Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
fbf8af42ef9b7ffd68d0e08a041b4cbc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbf8af42ef9b7ffd68d0e08a041b4cbc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbf8af42ef9b7ffd68d0e08a041b4cbc_JaffaCakes118.html
-
Size
10KB
-
MD5
fbf8af42ef9b7ffd68d0e08a041b4cbc
-
SHA1
4e34f590065018b378167c99066a35e5dac9bbd3
-
SHA256
9ced0df0728a83d62fd875cb690865d1d1fbe05eba4045762def1692814ebe5b
-
SHA512
08e2a3843813655f2a8731d04837005a5ff250a690253d33e592d88d67b051cd7eb31f8c2996ee97af771653fa4aecda921e296c1407897ce8b036c30010cb85
-
SSDEEP
192:5h34lIoaNNHofBaDpasmmm7mmmUfBy0zYST1YIuf8+O9O0ummmP:r4lI5NHSUmmm7mmmyn1YIuf8+O9Xumm2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ca5b5aee084365d7a847bcbff1253475751cc71b66399cc2bf8962e9fa43194e000000000e800000000200002000000098013c2d5f290de80c018c3ed6aca0ff82af6c4dde799b3497a0a4754c618d44200000009b201f8867103be254483c8374f6daf2be6679c24166d7b1511172c413463a2a40000000821757eda8d9a6805e1070c5647c3b29dcc96469be64d328af667bb2040b7a48542b65e34867f1ef28a776f96f072b6e57da29638d54e2b817d7a1987e20d213 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000005d21af23b32be067639c509db83dcd0e7d1510503eb251d1a0c6c1768bae46c0000000000e8000000002000020000000d4a694ac239682f5a07ee9d7bda9ab68aa38fe1de8c95460bac805d86aff6f4a9000000028ce0e3ab686fce0be2784ad1e85353d8a64b8b680ab9ae39b243c9b2f47fd462f5e0c9fa5d823dea441bf2af8dd7816b46ac3ee30fab6f0cb67960bfab9c1ea6be0e5e8fa08617b24c93bbfef357d8ca1a1af221ab6e739cf00eabca4a2cd6df941e726a99f37506b6a935dcf99bb49388e823e7f8d06d95608155a0db36e53b9139bbfa608f6a6ac1b310382fa2e9e40000000baab19e09d4d5c3083bec55c09780865f759e7c9ba6d18fcb9238e43f88825ae04d5de5c9b79dccb7722fba80af8b20c71a285724663d21c5310e09cf34a9d69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433676733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F04A721-7D7A-11EF-A17D-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60868ee38611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2656 2676 iexplore.exe 30 PID 2676 wrote to memory of 2656 2676 iexplore.exe 30 PID 2676 wrote to memory of 2656 2676 iexplore.exe 30 PID 2676 wrote to memory of 2656 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbf8af42ef9b7ffd68d0e08a041b4cbc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50760bc3e3736783f4d80944d0ee4d4f7
SHA13eef70edab07809f2e0205a9f02af0aa0694ce25
SHA2568b96c897e73909d7880ca2af21b3c3c5493b34532c67752c4d2f249c5e3cf1d6
SHA512b12d665e5ae83caca14ed6524290094a1d31f0d45c824f8fe11212369105f86d7ff27c10d34580b3fbb6085a4b106b392b5f3bae114ec06f221e7c3a8b1d8f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe167c10350fd49f03375e1bc380d03
SHA187c406cc699e68b9fbfdefb4388418406252ed25
SHA25684e837fe28a75cec2038a49461dc44cd25ce4f12ad95f1fca791c36292997790
