Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
eab57a2b69f776aecbc533b3add188d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab57a2b69f776aecbc533b3add188d6_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eab57a2b69f776aecbc533b3add188d6_JaffaCakes118.html
-
Size
461KB
-
MD5
eab57a2b69f776aecbc533b3add188d6
-
SHA1
71af8b26caa481a78129be8ce87e79f69c05502c
-
SHA256
c87a4950de5414e680f71c3c56d4d3ff4b19d751e422b956e7c2d3616e3fe48d
-
SHA512
4494684db0ce367f7efed211e8ae4b2591de3ee91a4c0dc9d762c3917aa4b678de1aa0d2394a0678ea72126da37301cb2e5bfd8c55488f8809f49b0327f7510f
-
SSDEEP
6144:SUsMYod+X3oI+YPsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3B5d+X3j5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD50BAC1-764B-11EF-8C40-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70796c97580adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c3a2fe4990e086526058d3e3c5ba1fe3f84e8705b516e39b63c5464a24f29203000000000e8000000002000020000000ec4fc0c2400468b60e70a8bbb0792c011eb6cbede8d54330ca9eaf910939cad1900000009aa752cc1783bbce52bd105789cbbd8d786df451cafd62d22d6cb2c120e1d9319ae1d849c7f46a894827e8c214cc538e632a3c5dea25cd1d2cad4c53b2f60d250c0a2dad9df22f8a8dcffcf80525ef76d927d37b5bf048a7db26b0650d7aeb3b0afb39017af836aab9f3d6620980624dd251cde92faa6d0e6e7fc9a37d16f472a6e378b2f7f4931487353e85a095b3cf40000000b9c5980648d4b964791858a2fa605b9703c07ae969fcc4c36fdb2c51404b181da78361d82ef72bf91b41ab83a6fa8aac4871998c190bfe4db512aa90d13d5e57 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000fe9d5c361b990b6e86eb3879e8f3e43d65ba25d6de9451f54114e60a0ae162a0000000000e8000000002000020000000acadf309d0b599e476da2e66cf7ff71bbdea3e5f41c10cdd28d0c483da299d6c200000005ce5b60dd11e667469336fc1ca7e2fb1ab8d2be34f0a69ede9f13219e3eddf1b40000000a1897df63475bab4d476998d61aebe7e4aa12d9a648df42e62a62698a3049fbeba7fcb79da72eb909f259fcd2bc7bdca0f32eb0a98fc68a7caa87bbeb1fcbfbe iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2380 2204 iexplore.exe 30 PID 2204 wrote to memory of 2380 2204 iexplore.exe 30 PID 2204 wrote to memory of 2380 2204 iexplore.exe 30 PID 2204 wrote to memory of 2380 2204 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab57a2b69f776aecbc533b3add188d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cff459d7037565d31f1a0e20c26d1fa
SHA1489d5e2aa27ca31d70cdb40219f81cd4b07534c4
SHA256b4df68b37ec108f27412d5da3c0ed2fe7682a375d5601292badd8819e96c3250
SHA5120af7f71356c66fa3efe1b364994bac428e3fb5194bd8d3bd00d9715a1bdef7d742dfa89bc2db8a3cf65ea8a2d63a3a7a4470bfca11c038bf3ecc08c6bd1f31d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3415243177ee71c3c693bee814429b
SHA19d353f7ce75ebc8ba742aabb713cfd17c408c941
SHA25683fa7d52a444d8373fc82cdb1c8d2d6b1e6ed5fe52e3b5f4180667761399a8de
SHA512bf564812c587fe78a8561daeb661084fb1577fde926ea9faaf53cdb67db9aef2c3cbcb830fde667daf81eee157952af2208459b1900c9458b8545c3f8f435435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdad72e58b033d415fe5c5ac6af9b746
