Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
45a1c1b9b08fabe06426ed584b55bf1f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45a1c1b9b08fabe06426ed584b55bf1f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45a1c1b9b08fabe06426ed584b55bf1f_JaffaCakes118.html
-
Size
18KB
-
MD5
45a1c1b9b08fabe06426ed584b55bf1f
-
SHA1
bf2e4831e37c96406cb1fa2f53d7efe63e62abac
-
SHA256
7842fcf81b39910b0e3b2ce3c7cbf918f4946be9c7de9dec172f9cd9845b5389
-
SHA512
7f1596035e88a99b0bffe415ce053aced94dbb28c014355811ad55028a44cb311325b117294e027575b1b588ce0a515d4e653e0cb891842883ecebd4b49d8f04
-
SSDEEP
192:4jlhXcsuvZtv2aHQnP7zeLdT37cFU11V75XMNs6XHSxxxB7fVIp6iHZCL////r71:4Ol9hbnkby3MZi4sVO5YNzTK90JMSV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d81832b31edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000006d491b0f61a4964031ca0b18658d7de88df85100d6490b8d92617797aff68f94000000000e800000000200002000000019011b1096d518b5f49aea0ec09b944d8381611e22bcd4288edecf5d94dc754c90000000b8ed6c7f3d54079e1dc7f9fc04a740c3bfd3ff73c92bce6e8659f342969ba3b431ff1920e883cc3f86f8e01746de3e591b1afc6f497ef8b9739df992d56b3caedcbab265900cd8869c609704e48ce2a25771cccfe8e89a5456880f7a479a29730b609ee0ed03b074591217234698173a9ea863dce8f73b3e1358ea27e7093323f442f618efc232b5fb0e14125bbc64f1400000009f911c17f78eeddcf930ce9f1d734561f2720b657ba8129faccfd3cd3627c6b3cf229972e9ef2481141fd9eb19df120659ab46289a8342bc6cc968ce048fb3fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435125083" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000a4bafcfdbbe629af3a448c545a72e8c2dda8b847ad5f9cf6d04c01040b7b87fe000000000e8000000002000020000000fbf0e1be98a4753126e6e78923974ea93db542a9f2895df375be03094025428f20000000a28df089e91b6037ad5c8e4899af87fe843facf4b17cc4cfdab39bc76b32b175400000003a0d7cd49b1e7115cff3639c90c66b26acc6c79d98e19fdec25f62c360a1d743340176bc29141224dbe8fb53c9b6cb32aff66a0ea226e1813ad83a6ddfda40bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4199AFD1-8AA6-11EF-9358-7ACF20914AD0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2880 2024 iexplore.exe 31 PID 2024 wrote to memory of 2880 2024 iexplore.exe 31 PID 2024 wrote to memory of 2880 2024 iexplore.exe 31 PID 2024 wrote to memory of 2880 2024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45a1c1b9b08fabe06426ed584b55bf1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d5da3aff3e269b85be24e53e14fe6a
SHA176fcbdea58e255ba4f8e4ed0a18259b907f9509f
SHA2565ebd3a7fd214cb47794fcfbf7d64d4edb82e86b7fb66ea0bd44a960a4ca876c8
SHA512e22d8071f19369deb80865a46ab71ce38ff8635c2c268e0ee57dce304b613ed9765de071a8d00db92692340aab92946724e92dfc88b559e7506fc4e603460ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b76582fc9744afeb623dfd11a98ae1
SHA12a49f47dc0b67c04a1a26cd4bc061906a8232911
SHA256d659a2647f2360731a5d1e0fc277054a81fb0d5ea97388c19a0bfa3b10936076
