Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
55b0f0539d0afc972258e6c07f33ebd9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55b0f0539d0afc972258e6c07f33ebd9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55b0f0539d0afc972258e6c07f33ebd9_JaffaCakes118.html
-
Size
8KB
-
MD5
55b0f0539d0afc972258e6c07f33ebd9
-
SHA1
603e1414b06499ecb0eeb87640a38c94544d670a
-
SHA256
8091e3be71ac3b1d3fbbd5980591ae6d82ba9068f41ea4c68a2b4cd2706c6c60
-
SHA512
de64e0d6da924bd1a6a11d75e0927f01ec902c958a2b28de80e8f286a7bd1fdbc420ad2accace21b99acb37b1a7425d9cfcd4c5f530a5f9802649e1907fcf21f
-
SSDEEP
192:KQnmAWdCT9FvetDJyjXIRKDvo/nymbpDCsLcn:iDUFIpi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000eb4fc00337abb98a6a181d99aedc974e54fabcb01042d5b85504f674b3243f6a000000000e8000000002000020000000d91fa0b71a57a9c81d2979ebba8d2d6fc1dd254cc5a0a4b547ef0c7dac9dfb2690000000accde274d77c857d5efb968f1f1e1bd84f5df2c1efb96ebff4d777de0c84de81c9878240b8570bd17c1d8729e4aa38a558671870059d2cbb6a348b841e239a010203832a04439b5daa3e1759a2e5a4858bfc8df4359633dd54095ffd769e2730d32b5e8cdea9d696907abc8f178e7c9e4469a66ff256f156b637f9c5cfc52fa651cf5c6a76c336c09188027725532f374000000089646d1f7e3ef0837a0f635a39973bfb8277d4922284fd6971e79115017e71ff7c72b25109bfc13f7bfbc1e166cf641949c4276ef2625208bdbc2c5960bf6939 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007111b18f78e23258d008d6c805782b53a5dff1260992c0fe8f4c37b4789dd1e6000000000e80000000020000200000006f53041b66d7838547952d2a3e921fecc13f1f448f51914ca23ecd1e773a16992000000052d0d5ae46b145d7eaa6b61d93ad07f6f99e877be0a883869b297f74538ab3de40000000bc5764a10814dae0e1b2e2967ca5e96cbd1696d96ca528d84143517cd4bbe72a3be47dfb2415f08c289033b249031ddf00792a4e022fb8dbc6f547eac1fe1bba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d1e1311e21db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435390941" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4295F8E1-8D11-11EF-BC71-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2108 2288 iexplore.exe 28 PID 2288 wrote to memory of 2108 2288 iexplore.exe 28 PID 2288 wrote to memory of 2108 2288 iexplore.exe 28 PID 2288 wrote to memory of 2108 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55b0f0539d0afc972258e6c07f33ebd9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e3414775312adf5ab40577fd9a7cb9
SHA1f7e9750e68818f61fde33e19b00ff74db2e5183a
SHA2560b72c2fe2b7cf8025d368f9bc282a00fee9309e134b9e37df29657b0bdbd5207
SHA5125430ea81fe0a356d388f1895916d21c0163538a06f539a0e86bd3cd49deeefb571963259a670037786c2f6f41f66fa33676baf619a29815d610a4b0ede2d5dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c4d24922ad47d39b49f50089f91411
SHA10a515233c5a93ad4b15e35f57d5fc215e02133ed
SHA256cf74112d252eb57b49aecf6fc9d73a562b63682180354739cdfbe04d098e5884
SHA512de3e03a9cde2a6cce79c75b8bc09cb4d9ba7515da9c548d1305e012f928b16bb5c9d4d7e40f3f53eebdb1823461bb7d9e89d5bdce267909f133727efcdf8f1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccd4ae84286a628dd8579e5623d9d18
