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432494027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AB19881-72B8-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e70843ecd0e2f0bd55ce76a61cebe70d352b50b1b07a9e4b13b49d245dea6945000000000e8000000002000020000000f3910b4de9936a975be04a9432a2cff8b85f7748b54c69b22c407ff613e165c320000000c6d1088df50f300737a08e05fc9f6fead9f4d3b32585af5e64f664d0a1f28a5a400000005a8ce90d41b3605277cce13d619c1576a8776adc3756ee1215a5e1fa52b4a08e616e60311d9096eb08c785937b89338f2acf73010b2a1ccde416b96364d180fa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0220d31c506db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 iexplore.exe 1852 iexplore.exe 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 880 1852 iexplore.exe 31 PID 1852 wrote to memory of 880 1852 iexplore.exe 31 PID 1852 wrote to memory of 880 1852 iexplore.exe 31 PID 1852 wrote to memory of 880 1852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e098a969e5ce4d0a8d6f8c1916f0f54c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca3e2080e1a559f4bf3ba1725c6fb83
SHA1218f496a2562b8b3d060359f9c8ed6bbb5c95e13
SHA2567073c220a2697ff501b74231496260ce1da846326e8000ad3d79d29253ce4eb1
SHA512ab15810f9c0051a145432133a379aafa65ef7609bf85cb64d62a0873934b811064702cd1b74b1a5d894fdd93ddddbdfba76de1230bb58480f0544f9fdfa2fd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2f16db6ab0348de7364163e04efc7e
SHA10324192d4e5fda223e09b39dfd9081b9f20a5537
SHA256410b03a39abe93ba4f674a3b5f2adca055d60a37d8fc51b764da45c1193b0497
SHA512fb2040d0bc550b442128eb646410e2e2a4373ae9a1b10861dff6af38d8d1ec9dfa2103a6378d68078de65ffc29f5ec79621cc1befdc62615fdb21b361a3e566d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe0c3152bce645aa71a990a43a8d2a9
SHA177f1bb91a84288fd4d7274140fdb5d5331963856
SHA256d3cd86c4693fddd17629dc4fe51f516b57386ef1293fa82e7a05c1ca41d8b746
SHA51223e37c849868701ac96b56bad8143c109d854836d1c42a20a10bc8f2dfc5d587da00fb1cb3ce9b62f950cb09cebd2700059a7330516f5f2c1689c835068a711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af04641d9482d6e1dca7cd8276cf6e37
SHA13707e7272183d88522948e4a6bbe5bfb42b2b668
SHA256c568c295b891974824285e892c7c3b0ada8f2a0309d0553f20ac0510f462a302
SHA5128ab82d9cb954a1e001ca900aa80a0696270ccb606f1d685ce514714c20c01b30d695922d7334e5beb735584578bd97b3fbd69e42def682a37c2f0573d3473ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08ae41ef475946ec8b39448e108dea7
SHA1a48dcf1050f291a77154f6e86cbc077b11382fd6
SHA2562ac3ec82feac90d14f254fa3b018622a57d0305ddf90f170f690cc08cc728bc0
SHA5121bdb732c9c4e545fcea08b080b5479776fa520ecb97e2d1ae48304dc6d914900ba19f09283c022d91ed309055741df9ae04a409c61b832028197d81ca447f109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9b0a232f20606588ff0c52ec6cfed6
SHA12fbe74e8fb8ce9534e23ad1f6ccd2d2d01a13bea
SHA25696e4e071e341e6ea70cf51de73477e82946e51781209d6625a5094b616ee1aed
SHA5129b99fb9b402df693617d47741e3c9dbb5af6b5e92d3e67140bf700c9612b5a4f0a444b16811d40d850e9efa1a261f861a3f79b51083655c5be685b82667e21e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f419aba1f01d1bffd5318981c163a3
SHA1c53dc532e91f5c47c057f05684c1d43a77e015ca
SHA2568d67dfaa444207128f0f161f61c79775336d10cea5cc6bd00e2a33c6c32a55cc
SHA5121a2433efc5555e8c799bbda8f63ec6c238b0e963ce3039d312025e257df18f5b65b2dc7ef3d5b7c6c0b27c9a1bce330ffca98d5ffde56fd1e8e54f13b27aaa8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51131da789677e13f3eb59ba1a4a0ea0c
SHA187ee1823540a3e8105699cc9036cbb4ec79ffd3f
SHA25619f794ae2a522af038056a3524b0b04e52e5b15e3e672527c6cc42a3ff97321d
SHA512a35a2d0728d0076a8903d5d9e0403dd99c5b33b317b5c963fc4ee339445e58211b1c0b3400777795180cf52672e341169886795107192a912b57c1ccf04c5759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942ca52c2384f43657acd4701f0a97cb
SHA1c01f7199ef6c75b808f73ba728c11922bbee6f47
SHA2567a475895055c667139aeee9cba6a413fcf99e67ab2125226f88860cb49a17cdc
SHA51208a7e758189924288f79ddca28c7971dfe6fa5be150cc4be0271fa176fb7b91a43bb198537771dc83d19bc7d1b7bb17f588f132baf4f01231cff4d710a394eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fe2834d64b6f2ed48973cd66efcfe7