SHA5121f57e9b7aa8ac02d757185c21685658c746cb07f74ae5fc98f56c670dd312db754c90a1b843bf563d778f011ba3a1de2e0d6f662baf5a333bebb3d7a36c27ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536dadb2b21cc5c9b920b625e86b40312
SHA17ce069f370728ad7b64fce512b88724b44c6657b
SHA256c556f5682b11e2c63bc896a9608d72a412e7ee8fb4ff30c4a7a1d380111f14bd
SHA512b4dca0c659f4173d2a45ac4316682e33cb927dd462f0aca0b9764337ba35b43db2d19d3dbdd2a8d16a198f3c2e35cb933ee0825959a4c03ec1b547c4c4bf1027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff2a2b2e3dae225721268f5854907e3
SHA11bf6b79f008e09cfc5407f36959c818eb17e3c96
SHA256a2d85f6fcd1616ec0e307735ca2daf6f2575f1413e87cd101fcb967d819a254b
SHA51287261d9d99bb1c35168a44c4259bb85ccffb31b7a2b74912ebf1cbed43f832758d4b679980005fcba896d3e1e3ff06456e7fa1a7b5b608ca97f3d771a3b4611a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d1b63477c5545b57a337ce1d0cf797
SHA19aae444436fae832013d16cd79bfc4d4103383aa
SHA25655fac916fc4d4fd1cfcf8e76fcf99779d9e904aca9182902de6a0e7edb3c1aef
SHA512df23ceb41547a9446f84c91962a277836d5a206de8d58066422f37c0e1c2e0b67f0571c5ca0ec0cf4655c7d35f12344d84563074613a516c053655beb842562b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcd4870e8dbab36bf54ca2c2425f3e5
SHA149324536672629c857dc9b2e4195b4661d71f6fe
SHA256aa9e4ee8f3c76eedb74f88aa8d5f56107b27fc214bfaf879c72f301856197b6e
SHA512e126ed669d9515909502a5490796d7a21c44b6a9c9b1d2cc0e435b973457ff9e2df3ac8ac472d9919af007f09acdf40565fda9f8d4ab45c0a77daf59a74d70c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad855b2cc19cc8eebdc31216858862b
SHA1b87d71eae06ec97c4acb859b86dd243dca2198c3
SHA256fa406bce5f353b42c904be5db3ce28de1e3f636eb914dbf83153970eb4f75ff0
SHA51239ece49d5a8aacc128fda2796477d29697354e09ab59b078e5d4581eb3dcd048b84d91d5d678e211354227687c25dc7e17c18f119bed362af7e0be59994e544c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd129a5b59f97905f2e852e330e012f
SHA1877c0f910387428cbe0235ee81b34214161f946b
SHA256e23b148437cfc194a162a338383294e2410ada74a140d23828c2ec5f1838ed28
SHA512b7dd5fb9a2eae4d6f35473774bf26267bafc6c777f34c74b48accfda9fdf9d1e61cff437990f46b038adf6883e83e770e406fbe21b4a1e5717954810f409a320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d5f5d7918c0fa2e6ef97dd307ef719
SHA1e6e110ffb23f118209809471979b6e3ae31474c6
SHA2568c06f7225bee39eceb02232ab17627950484487af44a4f5a22813da8881d356d
SHA512aa80ff11b279d0ba081c728009fa361007abe8392f7da42393fd837762fe299eca46b4ba9973d82340bb1896056d476e65ca885e1bc9cbd8a5abee9aa1adef7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504be31a6307002d8dbc419e31f5cfbae
SHA1d4e5ff49466ce32dd439443abbf30deff3ed03ca
SHA2560836c1e953561e8c5fc273272896e7fe71c00de9d70b4f16e40e8370a2af3f61
SHA512dc0d32645c0682cecf4a3ca6efe6fa279ba0843194fa3a545165568f0157dd5ab473be7775df068c4afdee410e2de194e742133b75a6ba3b3d49ca396ba1aa0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54481145ebeb3b892fbb1c0e3bf4148d7
SHA18b41f4b823880b69ccc8216f87b35ac4e917508c
SHA256613b9f0556a86f97e59dab9dee67191a4ce92371828939825cc776fc0ae2dadf