SHA195953049a8a5b3a87a76245c3001230c7e9ab9c8
SHA256d36100d4db866bceb953f5ecad2c55d8673c5e98879e0986be3aa6f38130718a
SHA512abc799219306fe4efc28457ffba7a35c9314779748dc0774be82e34faba1e749ecb399cb03f5979486c4952d623144de4cfe7ad44f5bc7e2bb9ab0c9cb948e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f967acc713312154fd43b1e0a6b1cdfd
SHA19351dff254232276c7fad8ffff05608528c83b35
SHA2568faac842f8ace014ae9a88d4b9719817266563e59b517062b833ce63bcb8dd2f
SHA512e8d34339469ea7f4c3e9a2c6c73106bf2d5a77cedaca264a5b4a1bb4d499d0ebabf21fb863551bb0598ff65bf01833009398729008325ed093b638796c20068d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25c62256aa1fd09c86e59856c604baf
SHA1bbe38c863ca2373d6f3bf1ae14f605aa8bd48c4c
SHA256b4007962ed727f38511060172d5482e88af82661d163fd71202c44daef0950dd
SHA512959f975df957b4ba33f8f857cbf82cd36efefafd7cea9311ac6bdb43811a6c1c949a52d95842491c421b8490e6d7296a5fa6c29972a049403d41395553274442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cc933c072a31a1a79e9b2a2daf1f16
SHA1a67fa17d4c90cfcb408effafc5c3848df21218dc
SHA2560c4265122bab2f6991079920bc242168cfde1c36bc908275e1f45de02af1c01a
SHA512e621b41bb17f272faf0be4be5bf649b4bb915e7fcd7c534563807976bd734eeb5b2a0da60cf20c79779c572ac21b9ad8af66d83ea8648004219f92ccf51297ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d335525ae0a44e755b816757cd1484
SHA19b1b53b2ece15b44ec1f15b094f3d19d3b5ea2b8
SHA256620cf16018c3cfb542d258f54024d56f2a6032dced9f8c1f775a6e0aa80ba73c
SHA512db7e42a298c6019bf7b461e3cd579d5ce8a609cee6a3a593ccaaf8898458b3326720c4553f7d6c0bb248aac2b75bd058edb80da6794de8cb6e32c7efb65f2108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a880cba0c74da342b89983fa26bf3bd5
SHA1773b056843c48912d71d63ffbbcaa2cc70942813
SHA2562fc85f66f9fcba932827dc3eb762d4a3f23326b08c437baa2d637998b832ff60
SHA512fd85527cb0ac552ec08ff7bab96208021a3a246f684b975b04406e33ce60e2912ce165cd7f1d9b9e165cfc5690a57d816d7b46e77fbe4f59ab71092ffd073ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b3cab17b7e43a9bcc65eb4fcfad4d2
SHA15344d5d6f18dee7feb8b4391dd2096dd9cad03b2
SHA256372bfa92068be7108b1e30aaa064a488be75e7869d8d0d9336bd5c9c1b636b4e
SHA512d4f210d90d1d9520ab04fd5302992c4c068e49c766edf868ef5f4b46ea1c5a1f12673681e64b9b06f2665c243e332e443aeb9db704e31ed1c0c44af009d3bd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bec5f5792231bdd1c75b2c09ec86cd
SHA1b2632457738cf439ddf7dd6187eb5e225c13b120
SHA256a8e19de5fd48897edc742f113d2d8246550960180e13375f0d21e70f0d880208
SHA512d482f22db599897ab23fa599818c610678d373c6f3419bbd4f09bab16f3fbec640f897974405bd7015f3a83f4e8787ffc52e1e1b3692ad157f2badb0b03052e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160409e8766aa4a04b39ddcf20536843
SHA17d2031d61fa2a28db05aaac0aac6b866092d6b6d
SHA2563313bd0ffd4e4ad04c7e3365c27e6d1bf88c2201796e1870b17eb23307c1a8f0
