Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
efc6a897f919db32ec81126ce66d9673_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc6a897f919db32ec81126ce66d9673_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc6a897f919db32ec81126ce66d9673_JaffaCakes118.html
-
Size
53KB
-
MD5
efc6a897f919db32ec81126ce66d9673
-
SHA1
cb7fabd3bc113e31094ffed2f08b7984ae4403b9
-
SHA256
48f4e9de711581a615401941b8160f1afa177e838a590a9e95b4cdaac930a55a
-
SHA512
692e378d73026a37a0a7e493bfdd156e2391ea95f26f3cd6f28ed6a6bc913819ad4cc8671a7efc0e05740ad9ead46164d0be34eae3c0711c2702d4159ee49a51
-
SSDEEP
1536:9kgUiIakTqGivi+PyUsrunlYS63Nj+q5VyvR0w2AzTICbb5oP/t9M/dNwIUTDmDj:9kgUiIakTqGivi+PyUsrunlYS63Nj+qm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FBF1881-7813-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1044b367200cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002f25e1f2f2d16ab92a64b20a10ec93c7782bfa270167d8d4207db0915fcdd2d2000000000e80000000020000200000003948685324470d5e04aa73621950c46bbbf4b80c8bcee7cef756e6da6616080090000000ad058a86ea108f7f7ab9b84f4fc788e22aa0d9f4cc71b34e948fbdce887b6b0e699000e86794e361984fcd871bed6ef4a5bcc7f0aa271bf948da387bcf5b14f44131f51774ce23b1f01307e26fc3cec4a4ecc7b311aaf95e6ccea1669a1358e28c1fcf04a5d5e02733998dd94edb8670731bd71f23a4c4fdc934cc4262c56a16ee283d5043114c8e6ae0d06dfd9ca42c400000002f12ea58c2265845758258aeaed98095ba9c30efd04dc4d708bea1e5c30c280d4ee7248da1feb881d4859af1f1ed0317fe4b196ac2c6eb6185445f38e0cbaef6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000001ecc8bc4289da18b256c00beb4997bc2ff1db1fbb12a0ceb7ffbc45365d33498000000000e8000000002000020000000d25da7b71af391cadb0b61660d7effa5ae64e4fb38aead8c67587183e129f7af20000000f5d714119eb830c47dfd4019e8cfa29488508dde1ccdec229f5e759a754777f0400000000f0f1ec3d060bc59e23ecaff42a4c55a1865f0999a2351f4831724b43e89ebe03c6a960543e79e84d0fc23a3db93b3bb1b7d5f3d418cf83153d2e990f9d82d6d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433082956" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2208 2544 iexplore.exe 31 PID 2544 wrote to memory of 2208 2544 iexplore.exe 31 PID 2544 wrote to memory of 2208 2544 iexplore.exe 31 PID 2544 wrote to memory of 2208 2544 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efc6a897f919db32ec81126ce66d9673_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7fc8c7d9572b3e852a7bd613d67e4b
SHA16c72ccc890fc9a862829d469fd09d509bb65efcd
SHA2565b611f6ba6cf14ecc453b185188ca77aabe697720bb53fb0c8124d196c9d6d3c
SHA5121fa65001c1dbdb708d59a7d5012dffb4cd14e92b50fdbff953268ea7c488aa4b15e0d6a1e11728dffbd65f9f783169647d818174c0d54700af80b57d3358f74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f5e1b031572fd4636203004ead3c75
SHA19195e3464cbf1d93d5ab7c7d3d0879e95ad4c970
SHA2569d54685f60937e389d2bc1b9477aa81623a2ac5fe182a9f9c74e327833755b5f
SHA512a5e5f1bbf353422c4612dd56ef25ce2b313abdb622b7594928ca6d126c19aab9a5c1438c010ce45a3cb76e1b02a71084c87919206da8159887b2b80234137576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1030898962d7fe1fab3cde329be1f13
SHA18f1ba47293322145701eb6de0cf1892d8840a9a4
SHA2561217984dbc8b678bfca7b613f9ae360373cd612d648ef7dc26d1a00c41d77f0a
SHA51246f076e27b0f0e32bd4e5e59925139df0d1ac316875dbfed5d4579892cb0cf94102931a740973d4d8230d3fb4e319aaf0297ec4b6a6998f38ab966b96015b6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c76b390e53ddc015a5f7d629648b6f
SHA1afdcd9357866b1d24d37b58babb50393d6c9348b
SHA256c6ebb92b117d2e93db8cc27c7ce2fc13c7b389d1fccf525adc8e4a787eff306a
SHA512695f243ff00d3dd0a04a4b2c45604342b2998e97bbbe2c3b2e565aeea2dee4c09076668f7d84915fab9264416c3faa72bb17c1495dde700c24bf31531dbcdfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65df00309cb657bd9079288833f642f
SHA17f4dc4cab2c6b097a7df62841f15876bea3c1547
SHA2565633105f7251676ecaa7f6362456dc769e5fa0d20eb704cefc9f4a5aead12cb9
SHA5125c3f697aa9e14591e00c833f3f8cd1f62d37790840f4ce19c210ea224234e2d1790fe4bb6b4709ce955e6135af6220c221191ed0c061648efc219a3f45987dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54168e7c13ca3412ca92424c5b1668860
SHA1ce52749e0fa66b1e7cb933f48e0164fd87bf786a
SHA2565eec914cd72357d47bec4545b987f61de62dc8f95e72347ae1db07ee6803e741
