Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
3a2ea0023153223fe54342f5da9a5f4b_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a2ea0023153223fe54342f5da9a5f4b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a2ea0023153223fe54342f5da9a5f4b_JaffaCakes118.html
-
Size
6KB
-
MD5
3a2ea0023153223fe54342f5da9a5f4b
-
SHA1
5cbf9000d32ad01682636daa38dea232258bf77e
-
SHA256
ab0188ef103fd4aa38497a591fe7be1acf8b543a875b077cb42faaa06643e1da
-
SHA512
ad61efcd76665cedd605179a4843d92f96ab49cd393a511403b06ae0c7b11dccfd1e0e38c3574c3ea0211ec694afa6a5bd10fcd555ba90aa27d560b8bde5bad6
-
SSDEEP
192:IaCIAE/gZTuZ5vHtgn5y5RYun6K3oCeKw4:ioosZ1HOLax+4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000055b7fceb2235443898c1bdb12ca444ff7491c07fd17d8f6578e2a3a721037401000000000e8000000002000020000000115c21a03d6d6a8ec36337a9f3b8ff3003345da6c7f59fb9eda60c64f3b4df6c9000000092396456f94f87a468599a15b54fcbcac3132b2ea13a90cd74294a68c75bce1ae275309fa11537de5e88762756eabe283fe9364b7dd26e4d399918bca594de9d4b70be4fefd85672c8af25f2f80e0bfc583c416c778ddf45f1a6aee6253fa75eea4a863c6378a2908322e61af24645c1b00865f410c267e3f5a6966a7d6cf8c883aad27d9e0bac23ff68d18bebf87e6d40000000ea4bc8599aa878e0693cdb3e07c9260d1826514dcdf280e60b7a91a0301f72f715bb90530edee4c82eaf9d2924760c6d05bd8d042d588469dd115eaa3f13e29a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E22DD81-889B-11EF-87C7-F2088C279AF6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b6ab03a81cdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434900425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000dffeb2563d3baeec5238e3825c13fe8aae40859020539d075e5755c2d708e5e6000000000e8000000002000020000000f182e65e67424b419fec6cb36ab6871bc8b2ae9941d2488705ffbe64ac6189d220000000b9648f8327472ab84ff400cba084a6437426abd645da4cae175e6c5edde61a6740000000d3b131f1af57484a26030f4638a52a889dc2733d3f26ffbc196b7397d4da0593492bd8965a35e19e3fad867b48541b0b4ea0e242f762bf0b331f02f33fa8c0ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2984 2172 iexplore.exe 29 PID 2172 wrote to memory of 2984 2172 iexplore.exe 29 PID 2172 wrote to memory of 2984 2172 iexplore.exe 29 PID 2172 wrote to memory of 2984 2172 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a2ea0023153223fe54342f5da9a5f4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767ff70183cbbf9bef59ef88bbc30f89
SHA1ae2281fb9c39a5c6a783c2b7c19ccc25bfab4ff1
SHA2560a156cdd3172a40fd3edff57dc09301ace54424cb9daebe939969ac77fde5383
SHA5121ed15bb6e4a867871dd37101035f9c58dc86f394d92b657616072db003be042339917da38068aa813c00b75c9fa7ce28f55e8115aea310d5fb85ab666c99ab79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673d14b7bbddeb5e36850850290e143d
SHA151a67db5a17fb39de668d44c4e909abf049aab59
SHA2567b18306eb64fe2361463b5aada235749db76967a09ddbea7ddc874eb78ee6ddd