SHA512fccfc6a5cb26f03996a9504e189d514ceee0e56627bd11db3d1be38ed8a94d1f6eb5cb17a7cee018510dfc51ab820fec3979c055f87bbacd273204f05358bce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f2c1a38b2fff7bdc8a038dbebc6955
SHA16a344b404db1e99433f77576c1a99128cb5da597
SHA256805426566166607a16dbaaeb08d2c409609c85dc82d518ca8ce83d23803604b5
SHA512eca9567d1ce880926cd408cf9ab426d54f05083efadcc82018939d962612ebc294ccbdbf1451e219bb9a9dc2d303798b9d86d946354fa44b380499f5c71470df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582da173dc008bf1bf3910ca377738e9e
SHA195e358e40b1cecaaad7b26427fecd26691dac62c
SHA256241fa8f706a5d1f88bead16745d6caa49ccd57879d07aa43c2db84f0fd1bbc43
SHA5127a27f9e3c0ef1cec51687b2b5c1008406f016f4ffba86e7ad64c55114d817c5defa156f7e2efea683bd4088737c4eb9d9d02c6d96e1d2671d894e83d0c92022a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928832c5ef32673b73a57bb0d0e32a78
SHA14d54f38f12d1e73f9d24ca7ac432606885df03c9
SHA256150d2c1cf60f4acb1ca17e16d59073c449a7b52d4c9edd216e6196deed035f91
SHA51235f2ec9323d61e2c4a5bcc0fe6be27e691eeb467fddfb1563737ec54b12ff6a1a565cf0bf79e45e49d0fe23015857ce57fda477567a0f8fa38c022a18d981e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302947e39e592f5b288860d2c96ff900
SHA1246413c2436373be97f4e560501073d25fd3f0ee
SHA2561c1811ed53056428b775dc5e8391db73209a8d6453c289c7696eea1a88e81316
SHA51251dc41f579f00a50267b8077a7c5b9775de2c1dfe52ede83b73e83ed8de6eecfc7174034f6b1014eea5f8bd31415e63f45fb7c7edac3f4063cebafea31c84373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a564b28f32e9e9c73c665ffbda55b74
SHA13a3646025e95c2824214cba193ed06e2987c348d
SHA25603963179a6933123d85ec61222d30a93dcbe9a28b99ab462b713333aa78825ed
SHA5121f01ffad4a3b9ee0c3b08b48a894e00c459dad2d6f2d23adf7f1617d3efb9efda431c66d89cf98700053d6ce116af6cce31a8c785c239add764ba78cb62db275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd1ced2a16e9cb77778a40fc7d4ea47
SHA1d23ee31d87a0143a09d6580c7a91babe72035db2
SHA2563a78c558f045f35560436f070768477dba69f3178e61587cf2888fed66bb028d
SHA512c3b4fd153500926f72470924133af2ee360c2a7479d6d2e26095b3d1ce5d1ad04e1fc0710ff2133bdd0f73a385404a2bacbd70fe36affaaf1b03df2672b9512d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db9e5099f8c0b1e658ee7693633462b
SHA1f9d251ef9bade7ab6f390e1b031762f22e612823
SHA2568c5d5f0edc0b6be37dc32ca592511ce71a9cc378b881eddb6340ccb381d513e6
SHA512e39d4b4e264f01eb87f7207641947c5b64ab7524a7a0723bcd4d7899a1a35ebcb48461163f6c3e952467349cce2415ec5567e04cabb1bcf0ffd811f29d4e16a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6a2edcd645872dce714567e0dfb043
SHA1210153cff302fa1cbfad3953f875f67a436c58ea
SHA256a7fa2b4d4abb38a6bfa51c189129b1a875523d4eeaf75830bf6f2cd0c9a4d4bc
SHA5129f7604157a7b8cb11f4eb0a6e77107ad8c449e8537736c19144dc40b22630b6336c268d2cdb3d54cae428320fd703bd0f6eb3dceb5edb9870085e305899a2000
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b