Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
1765b8ae589e1b506d92cee4c3ef7cab_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1765b8ae589e1b506d92cee4c3ef7cab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1765b8ae589e1b506d92cee4c3ef7cab_JaffaCakes118.html
-
Size
24KB
-
MD5
1765b8ae589e1b506d92cee4c3ef7cab
-
SHA1
ee304bcaccdb10fa953f942fe2194b3589a55d87
-
SHA256
6241664804e541bdcbbbd9bccd30cb7e597700fc6f2b07036a3acd7b3f6bdeba
-
SHA512
b30438845fb1b3cc78824e2bfd53530df6df8263c96dfb678271a94cd815e9fbe9333c16e2afabc2428f4a516d42c9050bb424ba37df9c1001aa21a5c545d37d
-
SSDEEP
384:/dCRz+Zxr+e0/ez7uS+kYfSe5E3oIlUC0QYVGCU0nam8CU0XamOCU0Lam6CU07aN:EQrt02PYfWJ2UT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30D71DE1-8308-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434287536" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2852 2248 iexplore.exe 30 PID 2248 wrote to memory of 2852 2248 iexplore.exe 30 PID 2248 wrote to memory of 2852 2248 iexplore.exe 30 PID 2248 wrote to memory of 2852 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1765b8ae589e1b506d92cee4c3ef7cab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55907929f71bfeda4144227146e238314
SHA1ea4c941338307335a3765fae0f081fc89bfdbfe0
SHA25631524d48de7d4b43cd75a273c27535ddb915b1bd84252830e3dbf31ffd8ec21c
SHA512b85a41d0a923dee3d24425f153712a5a1ee004871b333889bcaaea5d19c2d2738d9174e9bdae0a4b53b95d75faee6ac91d2abf0d7d857e7a57d117cc1cc57df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebdd1d84791e907fe3676ea6114c568
SHA1462732917ba2923797ff6001ac46d377cd9efaf2
SHA2563502dec6c0f54c42896059ea7ac209b365b47d2f27b45d54cd63872f489e4e44
SHA512a39ec6b81439dcc1d15c458bfeed800084a54aeddec4611ede2b3457ad2600e309f3fab1e367323d57a2e46ee437fa52f6e4c1fadeac14768ed4cba1a7788303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88eb6050dc947a3b39c1b04b42754d1
SHA15546c2a24cdf7bd994b8518336096deb2d024986
SHA2567e21a8c0566d12f8e13dffb078b04a3ae8aa0b198cb5ea5741abf471ed7f8fd6
SHA51270f1ba23475627702cce2661acda64216f9031b148f60e08bde9a3d38070db70b7722d3e2aac360616a4eadab2e2015655d03af6f0624cafd5c44aa93b80ebac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776244d33ad6e351fb2df24bb701e07a
SHA10b4a8f8809d547bcb258be4a8f9df78bd003173f
SHA25614edcaa94518a392671ebfc869c60e9d2a6489fba3cb495d233d7e0a7672b579
SHA512d0677669e7b962179a06a8dd3c2c742faaf3229a34a97ade8d1c6fdbf288a3538fd7dfa390df5115edc429cb3a44923a8c87190f486efe962733247f8ad4ed86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534469fd10ad5645434e91d29309ca82d
SHA113cac5d6a97d90dd6024f472ad63a017a50862b2
SHA2566418a1f547b42075b17f7e1d7aec9f7bdff3074ffb8cd2458fe20f9a9b66e358
SHA51284c65de9998ad3ddf9f3536a1079261c1152c92c3466109fbde983ee6b93c7b91ec4bc6e66ef7bfb79dcb465c816892899be7b92409225877c0f69821af0d7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae17259948b9c83c23c090514de6bf18
