Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
2e262c6252b1b79f78d2f38aeca2d4b0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e262c6252b1b79f78d2f38aeca2d4b0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e262c6252b1b79f78d2f38aeca2d4b0_JaffaCakes118.html
-
Size
33KB
-
MD5
2e262c6252b1b79f78d2f38aeca2d4b0
-
SHA1
573aeb9b0e6d89f274fa542b150da2c1564db81d
-
SHA256
41fa4ed35c76e6c7f0c4fc25eeb963b0ea258b2f422829e49240860856bd6da3
-
SHA512
b80378f3fe30b2c8750947ff1eb9c33dc10deb0114710513b7e51b35fa7fe77e0cfe168646bc27888e8baa83980b29f52a88ca74e56dcd851ada64fde5bbfec9
-
SSDEEP
192:SVB5899vQGBlvBv+vMvlvdvgvvvO2pX7PHQLkCAWE:SOp7L9ysJB43OwDwSWE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e6c1c6c0a82da4db6bc2ff2ddb0653b17c23819994a63a3b686288115dd95483000000000e80000000020000200000008453a92f8e2428011eb9861f11ad85bc652acd5dd1de18941a8352d52dc379452000000085400d6d9c9e61833d386ce3cd6baf1dbea85244b8d8ac195656c2c6c25aed6040000000a7000de1437cda169bf4c7c0d2115d94cb24c8028293d55aebcd5a9a373314417fbf3e2e8c0bc399974774b56023debadd867c8fe6c7df3356a274e7f4cb025f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01323888e1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B38BBF31-8681-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434669577" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2668 2168 iexplore.exe 30 PID 2168 wrote to memory of 2668 2168 iexplore.exe 30 PID 2168 wrote to memory of 2668 2168 iexplore.exe 30 PID 2168 wrote to memory of 2668 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e262c6252b1b79f78d2f38aeca2d4b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542dffc354bbcf9f05ef4371581d9c6ff
SHA1bf26ea7f384734a1ec6326aa2969c14e48639a60
SHA256e537e846e785423bff368fc0c96031abd2d2b2935ada938372c9e6948c88ca4d
SHA512eb3603bc21986bb23d52188821a5265017a0e2e2c2c9e8422b7cb640ae83ce71c5705ca7b01aa4b30377353cdc486e6be7567ec2ff6fcab1aa3a4b87d4774cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d89c5af34b91cf83802cf3feada43ec
SHA1f6338a0c533f4f6bf1e75f5fb177037165c5923a
SHA256dd24117f971ef3f40f57ee69d92cf7c55fe7a925c28ef1dacf2f1db846da0fe9
SHA512dcbf92895b54190d058a9a8809055f286eafe63a5cedcd793272359c3726c0209d94b5b163483df670120f21220d4ad40a101847da44c4b396b754f568fb7366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58329c9b2372a659b7272a953b40b401b
SHA1d457afe7a2d5b56bee5d326b02894758aee7057a
SHA2561f67d4aea19a76d20ed8221c3855e65de1561f200d76ee8af431376417bb3cff
SHA512fe521d8c05103887400e612f882e7a13dcf93568ae9b495dd9f94c6de95e20446237447d84631d87bef1cb52b4ab7249930ed54da87b222c51c47897b630be1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca415a4890ce65de4a74e2f61dec15ab
SHA1d07e22a69fe57315d1d579ee5ae4c44b4d3dc126
SHA2563513bb24b774f46b7c9d29840211be0d2274e9e66d973f3c87236ae2c42cba13
SHA51260704e39013bfecb8c98acb1c55fc955db658c6319cd836ddf85670e465dfba2af3bd5982b2d869fb4dfea1c103c735d0752b5aab360030a0e7957ce445e9d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b447ac8952fe678f081664898dc03439
SHA11c707198c783e947888bfbd412e5c1d3f2bab57a
SHA256073f5c9322b5d0128cb60b7880f590c6541e28a204b56f69a4042acef3743431
SHA512401f1a622e73317dea19466ffc36cbcfa0dc130e95edf0627dcac0318ddbb22296c3be9b2d2a039c703a847b3062a6c1b6ee5a625a92949e2c38fad6052858b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4daf9c9262d6b7210fd57752659c55
SHA1633f3dd70992a7da5654622b7f1c71e64a4c7c2e
SHA256a05a8e9097e0819cc92075f606c3f0dec0509641b7984ffb853849e18c1e02de
SHA512c9e8530f096ec16500fa314c64db68939d32ac2d2e7bf9b0e9bbd721335513264244ec095636d573f8d976230e844ffe6091f6c8a40fa7bf169fe1d271b20dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544621077bcaaafdcb4da49d8dd80cd56
SHA1cc0305638305fddeb8fe181b699ba1f8a9cf518a
SHA256dd70214550276db32f049dc34583dd15bc2b7d35f77a870d40fe97a58f272219
SHA512bbc2b9a70b0f2f7f73c6e7ff298c02495423a2340587a04a7d0291b3db541e23ac35b81a75f0122de82e832c4ba8171756940fabf7acd6a4d34d604fd525cb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39db76d0e2378ab7e85831525c5a3ab
