Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
f6f40673abb1019456690b263d78312e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6f40673abb1019456690b263d78312e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6f40673abb1019456690b263d78312e_JaffaCakes118.html
-
Size
3KB
-
MD5
f6f40673abb1019456690b263d78312e
-
SHA1
c4582901bc014dad1e01e0bcab40f7c47e2d96ca
-
SHA256
b191207a0091f413c5df238bce5600e551af958659484e15753978a5773e543d
-
SHA512
63e5dcbb081b2242f459f225c9ccba8443eb753a20d21d463b227c2b4aae17806695ae0720b710d66f4b52fea1f22796d32c371c70f699ff0a621e19e662001c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000bcdea16848039f4deac5b9405d911daac6e92e78864501580d883fba8c13b838000000000e80000000020000200000006de87a735d2295889c017e4b90b4281027867266e32f39753b210b921cf86e5c20000000eb53694ab180da230257712362d62e033391ab427c9dd6eada8e6d5f5beba2174000000076d39b176dc08f5ca1c75f993d51169e81592b36a18a60886c8e6f1d6cb33d2d73ed197f90d77f811705d7ff6b1f5de505132e526a4b77bcdb662f4cb664ddb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3041d2e2970fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D6685A1-7B8B-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433464131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2728 3064 iexplore.exe 30 PID 3064 wrote to memory of 2728 3064 iexplore.exe 30 PID 3064 wrote to memory of 2728 3064 iexplore.exe 30 PID 3064 wrote to memory of 2728 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6f40673abb1019456690b263d78312e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ae25e5bcfc113d8e90046aa79cf7b0
SHA16a0badcf876b1d283db6b1bab248f96b4d41db36
SHA2562bafcbcb3c16289d598a0cb3241b740829dec9ee9175b2d3af6a1204721a9330
SHA512ae2105a50aa932cef8dea94f06f57f85f451194d16e7b8a28ae4ecca1fcaba105faeb5f934e39649477730e27e3c9f2b11f90d3cd3c0505d3ad71a1a43000f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bf0de12dbf3dd14cb90df1be418edb
SHA19f92fe4202f95fc67c90cb4e16e110535f39d615
SHA256b9012eed817d10add64aef6c7d40e57001f870868276debadb845551785b3b34
SHA512e74cd1c7287b9fbb0ca2d02d82318243e358172bd0643246ef85a0304489353a249b87daeb9176a9bc1e5a8d514c4719d2a0ed99ae3eb9fb6a31323f52ae83b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389b2ac987fddd76368bf6fa5546c897
SHA1ebbfd234e028c3f51ad3b09ebd426d39ae870cbf
SHA256c4ab7a13557bb069ebf2974eb2c7397b24d888b73e34ccc1171a5f0d00070d4a
SHA512e0ddbfaf6eae29ad96ce4a717895c2b71257defb63755b43df1ee33ce852dec3b114fa0832f18e2cf7ce7d5b62a109c67378f0cb4190f744b073f8384253fb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c7b6ad26ca8fae371baae451560199
SHA11d78ac70ae58ca741a9d28fea8344b154c5e83e7
SHA256b548a4c19af8e7bd7d30d82121db907ac5232792ee9eff5e1ca77c7698f30f63
SHA512675e6291711092ea10f2674eb1d4c8971a92489b742d68d7c40ac603dacf0c21c83e652febe5d34076fb59b9a91ddcb9d674b8d1b29bf2cedf8e9007bba777a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903d6fd8d990ac38ab70c8b4910313bb
SHA1925c0042b15888a1ce3e386e7fc733f00dcb2f36
SHA256ee1b56cd8805e4dc64b3888d4864bc8908377ef764d315bd7af509300ffdf5fd
SHA5129c6b0cb7c88a856880edf0ee8cf9e4c7dcdb8e71daba5561c14ded9db051660dca405a835542fc2310ec11afa5ef2f9b7ec9b1d218469a9611f3a26eea2da618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91617769a791c1306f63e47224af344
SHA1aa36af3847889e8e98cffaa718c5be738667a67b
SHA25622b3b5896b6fb76d4fe56cc9623e96ac0d185e3dfe6218da2d07531b928804a6
SHA512e704536466c73ab684a390e81ee42f19b1f292bdde1ed6827f39396d2e0b77500cb5f32a02452583dbbd60357b45d15bd894580379aaf2bdf1c481af60c9306e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffbaa975fdb9001a3d7bc88eb4e885e
SHA11823b115a0e3bfe856e2e272a06600bab254c7c7
SHA256ceed0b42f96376f8fc8c55362d375a5b682dbf080e34776f1ff27d3199ab57e4
SHA51220eb3c73a88b993b67393bf3717d40e4064056c45023b321774b7c13b680c99c9c7bcc99c0be353a7c69c6dd3e031b5d19ab5846525dc94875b317a46350dc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab06afa23a5265d336f8ef4a41872a29
SHA16063f2ad5e9c5038c5d105703717ed0cd53b3497
SHA256b1e630c7ce1799e3512118f2780e6ba38cf261bbb7af09c692c29a56255a85fa
SHA512f6aa5cedd04d8fb6bce9ba09463787178587ea7935c3b325c830511ee6d1eb201ebdde6ca8fa265f534cce37f4083a477b461caf044f975a9de1bd3d412e563a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd61035b8676530357b8aed0a4f3c96
SHA15a3444742ea7bafb2d9f809b74a553365822a12c