SHA188e834a19775f6aaf4782d75e4d40d64dc26a40f
SHA25641592c568021bf200311180f8145deab0e695cd81dd75ae908c323c446793032
SHA5125d5f1c5b25026daaf116054af1517daf146c5176f32a25e89b424a0ff65c9c5342433029225328453d382770e173152690367929b746915b954fbd4b719612c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d64a21398f33582e0481624ab4e15c1
SHA1a7d7e8e62d98112b1c4c20965c15a51d02bb56f9
SHA256bc6a1605fa34200907eadbbc23f12bc2ee6656c041afffe0325eb7f632d44017
SHA512a6918a0f356667989454ad8db288221ec68fbe821bd2c97445441896cd65a1279b7d7fe04223101bf6b47a78aafbf66fd1892619c40388201ae7f8810b516001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca07bacd0029e02a14562070fe379a64
SHA150bb16563a96f7272a81aa0b795285bca15b0c4e
SHA25630f7b020d594ecaabcbae30e50d3cc90695b900be33f93aec563066e57b6ff51
SHA512b56e6ae193cf46eb69418b00847667f6ffa0c501bca08728fe2ed65b5054de5bfe4fe71ca4006b58c9c7399d449314fbb9cbad80af64ba8f09e8079e19ecbc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ae3c42d2358a9faeffea1b21c3582d
SHA1e4d785a3d0029482e1cb9f96d6507581608bd0ff
SHA2560eb21e0a977278ce6a7858f74faa142322b0e7f3b5ca35f256b89d4532927513
SHA5128e9b2f903ac36ea4788a5a87c162bc381f2453f1197c723b8c69b6759ba8746b67fcbcdf77676a2f8819988a1cc6d01195a5331e8db2c1d53ff0c0b9366817bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb20ff65966f1822cfb98dc6d2c3246
SHA1ec98198acd35aedad2139558f4caea4c4cadc0b9
SHA2564fd2eac6491d3fef794f4141267c20eb2b3f8919827b05a6c24e5e229aa72bf7
SHA5126424fc724f2ce732cd8465933e58a213a2d7b76761da593d56fa2763a1b517d1254b0b38d6f0c114f308512b7c84043ef6fae4173833fd8f50a4889bc83bf678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6f605f3bc8175346c51ee9ef5f670f
SHA175d94f120f026ec0fd3df4eae7ce01f158a1a8f5
SHA256f3c36045f1ee5bf4e50e92783b79d948d2c01aa5277a98f74f912deb3071cfbb
SHA512d049a9923f3cbf0170fbbfedafa80f1f0fecc3734f122b563017b5332e83c6dc6fef05720ce3aa8e38afea5510cf0c3cef7b577a3fb50fed6a3827c7740671d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e497db8870879759e3337eb6ddf2e9
SHA175c72ca0f1d110ec10b5274840c7083e9773663d
SHA2566d1a9d7cf4685b11374807117d7cde8339a317fce2813efea23edb11ad720444
SHA5121484773c4e333e8489d357200d672f44365d32051cc24e9ef703627adfe7da204b79760808d1a1dee4bd324a908200f2923a360ea2c41e7ea07bb04116f443b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418dbc6c26cdf7ca05d68ebd5f0fb476
SHA11a225d531fa94db9ec42e9f6b7a276babf4a3d19
SHA256a0c01d65419a83cab0d55d01090d5faf21cd0cb4e737ca97ed5097923c464db6
SHA512c9ea3ed091e406f12e61d688a372943400405273177f02a9ed417ab59072a1278bdb19428201822f232c08342c1e908778e9811a9494d3fb0a2bda510a17d5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ca112f568c7071654c07c9b4a39228
SHA18e63194ecc1ff91a36833106f4efd38a6f74b985
SHA256affd4b21d2e24e0bfa67ddaf98dce1722bf111d50d3bedbb529f93c1ee7f38bb
