Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
0c16af29faefee5e9cd3d5e1fab8cac2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0c16af29faefee5e9cd3d5e1fab8cac2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0c16af29faefee5e9cd3d5e1fab8cac2_JaffaCakes118.html
-
Size
1KB
-
MD5
0c16af29faefee5e9cd3d5e1fab8cac2
-
SHA1
3c2b29c41c63fdf944aca477cbce4675b791607b
-
SHA256
6140030cdae364ea5bbd40fc728e530f2657b47cf69be8463e6f08bfcf0ccf01
-
SHA512
55a799ddf2e37b71a701f9524d315295333f0be13e7956cfe7f364a6f1149988e20e6cb265161905cc6618e883501f57a04544f76b537e0495da88ec6cda42e8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bc65a3a8c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000091f7aeb63602024f829ff194a7f59a1700000000020000000000106600000001000020000000db4033b149d9b9f12298531e0ff4ab7f7e206d5ba8889c3457ab608fe7198bfb000000000e8000000002000020000000b733c5b49e409a1d7a36743dd45bcdc393eb9a54c19fa1d49f838c40825dd40c90000000c8dea6e48dee9f357180f4d81eae46520b8105a0250f2b8c16a3e90c5bedb54c7a4648108c67961595c9bfa41ee7688ea611b3c770fab76838eea95889078649198cc5ee2950f19f2d3594c8c355eb2c8be0ed61d6d79751875152c31cf37d020f2d6e328928939199ca17ab9d43fcc0d548d67eb47df75c8a51ad47b8a2d23d82a86ad52d7cd2c00163dd27afe26799400000001301cf41cfd9578549791e2c19f88e0745f91ae605e0abbe01ddabda5378748466c925aa434a21a34aba5178747257f8ceeeb284a66cdecb202e64fcd64ff3dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE383AF1-329B-11EF-92B8-52226696DE45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000091f7aeb63602024f829ff194a7f59a1700000000020000000000106600000001000020000000148bc0bd7e9f8cc66682e2821175de7dc8242bb92682a45ef4dcfd53ef97f866000000000e8000000002000020000000ed189ab56659bfcb9b2740a3400be494002ec5f34d874d64eccad650b2d2bd9e200000002f876ac85d1dce059989346a30392a709df572418f293d34d19a2e90df7eaba640000000954f301fda5647df0625cff4490a91d6e3f2b58de4c9f79a70a9a8f00a60bb78bd84c9d760a76e03a9a00765e6e9cd992302db7fcc997fcb571ebd94712430b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425444890" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2712 2196 iexplore.exe 28 PID 2196 wrote to memory of 2712 2196 iexplore.exe 28 PID 2196 wrote to memory of 2712 2196 iexplore.exe 28 PID 2196 wrote to memory of 2712 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c16af29faefee5e9cd3d5e1fab8cac2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b248676c72f2bb2469e7da6cf8fe043a
SHA1af4d3a2fd4a6a2b5dc1013c9d8eac49eddec7f4a
SHA256bd622d7697589a5f81a0d44f6b48f2f1bff90b4997f28c333c795e3be7bbd758
SHA51212bf8f2c1e3b5a888d85e8d35f905feda895de23eb29805b5623202e610d0afd5a87436bd1d2dbc6270142234c70c3119d36cfea1db06205fa7440db23d18a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7908092e4abc83020f1dd2e118175eb
SHA1b6cf97be84d594ccc753706b12755bf4d0cc99fe
SHA2563746708c6a835466269e3c7d5b82d70ae158d699f1c9ad90becaf2a0b45caa4a