SHA5120b1d6d6739d42b99950692006e656262929341c2b880e334d084a05fd7da337039e52f17c10e5554bdbf3adf6b020ff9ddf90eca21703d641eb79a63c1532f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575001466581fef72002be8970d8a887d
SHA1c1b23eb351917ef3838fbee16f09a37bc0643853
SHA256f8093446cba709f130852778fdd6a3c6260b3ab81140be99410aa44af6d6331a
SHA51255aa7aa84faa2f0f9b69d920c29a7b688e27f1ab01f18fe09e670ca03b9688a1cc550d76b68093f322b526bd2c185ce332826aaeb23a0198ce4ff4b413069b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59452b34266907a7ea3a837f01cf15be2
SHA14634b7d837594b2ec9ce1914ab7c6c260c541b73
SHA25613a93cea671ebc03770d1d330af4010162743d37f7a273f917294cc8ca62a52a
SHA512e3021a8d59aaa6d2c22debefd682f15d686847e94a3919032c1edd96c4d5a113694f8e349c0df7226cefff1c7faecc57b8904b38f50ec1efc9f2713264f5e540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408682cd14e082b14acf92531aa85d1e
SHA1b219c3cb39f784df8489522c165b56d3bd31cbf7
SHA25650312df0313164d92a2ebd2ac014f90b736ffab6ddee0d3d7792a6d778813e54
SHA51242e2f30d25a4e3e59e5eb048399c87ee60f736a55555736154d3fccfd913ec4cd991e4ce93b1a480b176cb99aa2e671d8ed0b150cedadba05efb68f08cf95042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90b4dcffbfbe0ae897623587a923f74
SHA1dd3c79119e8fbc311433bb2fe3c5affb0231a4e8
SHA256cf8acd7f7bc996c67aed8da39cb1abac553945e47f67e37a67399c28f8ff3423
SHA512d26da066e5fa08e13613a8a80945d71a66e0677c18bfa8e123d8d6c0d21193c54d9bc4ce42dce9b8477dbcf97179b9693d9a056dbde38c70dbd7e131151fe344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593716714666fb41c25bfdad84b284468
SHA1c10f23d0d5f3140948279c38bce3d6fadc79eeb3
SHA25682b2b9271422f28d0e836311c2103d51651010d88c6d3316a6321ae0df1abf99
SHA512413b786b659bac1e24b1bc277887aeef338c29b934f863994447bb8c701a477ea883a9269b22f51e9cd3ef2c8efcd1ea78a563f522670c9f2e38488c3d2499a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8807ff431e6377a4c61e6b9be18cdae
SHA14148620638cfe96740ada1d8c71d687cc0a3f59c
SHA25613f83beb153f53d45a0aafbb7c6468d5bb8aa24712e7e1c75bdcb3cbb6659c4b
SHA512faff610912751431d0c0a545cad0c909e3939e50c7d3d3339e8f7993887d864e448d126a8f9c0ee647186588f035ab10af8c9b7cf21fee218f198a744760dbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f783ef0a9f1b16e9921bd9acca9be7cb
SHA1d8ceada2be4f89a4fb0141658783604a66d57fa4
SHA2561261df4a503565affa92efa863190501ba9dde08d01360ebcb16d347bacf0328
SHA512417cc0e9092a948f1c848e683fb2b6d810f5967964f57aa8e7f106cc510db0d7008831757b41549135075a95036b861da35adff9ca5611c3d547cd525ac873ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6525345a9e0e042ab9f32f962e2460
SHA18bf504eb80af5321914be027b03423ad02100bec
SHA256970740c5df90dce7bca7f5a93b5dd635434fdb0099f4585e84dd9de0280178c3
SHA51232f1129c4a7efe14e15030324b784a40ad1138bea9d25fb8407309da720f7099c2a61c224a12f893f990d366a6b73bccda165d06e0c7618c4a82de507a51d2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59912aee2b507dab8ecae1f5ba2f9b77b
SHA1de1a7a3f478bb373099bb6c91c909b1db97087d4
SHA25642aac8ae4c6959196859fce38b39827dec4cb53f099001ba6755b9160bfb1a38
SHA5122af94daef2fff0e4b52291052bc515c51d48577ad8493c1467b7a43e501307d174a9ff1280dfd4ab6d32809fda32ca9b619471a84f8c27ec2411a2dbab087bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f488785d2ea40b85d4c76986104dc206
SHA15042b4840ecbec2f6fe759e50503281484012178
SHA256aa95dd8631d7f5ee0ba73048d8a06e45bb5ca0ae795e44a06384d4d8088a22f3
SHA512b0b62e0dadac4ff4a88707f2ca271b7726e0b58e30588699843eaaee77274bbcdacf49025e7a0cc6e68731d855ca42cd976d9abdb70a59b6e81ddf554673355d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e948ae56c30fc7b304e45b27790dd01b
SHA173c433d23bc7025e5df0be3a25fa0264d1709cb0
SHA256ce9bfb8c79300c73a54cfc46b44c1c7afd3cf533f6b171e1866225af504bbc05
SHA512f68dab387f6393d7bf55c6134b8bece363298e5bb4cddcdd652424d76a9c81bb27e409b68cd5fb98ce8062a84247ba7bffa0c87a072d0f1bf64dd8173194a088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f0719d952bac69898c8fbda2266305
SHA1077a0f082f7b4b55be4ddb76091f912368fa4a44
SHA2564e5b6474bf80fb7f389176ab01a78ac5a9a53d9b87aaaa351397d745d674d996
SHA5122cfbed29c0d02429c910251a5b254b9a4259e4eb54c04bf8f0e820aec2cd000c0acafb629a6471908fdc982091849abe40a07f8e29efe656ac344ca4fcb0858b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\star[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b