SHA1bf112766c1874a97b61ac054b539c51243b68515
SHA2567f3599e962ccf90220c9738040224db6f2bb1f322db413a39d63798dff813ddd
SHA512bb3ffbbfcfa81c09b3272f7d2fd2664a7d27850b05aaec013a2dfd319ea2a39b55ca676d21ba4ec17e831c9bba60a5133c4cdbe4023cb4ff21b4c64a3011bb95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdc9678d5286be82205b2f2572b12da
SHA142692f91d17e250e845bfa774a7ed73c133d68d4
SHA2561ca13e902fae4e691197d09a975ed32d2059d61f26c36a2798fec2fcd77fc22c
SHA5122930460a998033f8745c75c1f44819d421aba0b61e623a971db6a67a7460e9f947c083b9afcb2b61eddd2cbde597ec7949d5bdbf0f57fd5a380f695ec137dc8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545f4a6ce0d2f79d39c14fc7945667e8
SHA1656f76a6a48c6ddc3c83b37729f5e9db4f8550b0
SHA25678459229c122e6335a75f92f001e6180ff06a69be6d4adb483d10791cd7fdbe4
SHA51290083de52cdf9e88c10a3d879497ce5c4239dc5391ad490820ab6b55f40f8df29cc6ef1b2b2f41b14f7dbf4c43534d40645cb34a074dbefa346bddbbf5f30f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f791af2ee218b78c3fff812f4a096d3c
SHA109c6ff75843c061e58eb3fbff9fb18dfb4fb80fd
SHA2567c5ce02aa825c47f8cb68741c1a20be35ce9e7a6760f95dc2e98ae08d0ba1597
SHA5124a42639ac6f1046dd537cd84e51604df572a1d0a6b146974faf91c47884ff18e98b1b543d4bea70963918e9f93404ae1dc4151cca351b31eef251801731c722a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50f0c7f95bc35c59d6949f00b66f7c3
SHA12f17550bca4850b0a339e016b19106321856e6a0
SHA256dedf8cae7043d455a77f9773354bbaa0f37504e20572d762f834225cbfe55aa3
SHA512248c504604ae84700ded9414d7051f09d748d7deb7a873e705a9f7cf203cf6bfb7592af67eeafcc56620d7bb99958d104dea1bb03e2a529a68578eb5d146f91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3909618b4e9d5b79e3aa7001844715
SHA187350b4184319bad4bc439f0c18cff47f6fd1ae4
SHA256a3e201c597de5038192e5fbd3c47bf54c32faa0a88bb86f20f6be4ed146aeaa1
SHA5122672f950fdc414e6cbeca5180dc8dc45ded8864b1ba89db6d3045d130f92705df0d85c119adff5f31742cc65cba075156985dd4a1b6ec3c86c81c704105f8460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd603082b5afa37a6cef315915e782f
SHA19570862e8682938c0c7adbb8c80105ac1e198253
SHA2560853280dfa82652008f347442250782541519ca890a8a4c03a87ab6275005ee3
SHA512112ccd0cd990e18422b297a34e062c734ce5b5ec5704435d2f9ef1b684b48ef91ebb9cb4635a050e5c873bd1bc76f0319834ef485dd504eb78f1393d7dc7576d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58004f04dfe7746d547d68a8bca42b438
SHA17aa63e3ad882c37eaf3847ce9c56521698b5bbef
SHA2566e8be16a7ba76bf675da5118456f57b4c3af07cd0bfb7bae7f20ac9aea34d992
SHA512deeaa254e221dbaabd370759f5e2b71be882fa0a2a457d3696de674acfb40be70cb1b1f96de44efa883dff8b411751224988f0d9ee080530e2808ee834d73f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b3d452274406fc24817707b3597431
SHA1a085d1706d811d4feced3a5cacb5a9395d4d60aa
SHA256e3ca31e8923b92d06e3aa1a2df3cf52d686726085ce898489cad84cd30ecb56e