SHA512d272a3e7bd840d0d127d29de18c80ded661f9de91bd06a5b6190ca3d00ff9eac1a912c97c1f43f1860815a1ac1f97dd426d5923e1110d6ea2a478670dc3ee715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e673f239f3679080f351f1485e273b4b
SHA17fe6e79b5d999644dbad952036b36f01b8415c3c
SHA2565a592e211e451c4dc928aaf1a0d152f67911fc93b8789d7d0ad53c38af70dbf2
SHA5125e5e55eeacfbb65645a6c7e634652a92242209f4d36cc2d936e2a0fd37219ab34ac74a929e7a0402fd02e9c4affa3a07460b738c8c51427deb8f1d837b19b65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ccf29806592f1b4331a6274fd3803cc
SHA161fa9687596ba2e820e767ff3fac4c9df4a4c376
SHA2561da396806e5a848144f7a69e39626f89bb96087d3e06f7e31b6d6b0f9ceefcaa
SHA5129f8e8e50c0ed9d505f506a40bbd6529ad6063f8deb1d9d56fd7f116633ca0f0a10bf4c80642e83d6c40d0e251cfae23cca060ba45edce4477404a47289c2f024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215341c77547cc0bf7f75079d62933b8
SHA135c188e616b151c36641521d494902db7270a454
SHA25664b353bb2ce9cb8b77e5df2a6189d94e03fb99d6b36523a4722bb9fd88a4bee4
SHA51263e70f54a15bf30d4475fcca0ef62711827606d1919453bbcb9b3e5b963ae03108fda99329c0659925202b86ef473bfafdcc663df7913583b1bebf41ffa84776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55320e34a8efb626f7ea516d66d5c63e1
SHA10dad21844129bba645d096e9c5449055b67f1511
SHA2564c939e683304b69a934c6d5b4ec7cacb122c0fcf9157c249a2760ed6e8b75ac1
SHA512680754a8761d42df42834fc376cce1464cb546461e5904e5a42b78df893567aacb630a560d935d703d883f3579835f9870e3b7c2f9ef58ccf04f896620dd20de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec376078b179515e41604819dfcd952
SHA1e631a945d527000144c245652ba31a77675177c2
SHA25631a681ec96de7d040bd177d8178c67ed84272f0572bbbab87d2db97a612eaaa1
SHA5126db93b94f88e9a13138cda2f5090265a34294376b0465e9fe23c10836e9ef08e23b8b41a86b4c15d05afbbdce0a8fe35c75e2dd092de79525daf9891b375e3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50afff3551717c9d1980d373508485e18
SHA12d37ed8492ae32837cba67e69d084a3aec8cc35e
SHA256358e51b19d67ea816e1e92f58cc92f1dd2bd689e5e722673ff4e3a5233903db9
SHA512405a3463993cd1839561ff81bdac19af669917cb242a0fad650eb818861dff9d3cceea1dc25c773cd5fd0b09e823a35a5fa8b86df7a2c7fd1be508d30f8e1955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fd32a7e9aa2ba2b9717b6c2e87d2d0
SHA1fa66ced94cae7ad1e0e7dc8e14e511d366ed159c
SHA256dce1c94f6a3d1601180ce7eff65dba81868ff33fc743ec3ed58ac8c072f8f1dc
SHA51228f47a9d148e2c3b168b619414a8350cb3e1b2ec1d1bd1b011406f3600b1410a625a9662f8d2f089d8834f4bef945dd1bac7f76aeaee898d21d6ff9fbc3e0301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbdcdcc83a4eaf2e230e7c01c6dee6b
SHA19117399f21c50394e9ea6525ce8545af06ab0a0d
SHA256a27033c1d65c1024cee55f49f9608bef1d4759266b0c3b55724c2d885362dfe0
SHA51256a41acdae16626d03b9f6ad18899507494f05ccb3833abd9720b7db9acd0a1e4f40c15456c525f584eb7db64fe696e689e6a71889d8dd403527c312f79bf12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160131ff8152297c4de2e32a8f64d122
SHA113e7a8ffad56e4cc9dd7b70f4833d9bbbc3d648f
SHA25667f8b27cf544c49036d4ba9aee0f8d87360dd109a47959afd9ef05af83abc533