SHA51251a1d9c18393150e825c2aebe8fdc4696e8306f5cdd7d48536411018888eb0d446cee9a10e6d3d8acd011794df42f961fd8edd4085658487a18af55a0f1dd11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ab58c4573bcfa210a9bdddcd4dc394
SHA158c89d7c89f62a85acf0818edc1b983ca544b609
SHA25681eced719d61a37a548a4c8376abcf84be20d4536d6bba3da5ac855b84738738
SHA51294492bc9534b20f9c4796db244472bc1626987480472dbc48c5dc9a21c33211cda02a67a8868038e587a7b222da8474e63cb945559b7bbd21b511a768eb4e141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79b3d13a508c104432a486230b82efb
SHA13371cd95147da1b0aeb3de66dcdb13f50dfa246e
SHA2561f328cdace06fb988317fd2cdca1c754a925a60cd291b988aed7217a2830ce8d
SHA512d4024b713abb8cc4a9a613085dc69410b07712bff40e8c094eb9706fac47e20eee831f63787980c8370dfc58d6e9c0118d56ec0801959307aaf58c4c746ab777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54172f06120a67f378cf21bbae02e8ad5
SHA174c7d10273ce7641b298b6f4ecfc0b30f1d1fd36
SHA256f95522f3111c01c6fe1664dd10185b69d83c0af3927b073cea45d07b8881542f
SHA512e074e7a324cdc5ceefa99329948c17914e8ae7dae2f4407115fbef0ff87b3977cd1deb455f8dc4b86b7de8cad0a965ba791bab048480a11bd4467c2ba4008e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9caf828d338a8188887fe760971fb87
SHA1f86319c7740567f91dc71d7bf60956a1b38bdfa7
SHA256b24b27ed6d214fe1f675311267b3b94bfb8e2ec52b10915dfa20ef847df98fb9
SHA51259ee2ea83338b39026cd6e2b4e54a67e2974e11be31771fbd10dbf59412ec0400fb0041e514b2498baca6f8e6a077048a748d597ae89c326da83464da7db6053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2c293a10acde9ee50da263a5aec5e7
SHA18666735ffced2f4958e66e88a9b64754feac8124
SHA2567e3ae7d4d78cf480af7a7ad9aca71d8bf42dc330bd0d83ed9d9e5fd69a6efb85
SHA51247a7d119a9937b98b6824e9c2ee8ba2d21cdbb842d1ab9f6fcd01b879f56fb9878d22f1b1154d3acc5248e291d8d33b87dda21919c73a123bf72d79bccc599fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418aa5b479c64e39cf3cafe6b31a6f41
SHA1150968074f3956a8b53a4628cb2f73a061af8341
SHA256ef8f9f7d9228427894027ecca875bf94dc73bc74d5cbcc71575eae40d14ad0f4
SHA512f3cc67cac85e2c6d65455dae75a5d1738c86e4b176b4acb454fe4d95d3a5e91d8552b110c9b5749ab96674f4d64fe4c10e3cf9b3cb97482c4205cbdc43bb391b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698d10425ee8f1b9eb3e53ba1510aa67
SHA10a1a2ef56c65e67b6d583f2954b70de9e399bd1e
SHA256e2aa82ca8bdda5d33986bd758ba1cf4fe99b9efcbba8040e18b17be90d4db770
SHA51205b980379886336177a3b4275129f7bf407e70af4606d9e70d7eb828077418fc27d8995f1443a13acf7d928173c3af413c4362c2c23ea34031d5daeca506c90e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543890b0a15d4a0239423e360395b5713
SHA1b48f3fef6af527f535a0e2d137c560932ce0a6ec
SHA256460c6f25dd897ac514b10af641c5146e84a9e2a2dca84071e34a81b0c6ef93c6
SHA5123df738df8095a65cdc27860a5c601dcac5601a881cc36e75a09ebd163f77174d56555b62745505718923f0a16d637247a195bac3e3584627e1fd88b17554a27d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b