SHA15a9c611d45da245833974169f6ad6eecb7f90314
SHA256847a2743e865aea2a0b09d9db3f8489a046fb9b78a57f7706b4fcc6cb955c6ef
SHA512b7b2644623a874b3776b158cc68fd1c4a354655c932fbe8ac3a1a89e4eb4fd461006c81ad5e6b7f2ebf157aca3744d1841ed9c933b2e9dda3b0efa56c7887c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d823993ad702de9dc2c0e261a7673994
SHA1b8dd7a8cd19293e313cad0c39592ed52c6fcc8d0
SHA256c092bbd1c87419b71e68af8714d83475e283d9593181ad4125187fdf09c042dd
SHA512e572b5068d5d85fc9fa6fd49fbb4d741c92d54374125283d031ab9dfd6807af46555778cf1637f01d7da38a8570cfc433c08cbe7c92f128b792cadab07073284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500406be497ee71f6ab4bb87ccd414108
SHA19cf26eef8eed9bc41e821b3bb741b18c24a9f70b
SHA256b1f589ac169e53c2911d83b8ea7073924e98c44168734b8e0145819d77951d4e
SHA512a7f70a157c09cf48fa69bacb6ab9725937ae097560a4b5d22bcd46291ab53b09f8ad9ec10011b0fe8ac41c2202593636d300fbf91ed3887fba6c33e45f2a55af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda5ed40db80f68ebcd2afad38093469
SHA15ccf78b5d44e0bdcd0045fcb527a7ffe5d468698
SHA256d666b501c288fd1efad1957d288b4253649c46a8608c458efe026e16b56450dd
SHA512994f23a2703c13ec22620a9a09fc1ab16bfce4f6191a35343dec8905b02bb8b7d72bdadd7b792691d48150973063031acfb1421097b469560c4a0f2dc29cacae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396549cb04b06ab4ab4f4e5b4c08e7b0
SHA1cb2c4b1d4c47e5e01055f9404ee590cd459ce13d
SHA256862b765bdf35b35dfded02a094b7a62fb4a6dd9aba23d66479890ef5bcda830a
SHA5127ec9e90a99b4f435f515a06b60be1297d6845f4c4696558ba021091dcca4c118286ca7374633d7c906b37337559eaf0b8cbb44a759d471a8e3e233d6bc77e2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58805042e2807a86cb01ec120cbbba2b2
SHA1cfd6d4859d676319dba1f3640b33e082ef9d3a32
SHA2568a0111a270192032b4a72d3c1371d8a8b6e00f13f1f6f7904691f520445b8acc
SHA51297541d1e6b90fc3f2eb5bf4c5300474e48ad728201df0561208843005bcda5307fa66eec03bf86c39c1ef3becf8d143de25e8d84bf5225091360665cc8bbe015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587317d7aa4a59351f6576374b210ea64
SHA159f54b8c22d1df21dabbed98469ca06ec4824c38
SHA2562b7cdd9dd579e8268107ded5fabcbb18502fd18963d7d2494931cd7f79696412
SHA512bbb15b4e170702bf6cc904a44c7dd901fd86346ca153caea61be80037df178678d228f0f06f667e254ec5689b6c1fb66662ecf9bb0cd1655ce4da7f2e6a832f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5702abe19b4679064ee99e67139eb0caf
SHA1eb4fc86a64638d34e4d862c97801f1841310e682
SHA2560e47870d9037294c410b48a8107b88c8b531021bc0d4b3ae6525b52fc62451fa
SHA5125a3beb1fff15edf400baae87be8325345d7c0e0a01b9d870a143bfb598932535d6a2cf8722b79389f2103b887900eb78ae7c39fa5573367fa61d93d407047ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5e3e09a50d9d1c01c078452968aee1
SHA1b4ca998c67d39915ee4067bc682a5cb72f165b7e
SHA256c1d0a7ef5b2ecab498276eb051fa4d1995d50044698ff7c00f534f8b190f09f9
SHA5125a75c6804467b4d3f2229006ca2e580ae83b6a7781e398d53400ea528f1a673a64adb8fb134d2f295bd148ab099d0037fdd943667c0077bce123a1e5fe3d33b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d622d07039a2597db3219727a3dbf05e
SHA1d1e2180efe3c7cabfbf3501683730c0c3ad31435
SHA256f8715ccb6ffdffe9bf301b74d9d152c2d76f8cb0e92291139a9ddf221a995e15
SHA5127ab92e26d144f1779e3b878d6cd01c2722df01787690724180e43b78bfdaf1cc49b82ed7a78f06ccf4ce2becc6d6c64c6c28d156608e14dfdec307795be53e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e30ede984a525f532d1c8b3271a0f697
SHA1f40d6c889015e4f89a737dfad0b759c2ff029988
SHA2560e1370a1152021ac95a722fc39e7507aa2ef876088079cb3a955673176740345
SHA512f4cd5251aecb85ac613de3246cec592f5e8503f7b3969a2370d11e3cf33bd16a807c9ffc1f56cec6432239d7ec2d1dc1daf818ea402c9f9474f682ca614588e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd671ba3b74f6a0d4b87ed9b892ee83
SHA1ba418975807209dc612a369f9027ec5f8519336b
SHA256b5fbd7fc42a2cc143b8188f1778ebcc9c8f22a89adc4820ca07cefb11bdd4a47
SHA512ca320b5d46d418e27019d54c3d3c38e22fd8406c5e8362c1f48e66f7c072176f9cb2e0f5d758cfa998e3aabda975e0c91834971a02ff90b92f938831cad5e179
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b