SHA5122d7a5ba87295d0bf67f6c523ada2220605eb5070e42680b5d35d01f30d1a2ff049cd1e8ea2a8ab9805a3b16176f914245925bb3028000bec00eb81d4f43447bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279d2fdfbf6f102ca0a0add88c48bd54
SHA1180904f01d1aa2df4bc8701bdbff33b94ffad1fb
SHA25680e896e3a7361780f242e0221a49305c8ae08a86225f3cddd956e9a52644013f
SHA512f6d9185a08826f99543d54ae36a79b54895fd1ca85a5105100b0e36f68d21c721ab5e3477aa55898cc5be222455324f45d4a6fb0a49c9a0e9040ae96c53af4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3c8fb0bb5d701907b00997e49141cb
SHA132cfce5f18f4a29424700d32b86e77cde5453dd2
SHA256f1bba8d403709f6f5dc1de83440c31c466241c2b258e48c30fbb605f5bf834ef
SHA512499b6fccdd035ce40982c2b75847d165391feae3a5a794764248ef6a7d57e10ef91f23b3d54eb30b0a6c1d8d12d7ca357f1c613c4c2842470c050c9f9903aac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57145f4dd782bef239e6b1eef12169ab3
SHA1962b299a042af5fe6423697cd85df72833f1ae0f
SHA2565eb30181c32cca975d586e41aad240065ca91ae99cb5d3690d5bca639214c5c3
SHA51290019277b1ae271af66c732bdc7f73e6995fda66ee0d002f4d2d4e1b1b2579c226b0eb41eeef06783dad858ee7726546b04b9fe55d4196dfe0fa1e2fc374727a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db24a611511b74115cce6b303bb02825
SHA14a7a514e1921f36741818fdacdeaff32d82b97c6
SHA25630fb3353fc0f91348454643e43a8099031debd23650f6979313a71218a42e901
SHA51252a48638d3ac0802af88acfe48098b67e73d57aeaad3efe2f5e478f1810cc2b6c31a903e7b35654135bd1613dd248cd5e2079ad5ba668cdf709c1d4969acac89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f047cfae9ec14dc698922a63eca752f6
SHA10bdaff55a555f72093c790f9d7983cd3eca14537
SHA2564b7d88a047e1a3f79cc9ba75b449262ec8e4dfd0af336f3a62ccfa05cab46d75
SHA512699a1580aa7a71dbfdb33c543e09af49d891fa3a485f39edc88e5ceb921b976a15dec0da59c1646b4e5a5329852c8d886c8f0a3730ba369d6848fb97c55e920c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96394e8169d0246f3700e99af892b2c
SHA11d8dd9b3a1b07fe7c2b4ea2ab209344aa477c88b
SHA25648a9788fd04fb13601d802f099813888e1ee4339028dde501e9927bc7afd5758
SHA5121129c8861bd3568f8d61881274b977b110cad402762f7365f2eabafe26d891afe51de285066dd1f0cc8f3dd33c17b62c51428cdec8a5396a2cb7a508b2fe98da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e1347ed2e1636ea70e8de9c467e4a1
SHA1f4c165d004b4eb7e79bef58110c071d63fd1fe45
SHA256666b42ab7c45ebdfeaf21c8bdaa25eeeea4add30439cc50eac63e5bf7dd7fc1d
SHA5122cdd4d5aece33ba669688f7708e1d5649d4bdf1f9edc3400f0ba39be650a114e26bc44c764f02f1587364c08ec3599b773a63bd58a30658ac50326ae26c2c6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff9f7333b3cd7d0237a8b49b3d97e4a
SHA188830b1d1ba31979426885f6c7a42750cd894f81
SHA256ed4edf6aa8cc09221de01453e7b6323c5f77352fcb6e8bb672134f8f2147fcc9
SHA512e4bdd1e64fe75c7142dac90c84fda7086dff95e38a69b2c66cc51a8116198dcf837d6d2d95b7e97d4f9153a798c88d2095e3a30488703d399c37cae5e8153c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870a776cb45eb25153d7e0616baa3601
SHA1c69fead8b2b1b4ce662631d2898f93adf251f770