SHA512ef49003947d61cde168c2bac2aa892e37a7e948999cecb3ac46ab8ef303f34f105bb0a7030c902b500ec036af947b17a048b5458dbf07c8e8c54e54a25ad80b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51276e8004a725ab6966008903ba43391
SHA1e5c6b8c8c5c9bd12237edb67d22ac07d79269c91
SHA256c036f602473099259118ca6ffd7faa6b56c13f459b52751d4e9f76b50fe85dfa
SHA51202ed8c9421e2a152a426111f94fec7e3613b796e0a0804f0f7a3efc35a08d90e9e5ed113915c13ccb69e6d4bd03d6da326719a4345ddc5f0b9e5e123c4f5e4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e21279267f87e60ec8e5e6665f29703
SHA15552998c54101f5d737c012150906f48c8bb2c73
SHA256e640f7c0c8aab6a3333773048a8645af05b79cea6ad2a588ec9056e4f8267530
SHA512a98ffa80c202ce97ac887fa80be9afbeaf84b62d681042c98ecae787b1a5ca936050a3ada8aed7e0f951d9fdff58f6471e702bac85ea2ce37bf09fca17a2d2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff70d7224073411f3fb07902f5694a63
SHA1dbc4118193f523ab32393a4008852514f3bc30cd
SHA25643c8778ae8ad851e7938751ced074282461e01c600b5ca06c19dc7fef6ff6f46
SHA5128ab4852dfe49b46f1d51ff1851c8cf3af58fdd07b6695af2357cb96b0dcc2a4c8b9d805e6b5b38b0b1f66455288703535110b7f854c50348cfedb2fba82f1879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d500b3b4f074f47c35df2fc27d9213
SHA17d1244ac033c36fd2a4cd1f3885e7017d72444aa
SHA25692ca5563243fc3126f3516d43e2d45b75ee963e8e19b0ff3c868b18d19d8ceab
SHA51215b1f435080882d4698f650e2f41fbc84b87ecb8ee1e0fb1d27959b0ab8db56aa67eb27bfc3ebdb86473c866a5d27d4885f90f60b6a464d6c5d704f7742e9c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3b46bcee7cf67a26ae18a3ac0eecd5
SHA173ea06b044704688966fe39706c82d91f6b113f9
SHA256697e0c36d5a038b2f0117752ecd5a099ad61beea72190bdfaf64cef9e666a7e4
SHA5129070b357ab304b30df7c87fce7abc2feabae0efcaef69c0e7c3ef541a556ce4466dec18041edfc33440b626db7b158dedab25a5c764505e4aeaf4fbdb89455c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd2e5d1257449d61af4c87d80b43c35
SHA1113f6b94dbc42d6d9ea327f5bd1a4e111f384f0b
SHA2562e91754302a703eeb497eb1fc20801542fe4c50383c010107eb3c855a0df029c
SHA5127d5b5f4ce7c8135842f1b17131709c9978fcf55e151527be13e14d49bbc50641cf18bf477d5d9775f3936ebaf3893b2bda5ddee6909f8d770e30d49af27fbab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ad7c306c9e03781591f37ccd1e38f1
SHA123b800a06ef41cd7dc94bc8dccd9da9899cb690d
SHA256bfe1975f08ac1c9fb23ab898bdbd51c29e2236cc58a57aa10e3a8db289c85720
SHA51266101c818875adb7f485b914466e7368bf1c8fe620d16801be2cbabdcb3a84267b2ea81f29760d00f3b74e2004788f849852cd4b3ac37aca7c82e3a9d963d532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62eb59f55043dd3ab11d9df338bb263
SHA135b870926b09358b37346c789e9fd8a4a4972026
SHA256c4d8cd5cf2de366d6a35cbb25be3cf547c4799b64ea9c0e58293131d445cd70d
SHA512c5aa6c3215d844f4c05a23e6c9df43429f6088cd7bc3cc7ba2d41efa6f7f43770862d37a56874c3c50922e1ede21dab480ba6e01301d28e15ad049a1b0b810d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b