SHA512f9404c30d9fae16f3f853d88ea3392991c407b74d992655c2a6ae9e2859d4585c9ae8ba1f4932b97e199b618d7bbdcb461354d1393b64320073c7b3a48568db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7ca8900af7431750d5d69d225e02ed
SHA1063e97465e3bd2342ba0fc131604598142bb5a03
SHA256b5e90d2301479aeeb598ae7f8ccfbe90e7b3e359d11bdfffc2f76391a182278e
SHA512524b7c9c4bed44be76c5a429caa72a7433369891a5a33f00fd5211916170d6f8424b348f80336824f8e98d19dcef9a318850ac18b99645e178d57d46d9286485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b341a2ab298874110dc40d2971070cd1
SHA10bf1a82ab6791825d660360ea537aefd52a6adbf
SHA256ad9d74b4f16f1e2053a7a4500636130f9b8b65f36809c79a8eb4923b2141bc18
SHA51221674f5c2cb9b30d4e19314fefa12ce1be4186c3af8dd1668945da4913f133a4c07f3df49718322ff5586e9ff88ff68d01513a4ba501ff7c1847549752a8c354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b8cfd028bdb10c648f5f6e51784511
SHA1e9690b4af709bc9b093a031cc067283fa28390bd
SHA2566b6f1d2a5351d877581871ad49d2262fbe61fa3ab8e780f78df0b2e62a251959
SHA512d8339a317ffdf480a951f97f450023ead1d9160e29088f7898612e07cc46152bcaa57390412eb9c1b1711a18bbd0a23f89afd5d572fc3e72eabc7f7366d69fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02ecbbb3425ef1d45a82f50298e1e07
SHA130eb7fa3b3b972edcc237fd038eb948fbfd241f9
SHA256a3f4bf123198f42665912e0a3426eedf59f7b12e90215d60fe9fd83cbbd83210
SHA512393bb318ac5bf42eb1eae3935db7a93bccd08cb47076989e35538e77f07586ecdb6a42975bf439163fed547c8bb3ce36a0aaf5d513f311e74b8c8a752a29fe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59216e40b8539dd4c994d4c4150bb1863
SHA158ed5c238c10823e6c52bc6cd26b62e410c86bd6
SHA256a233c9ab5cc7c0fd301b72892de123c75ac61c1138a400e124d79c4c895e6b0a
SHA5126aa00bfbb4146d44d15571c32759afd39395bfeb9f61c209abefd830ab149a190ae138d0ee896fd1d5a42146105c59125e0dc34bbd513e168155e6f0466328b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e1fc42308d832c16513262ab93ba49
SHA1708265d81edbd804feb7013ff04707fbcfef0e43
SHA256336d061fe09d76885e79eeb03c8275987adb2c2423c2788808fe1f95233e46f0
SHA51210ec00eecdc7ba6221b76c7674412e803a692393de06d5286e28424df5c732161b19df593d20b8922ca47f0fb910ca9153f81589d23bbe87e4ba932ba762c377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cacf5d6b553af926361b7b67141a514
SHA1a9e4e85e643cea7c457d1e0b8b774ed12d64e827
SHA25651ba171e7c00e9cef37af43035f7b8639d306b30a188c243050b688781aa8de8
SHA512a1ada6064cc909dff6202dc9695d37b3d92953df830dd61e37600bab61dfe12b40169c34be8670eb7581126cc345f31a2965d359f21fa4e4b1819d331471782f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77c0207359be7ee9718ef7bff8d6032
SHA16eadb21f87d176a0f500f41b317d659d950672e9
SHA2568627234eb5fa0acd838d50de148af51d553379d47d6e49aa26dee2459d780ec6
SHA512c99128910c3bb27f3679aa367ce47f271d322f1dd66b74c179f2998fe1bf7c33b71e5117130cf90206b3921ee91e31d722497898ae2388fd2f7f7f54af52d2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af93a98cb427c061850f6cc21a3c7f6
SHA15e069dfdec6d14049e99c8f532f900d52fc8eeae
SHA25689f38226f67ee91aaf5ec17f507e30689370df052edc045b803cbadb3251a03c