SHA512dd0101166335e55be7353c188a22a310da779e90fbff7b5684d92191f80de911b4d08c61c629cd9794833a1934d1e39628e469f237479beaa23916d39fa443f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a01d7a2bf68b3239eb0a350845aad9
SHA11c03752f8a66d56fea50a04f8cf98c2edb3980d1
SHA2569b731f940d715123629fd36e888f1ed7ae3e4a8b16db702f00b9a0eb8d685ddf
SHA512d29209e335d8397399bcd3b5b7d825991ba5205189659bbe6e62e45d24c012d0d085b33ae72c619baf1d4247d3fe628d9dc1408910d0dbe06faacd12c11bd434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f94e5063753cf64488fe20213a288f
SHA1a33b1a6e76f87154e1bfcf225117bd08402d924c
SHA2564e532c8363682b3c1dac6fb26f69af5bcfedfd7bc1a6d7ffe00080ab15a20c3c
SHA51258e915a2f9f9ed4dc97df675522c3611d4dbac672a7cd8c41d167bc718b9bc3ed7150d657a686986c49213a968b850783013ce56b740ebff7f4065396835dcb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5464df1d9f717f21947dcf69020bc4
SHA1350f58f67ab2119cfe761bbc9a58ef5f01649d79
SHA256186e1268e1bad2e27526021d15782f8ea8f122e81e32c92cab71081c55c59ea0
SHA512a16bf300072d356659a811c4bc0e098650ac22ab9454d936b50580796c7106232963d2e5b9abc2bee53acb167c7a51426f2325653b69af862b54279b321c603e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52145c073b9519bc031c87126de13652a
SHA17b211d613a6355a4fba371d972a03d4cd4788656
SHA2566210bf88584046467eedda51e4c03d1b6f8eb50effd83071d023e2cab66fcbe8
SHA5125095eacabaa3390776000d4d789a7d5436586c8914d0a2b7131204430a7be7c1fdfa2eb8bee6d82a2223d232e5ddcc3b30b5b69dd607ee3288e91ad99a31dde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdcb0a31b7fcc09afd4b33e625b51af
SHA1891832b166f15dc3a18391fe876cf059b6d3f3a9
SHA25697617b66fdec7743d668cd0b6add3aba50961b0cfbd351c10f5542fdcaf3705b
SHA51249d830edda964c6b4e9999fd8f4fccaf865c4167848650b3baee03d3d0ddd1c66b5f9a3b6260a0c769ac0808bbe8c858b8dbc5379c0e4e33d0cc97789752bb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b481d455ed216851257a906e885dc82
SHA1e8dc6d734835c04ef9da99a1e1e013a0a896f8e1
SHA256ff1e99d3a29efa40dcd8df1ad7b1e2867c88f0d4f8887d8b915f28f0f2dfdbbe
SHA512eb40e5d1e427c8e6d4b4f17bcaaddb85c467fc3b2e2befbcca77847551012efcba558a19dbcae1a514a7b30c6183fbbfe2218c7c8c79a3c59a2b555f763198a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa7e58ed62dde8b596fa037747b4845
SHA16e037466de898311f7982a9b845cd564939f84d5
SHA25681bc5aa2f1d915ef04413fa1cafdf5365d61ac5540f3ebf1653741155825fcac
SHA5126909e287d47ddaba1fcc3c15f842895b0e6b374bd85b61891fdc76461fd44a71d59ec8f6dc6f1b65ec08cfd2472cad5ce92b6c16f00d93e94c3d9d913edf354c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a4d03b85a9f269387eae4ac93128cdd3
SHA1bc09a8e94c24d0b4cb20079d6af1304dfd36e849
SHA2567064c08dfa552792be29e27af86ce90b97e9c6ce920149415e0c469b65d7eaa1
SHA5121f694227131556a7650cf85d6c8098a94aa1892a2ef080444584382d2d0a7d92b4c1d13be2f1e49a39299e726fae5d49032fe7b310ed1b11baea4bf269e5c7db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b