SHA512df3e9b1c759943a26ceaebca3ddd2ce1f8c032b3deec59ba56604ef69bdb00ee30e8e669d2dc129914b881c99f84f1e84449939c5f20620918fc893fc3b2364a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382d24213b87d9236bf6ff12d1276746
SHA1fede1efa67b578209e2da6203a70cb67b6c521d1
SHA256267f79cdffcaf77ac3823f62058787a61f229c9633b74e4dde8fedcf6f280229
SHA512c5ff57f4c259d48ca9fefbba209c7cc2d58129d6af3497a6591e3a2e76434a819d8483a4bc0826c6f180a52174cb192930251899d29ee30ed7e91b8763e025b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1266ee854aafe2fc19073e18168354
SHA105d7e5ef776cbc0bc7c39501bdecb0dd08a96517
SHA256ca5fca3f7b77063c28f057e7b23359851f814960e865f73c3f8b0a837980cde0
SHA51258eafb5da89336664c68342769d4b6334a673855f518d6a92150d61ac1c39ee18256bd0a582b3f2d459835281fe23cdac8004d827189edbf9712e312ebcde0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc9fbe09776b857abddacd3ad10f57e
SHA128d401df09510a44da5d33c89adf85698301d450
SHA256a4f87d671d1c5e85a0ffe8fccd6673fa1fee9c2d67f8b784327a55c27a30184c
SHA5124ff7d80195324247fed5c42ac23e3035e922e77fe8700bd715fa71cd8e503305c6367338363dc1c45a7403d84b67f361fe9c849e3921bf1a56da3418e89b4b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ae93b3f2d23d2eefa9e116bc1de008
SHA14d6a18124cff55dce0279f2efc8b396d1da9e5ed
SHA256b518901688493365d7154f1252350c57c7181cd21e85347367d68bbc56257584
SHA51205cee3277f37128be0a59b4bb5d6926a28fc499d10867496b1c56e3e2a97e0efe491a9ae8bec195d87cb6659cee29a3f022b975cd93e91006152bb48f1d314d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e186c5fab2265b500303dc43235d0825
SHA1eb1bc5bfde847bf7ee16ea68864ce0f811db3175
SHA2561433cf0f3530e5f7fcbe24a7e362ca39b79fa0e3c0858f86b28a732017a07c3a
SHA512d0df9800a945a57ff35b1bf4afe13d541e0b835f3c565ddcc46fb6d76feb7e471431b518c33fa5d6d45d6537fa5279f99d423545be8065b272ce396f095ba5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ce402d95b7cdaf22b05ee636c55662
SHA13edee9f42366b3bb64476d7e4074625abc01cdd8
SHA2562d24d001189d0630e1999f0c2eeee093ddbd62ccf01749ad5a4b9c3a7e1818d3
SHA512837b0c89d398625cc20d8709e43d1d391a0ecdf63c1345df3f9644d7e1df9be4392edb9d74b5fb3698cbf5cd7b04f5b8ef3189a2d602c93891d6ca461200d845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929250ee341e9a2befa1415ef4b4d1f2
SHA14580bb42e35b04d9f155947ffd68b51411d52ff5
SHA2568c5d02394e680721f74540a824efbdf38eaf27643ee882b23afb2387f9d15d90
SHA512850e4668db01d46387c3a096fab2359b0f16d1a763f9160e2e26a02fc8712d79249155e06bcbf0c73299c4530bc041f1d467e2bef212fea65d5e9aae593c34ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501262a12775ccbe9a781b75cc60210c
SHA14b4b3676793c88d842caebe959ae6bd178e0db8c
SHA2560a956eb0e06c90317c91e294899c74440991426ae6a2c931b868abf7938c460c
SHA5121ec943462e4133750a2f5c0b6a82e38fa8f17fd20abaeacc71e91557f17bc4032ee4532c636f648c18aa7d9ea1d47834b76c13e1c14c9f0df1b6df8902d7f161
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b