SHA512ff0f918636c35c72e9fee5fcaf6bc964dcc84c98bf4c96b8b60f84ab1cdb9da732d234ff0e75b714be4b71597df1d8a840912a43928f107ec90b5dd780d5eae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705acbf836040d619c183e973b831d4c
SHA1d48a867a96fd95dec2e6c29ca608f8e146bc6645
SHA2560c267eb1e45550ef6494aab7f83fd0a970144a8fe65f6066ca7839de63ff0cbb
SHA512402ae90853396c2d23159d67a237ef9e06c4dfb9f39e0656919a557112120a59cc92bdda281bffcb3df9b26e02cd9f10a952018548503d5a4af023937416c4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590aafd9bda3534a253ebeebbb668812
SHA167e3c29614baa3416181060fd8996271badd22cc
SHA256c9638992175a46618cbabaada7a4b8dccdd808b00de2e84e041f74ca422c2683
SHA512f27b7829a294c8346930d99445b7f8efaa648fac9f3246bdcd2d89e9165fc4ff32868cefb465c9132fc2abe153c6bd6b8d8d5de16198a60226ba95e9df9063b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc41dc5490ecfa45b696a3cf66b468cf
SHA16b59cd7a9bd2734c27e9c84bdbf64dc643affa4f
SHA256879dab522f3414755c376cefa030116f5f8ca69e2853afce4a66919df2dfd38f
SHA51276b0efadbac94b63d37dfe51094a3a9a1d19047bfc6ddccc01abe35e351b77450552ca2c0da3a8d322edb676ce464d76479a6eaa02fd42e72c964144a4dfafb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6ed91815adf8c63039f5124f811755
SHA17b1058c146776704f9e07abcf4cebff3b92ce653
SHA256496bf42c157aa99d2b44c1ccfa82275eb997625d0fb3f9fa6e0915d4ece520ae
SHA512fe7624ce2a1f31f45b03dc63872ab9de8855dda527315833efb62770d3d77d1c436211354d3eb824056b6323c88dbf0f1d00c4946501073d50dc20ea1a07d409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569ec331df52d41afbc0bb95522cb865
SHA1326aed3b3205f0af8c8be05162953e87ba9c074c
SHA256ee91b39def14d4f038ff0e7cdcaeb445aa479491c397ec0f86dc41448e31ebdb
SHA51240745ff78b2357229f38e6e750a3d4d029bcab00c5639a60dbb9f0ccb6d3511ae650e619496e4c33895b80838c0ebfe8cf674009771b6ba9bf2c9cdff6f09e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1fc3faff2d772c59d3fa3a78f2b195
SHA10da03c3c0b54b585d69dc48985029e3de298d707
SHA256c04032d017c659735dd916263e61e89f2676fbeb1d1a327a8ea18387642619b9
SHA512ebfaa8989b89237253d7978a8b85e88a37606a9220c6c303f2663273219074d9c948bde35b79a5d1cd36e5b035cc84ade0059899759b7713cd313d8da923fe65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002679cfbb040e4763fc52fb19ceffb3
SHA14a10dc218735e1104a3cc929d4b34178c7cca662
SHA256ba0a13eb1ea0b7e1d9576c89c1efce6a16a860e6e06997836ac370cf84449e1c
SHA512b54816eaa3384343d7b958ac4a24b6975c2914160b511b757f7388690b7a74e4305e6b84696cdbd794a9a55f9c5f53fc1f4422d8a16793204d0aa09d7651811c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1211e301dcd0ce6dc0a185bc23716fd
SHA1af15d4eeae7b0889f37a19727a2e2ac0251683c9
SHA256153ea507f854fe22b41e9f5d65194522cfd1bf74b3048cb8a37926d4bb8adba0
SHA5128cb958f5c5446ad2450857c40de018d3d3371aa808e1adb19ddad5533d4b0cef5707df28ecf725d897b4d37024a38f44b4746c197561d1269c5cbe9d1a2409c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b