SHA17cae9ba2d7f91fa91675fcad3e07417c4336e33a
SHA256ca3b8f454aa524536f95126dfddde214d6f68fcdf1d6fa4171e7ce1a98fdc2d5
SHA512e194d84d372b0166bc17ba68e28f614cb983b16ccf90cd7d6a195cdc7a597bd2719075c3f541f2d2bcc61e84434bdeacbb395a578f9deff93424f58adfb507eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf214ec21d1345107fa67e0b7875088
SHA19f19591488f08626d2b320cfe3408c66db7e2206
SHA2565ee504519e8fed515c1c3ee7b86f1e9e575154d053b3858e1557d1d4b3285d6a
SHA51210137455a4cc20156d307484732361c5c0db295c3bc405b28af26fdaa9f7dbf15ca14023ff27591e025e3981d5be12bc750186f4ec72f55d8e2ba30e277c0efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e2e63cf181fec25867dae4ea8ebf41
SHA1ae2eb54b510d2e603a308b0b42373a4808ff2c04
SHA256b2f3f46dd130fda912417b26d93a77a5af27db7547519ff32f6b9ad39c2ab8a8
SHA51212ebdc48eb30348ad2404d06c59290a86335529d76a037670d1f6956787c0869698d67dc0d6736adfd4cffbfc1eea0fffa51886b3230816da71ebe07802226a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ee683ff2f34823688ce28986140efd
SHA16c5004944af523fcf9198068b99d7c204f9f50fc
SHA25628d480b06f629b30dbd0fcd7970b2726675b9a4987a3504785c7b31ab5958336
SHA512d5d548d3ed6cf71e849ce68553409194f0a5ee4f0d24f4a8487bd1a012ebb0657c93128968862bdab35e4601ccb5f0fd7931de0583d777b3121d79f47b3a156d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730514ec4c50fdab5801706f5e948582
SHA15319213e91fac2eb90775618b30de994f9a4f2ef
SHA25692404ec87a39d45676589ff019977687d346dfbc0643ab853af4a666092d1f25
SHA512f394917daaaed44c20f8bbee0c439ef054bfac26227f934c67765162ba34ca8c3d6445eea18f9a4526763ceb1f1666e2fc051810cc72fdc57dd89d9081887b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3cd129735f89d421c9dccf8b0ed201
SHA1ae8a6d6666506d44f89e38d650eb1ccfe2572d94
SHA2568bc2c1e546168a0aed656c708d2a387af0d5a6d7a1a9b77b781fff94fea7ed29
SHA5124fc8e52a43fb1c3d85f793caea85d1712d3fb2018ddc9a3fa186c8fb1338b1230136b33f9eb1657850b9099c2f90e7fa922a8b25df9ff95501d5055fe59f3544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507733d86a4408df9a6d3b3e75f4a8f27
SHA155756d63ab6e83705d60090e1f5585c67490e44b
SHA2564763febe2bbf1c3d02cad3c78ef40db7533f550ee2ff68225709a04cfa36f7f6
SHA51213dcff78131a411b891b03400ba07b2ba26fba70b3ece5026ec9fe69f1d33c1c06ec0694e233bd3ade194f2107b51320b7ee1d2e79774e18965fe010fd25b908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f315f8ce7838cdcbc2220629b135c6c3
SHA1e8042996200e0751688ac0f3509304e4a3a2188c
SHA256626dc6af42d662d0d31fdcb5b8d7cd2efa762c979e93d19c3b0054ae334b9d08
SHA512afa77516c58446b6f48a518a0840233719664a08ae9d2575777acdaa9b444ec390af98f41c3483f28f1b9f474fcb16f8d8488371743a774d61c6f9aa71bd53cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0ab5e41376aef6d04f5178616da6bd
SHA1fb676fae62c35e0c611a593087fc5ece0be53dc5
SHA256c64190ad10f37cea33d19b5c03b3c32b09bc1e01fabd9354208ee6fe5522936b
SHA5122958a60bc92dff453bf0da222e86e95924bfc9ef98ca7f550c6ffba5c71d61d5ada187e5dae95075aa39ed457f0d151cd50c6872224478951c7259f221eb55a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6f5789f52a8525139c86b1cd97406a
SHA1c9095b8eda91166f38ef464c8838c58758c57f1b
SHA256053b18024442c1434d3456fb08b1504fd294f54e6e9d576917d9dcc82ed23b79
SHA512b6d52c27eb7b26842878dbe39c0b4139c72abfdb8aa407299d3265496cf4e0e50c5826a7e211fc626f4ea06ab0d3caa1488953f74c486f583099d2ed6c6e2b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de992045c0e8f05e0d4f51cb62a55aa
SHA1217ec34797dd0fb8b57198ac744e76eff07384ab
SHA25687981cb86b474fa7c7b9b824343e69659d45df633532649c1dfcab6d0570a547
SHA512ad2fa30bca6c5251e9d805b16d32294700e2c2559c6e2f9715f0ff827837118c8a5e6d3f8de9f4318aeff30edcd98a49aebb03da1edc066ef795d32664223a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de8b7fd40c4c49161c5528d7b714f3d
SHA1f31476b1fd3b12ca34ff8f8e2121154a2d8fe74b
SHA256cdb13b2cc7f53a105ce07df9092cf38249cbae3754c6c2f15bc06aecb8736403
SHA512703c09ab60543c97d3f859fb39c6e74ff575daebe18e8977878d9ac1cdb1058410c4f68913ae37692e7ca5be42f34efd893d8f0e63082acccfb3fc3720002508
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b