SHA25698023d92461cf014bc475266d4d984e72bf6e3bf1ba12e47ed55a743ca091c57
SHA512f3b8a55afa0e450c40bf1340735e3501a478123866542cef450475250d1f4c9de2daa02b65a34042cf7e7a59375a995941ef9acd7d03d953210ed7a731421eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33b5561ef00a6d4ec343ed48162484b
SHA1e3d4c207d02873ec16e0331fe93b21dff66212dc
SHA2568bc9ad6fbfac91dd2d3e28186bd0f31954eec49e048621daa24749e08bceec97
SHA5123c736474b67283fe6e0caa7f22c9a05184fb0ab3edd43b4f691a4e4163a86db727a574785b77abfd55547cb40b0b18e6f89cede4863c197dae37ca3a5db6b85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a8f58b1ca816a880eae8bac25a0ba0
SHA14a5c0cde68d39ae1d96b192de9801ff38655bd5a
SHA25615c1165a89372f9f5dcf88abbee33044892fb5bb60f77aab12a7d46141069445
SHA51269b527d897ff8ec995f971ebdd21906a255046809878eb21104cace4ae5bcb8361b46aae6f94a8d972ca159fcfae92b85607bee9bba878ca9889b3df9de359e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a54f126cd88a3a6cf95b4d9f3e3d08
SHA12bc12d04bcca5b9ab55e8320143b99c8c05ebfaf
SHA25622129f03e530ce10baa1395494726619c05021298482c091dff19a320c580ce6
SHA512e1709fab4fc9228c5295bc7ab0d5d4a0aa1ce94983974c93329dc46527a026432b3a492d3b8f71672a069242c2640b7e43800347ad86c41c20f4b430e621b6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b40f310d194a4ec3fb3d0f0897392f
SHA1120ceb2628c98f9ee6b6492d362e0c4579b3ae30
SHA25696b17591c1f89c46b5e9c3d8495de7e657723fd6a83099820a5808526a787b0d
SHA512149d5e5eb09a3c649890f7dd30f6185a7ba8a6535aa496cac33568c6f70bbc05596d96ea521ca168531655912514c0625d5b73131350a276f9302f204d319e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50086e55c743af1cb7ba899058b043540
SHA144335652e3a9ca8c25e4390c3e0758e027235caa
SHA256cd245238a25633b0109980a43b4e094cce0093c67674d32eabfcea0583502625
SHA512cbc73449ee773421dc6e784788f56979555c7642d3f7cd6a4f575dcdf56dc6f787555084c17a6ca7c531e9117985e125a316a5ab5a42ee3421b2359897455a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0080d24e3aa586abc2f0dcd53d6f2b
SHA165fa8462329e41781ede9a2d65f23044e8985269
SHA2565e21932e6ed9587d8d5aae86a4d5b52e40329a8d81596d7cbfd52dfe63f35c44
SHA512d4b9fa38c0ab9a7d961c213918393c9a74bc1290637b536a581ec0c9f31612798eecf5f6ceb771b9abfe6b7574b6c43b33a7c2f07a65d8cc92c405b786f7d25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4e8113c068ea930dd55d55fda04a01
SHA1807cabfd88821a518024dedafa8a48b537cb50dc
SHA25662dd3bbe66df3560fbb969aeacf009d7cce42a05cedff2456521a1dfa91808b3
SHA51228a13349b3d9786c280922c3c56905b0d6c7f5d00d9963f100984eaf1277e055171fcdffe637677322e625bbc49d6ff9983a182043807168f9791a3f633d5e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539916bbf51cea643f1b8f29b8924e1c4
SHA1dd3329c02af5bc19ab956c7cd43ae4ad439a75d9
SHA2560aacc10b140e4aaab2e020c70fecbb1169d8d7c204c685e2244cd338de76f123
SHA51249e1950868e51153d0a157175673aa2d8ecc9c18c9f42b81974bedc34cb4ff1b645dde3d055fb66d13661fcae3efc054bebf26874022ecc1b9a4f1d2245e759f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b