SHA2566abe12fc6a2c76f908649f808cff982e0ab6b9f8359512de8d0c1348f61bb0ff
SHA5127910da4b865b0acba60c18c150b94c05c085d16b8064712dd35cebdef1814ecb22b5a8ad6386b3b2f0986b4543a13f66fca75811736445fe2042cde16d7ff715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218d64ed703ba491c67dbc138170a752
SHA103a756d722da9fdc3e6a7e9ca3bf51c37f0d50ee
SHA2568fa34de3a674df105348f9b155b3f6dadc5c741815ff2ebe6d0d71639321f716
SHA512b4ec346123c5ab46a9dca59fc8ca523315ecc86e58de9ae4ba1fb42309c7e4374cbb10bc4292e2dd1449c5566de98a7d5b599cac9f6305ff53f14b40f378abda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f314e09882904219d675f73dab84d7d3
SHA13c68cabe80c50b19a1bf4609bd095eff07ed7539
SHA2568b2dbedd7d64568ae109918678396e34ab5370c902985fe4fca427847cee143f
SHA512ce3e0895abd0311db3d7b36169ea0fb5cf9971f58c3fc00d217ebcb0aa6667b5624ed74ad7759ec913e10b01a7d1e0afa1b115b81758856bf504416e990a377a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa772ee124531aa919bcfa36217217f
SHA1d6ac558257cbd674ba5ea743003065e9d45f218f
SHA2560a370a8807253a0d3a2585c249fe863eeb527a47745cac1337acf53be9a6082e
SHA51297ee2eab16f189230763e538239f30645d15a33bd126f7ee609ab6928c1c82c1cc5d043e7b41b76866558fa451aa12e6d75deb1869a1a11fcf91f49faef99f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7b8d24eb9402f3bff942713caf2365
SHA15cf213fd687e4eaded7dd7de01a31b61335083e2
SHA25664ddfb4bd39ba761a93d98bfdba85b9fab0bc2a0805fa401a1a7be148cbd3d7d
SHA5125e1acd4832765bb97e3e09e8db9ccbff697b639c2471bd24c2ea4468d47530e72b49d288c0064c38527eb645326b3f26454b9d0c0401c2101aa6a21b773eafe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6f0b53cfaa49abb271793b6dc7e5e7
SHA1055a08da2ec53429af4e889db2b90e009290f5ea
SHA2565c84162ec4d0cc8501a93478a39837c5cf15fa54f1981bb33b9cea60719123b7
SHA512c584d2de65d76db6f773db042d6b556dde84fca248ca01d81deacbfb70509d1a982804ce05c90db77a862abd37b56d966f03ee8d7be08ca9b4a5166dbf65a604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264d0200f3ebd882b873993ebd5d29ba
SHA1425649eb00d75675718938fc1fabb711e8a3c688
SHA2566c6425eebf26ce37963ea9b9f6a09e863c1c44c9a8f99eb1cc27b13cf90b4be4
SHA51256aefd53fcc7e871673f6b676545fcda2e9bf598a9d129bf9e27e7fbb88c37ce303304fc7c886e23422af13cf36ccdcb86c89e2302553bcfe1a0cedebad6c211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec289cbfa39dfb603ef9b7707b50334e
SHA1d7d5c4ccb16f9acdb8844881e80045e4d5e21f8a
SHA256f3fa7bf4526328dd67538cbe436099f8edd18b48a67d37a735664de67d71543a
SHA512c33d4409b1ea9c2df2891b9e18cd4e7999dcff2e0d786f81123aacc0b477d6eb98de967a7c0c87eb11ef6eba0d6ed6cad02d2abad5f1abd6c9b4f10a7b35e9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca07d4705e103cb32a4ceec0889e3a9
SHA1116021ba4be49019cd5f7936dc7f5ac86bceccee
SHA2567ff01dcf5b4da3bc2e3437cfeabba81880ca0000f6d49d844f8c57f19c0c48f8
SHA512e6b7981722f1fc83deac23a57687e21f3056eedee8e48c499f94a1d1fe726175c17c544ad575f32bd11f1707252c09bff55d01d88e53c282da6834f2c338461b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3011b7cf3de736deab68dd9dce725d5
SHA169dedb4246ee63385748aa25686179d99c06d17a
SHA256cfbd246166cecfaae1563c8f06f0c35c7a1085ac26b5a4fcc39a3b52086b67ac
SHA51201e514ad4cf14d502357f4e0814be5215c436ddb32b49a250e24cbf4253366b88253f83d4e9d65145b80ba9e46ab1d6add84bf4ce0fd10c19f83a89cfbcce876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43c01ff54d99f001cb5d6102158d171
SHA1974568298009944586305041323575252a8477ec
SHA256b58d56e165b0971cce66166a365155cc89cb9dafcd0e23d176756fafccae6442
SHA5126609f451ac6f60762ed2ee2648b864af52d86a79033305c22309e33c77dee06be379945d0eb3decf637ff20a6d428ba0338c68805e451d00ee60f1fbc2699d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181b969ca8e1238b2019d25f47226673
SHA1ad655137e625b76bc5e8f8cd438614d38288d340
SHA25668db88d4e9205a18b3f45051bacd27113866e04068db992474455b2f444a1510
SHA512dc9382f12572dc30f4738441a3374134291be86dded0df6fc42e4c41d6b859ba4d88d884dadbf50f030bfb59d923142e1df88d104e0408a0a172fce8e2cab8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c45374edaaa86911af0d522987edf64
SHA14124ea4dc8c99db31995f144c6e61f72096b7e49
SHA256f6b9915b9cb60d8faafe90f340d4f74f8006a9d459e319782604fc96aae6dfd6
SHA51272200af96677c0753fcfd1f0f8729396e2ccadc32438905a278c42f2bfc8a2aa5c7cc326154c6db1a8f9b381ff9cb6b6b9289d068ebcadaf1a1a1245af3a02a7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b