Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
bdc9648e9f3eb7361752af828b249bf5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bdc9648e9f3eb7361752af828b249bf5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdc9648e9f3eb7361752af828b249bf5_JaffaCakes118.html
-
Size
61KB
-
MD5
bdc9648e9f3eb7361752af828b249bf5
-
SHA1
59416f892016898df11ee53c1d41a3b47b4fcec1
-
SHA256
0f42b1c40f31056994b5aa1f6bf50639f676cf27454a22de53a5aaccbd6d922f
-
SHA512
7aec35c222e1d103ccc3671ba6d157931025c12a4070ea1da3314173c96b0fd81bae2fbe383fcad00b6efee5c0d17a8a787ec270efd49877f44d2f9d5eea7347
-
SSDEEP
768:JiSgcMYUcXGeCSXuhnDlvoTyZCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/Ijkk5nnt:Jk2R7Tbec0tbrgamchNnWC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809390d4c8f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000a0aa3b4822160a3ddc6c582b2f1861da6420db348e355fa55605311ddb090833000000000e800000000200002000000000782dd7e62ccb2f2126582e987da63b04d7247afc794fde94e57162946f9777200000006cc47818ff5f404a3ab772ac428da059f0bdee0090daf40032cc2e36d914fca8400000009f0794fe5d3d8ca389cb1cb4715485932f3c80023e6b136d14b73ec49a897857552eff2dc63fb90d28d1bba8cdbc76685fc799b73f19fffe3cc1c8281bba1617 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430626423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000080dd9393c0e880a48e2458f36eb38070d6b09521d0f9e8f8a2328b0c5ee18b54000000000e80000000020000200000001167eac5ff81abccaf5a7f2636ec017d81222f3d2fb2c43c7a14fd8ff54f93c6900000005c3e951aca57b4069b727fe08c4dc2986a68a6414dc216f7b7c621c92620d4cf77679e0bbba7a969ca74a58f2b5f775dc21f0a25025b12e6231dca86e401b506e661f3428e724aefcb8101e324d656e273c8503ad7c646686f0c07e0dde23b3d252e992c8efcb52c635e4e9d4bd0777571065bc2fd8210058acaba5f91ddb52120ce6403a8ac66804bc8fdd41a9e7e5240000000677ba8f061168bb392cf88538304631299c3f6137eddd7257d4a6b10666f1ec914cec3c848541a3cd3f56bc4c0511d831400afa2796900c1d783bae2b6168acf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFEF82C1-61BB-11EF-9A20-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2640 1984 iexplore.exe 30 PID 1984 wrote to memory of 2640 1984 iexplore.exe 30 PID 1984 wrote to memory of 2640 1984 iexplore.exe 30 PID 1984 wrote to memory of 2640 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdc9648e9f3eb7361752af828b249bf5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb378d0864abce585a114497ff83d71
SHA1f8a2ec9c8ac3d99d9ad168deb325fa7b8b0e7822
SHA2564de7985d715cc2c2c2d05170133d4fc1a058f0e1b5d1d1b4cd93033a5b875ea2
SHA5125e8640179c7efa14e2a674e3bf0b6a2f0357ac09b7971c6df2dc2ac71e40f1fac313997dd3869cebd8ed3abd8a17fd0e790ccb30d74419ab54725c895e9c0525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a93ba789b4fadb9ead32cad0041d8ba
SHA1a563f8dd72ff0bb9107e8eae59133cf2925a2afe
SHA2560ff570cf72391fe7cd04b9d3b145739d1ed048bb36d95c1aa50b49d54197d2ba
SHA51282dff95894f3ba900da0ee80d7e42a4928995a45ada7775c8c385d64dcb0ee518d7e96226199ea942c16814c925eb130eaefb235729d3c988e5287de2f2c9d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485ffa86699dcf0ab9d8434beafd5390
SHA1d15b1e1a510bbbd9a7dc819510e41434df9447cd
SHA256e1acf459434c3f570826bff0639602a7a3538e7f6b9388db0f80c576ca54695f
SHA512ac07ded9d2c09f4707e6cc610a5fa279be30a9fd79b6e27235e15649157c36eea9233bb1106106e9290cfd84750dd4f2f52d710cbe12bedc17819397bca301b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d672fe35c51e218958a8097cf5f276
SHA175d1c5fdda4cf634510e3d01c3630f98813bedaa
SHA2563380289dc63986a0671b97b5c6aeb2c2a97b056ea2b273eb74690eaaa84ab7eb
SHA5124952add276e5fbfd63cb901175ee568f4c051c3d9bfe075452f3b1d5521827c54bafb0a8c4e6e869b74f65974b532c4d591528c5e94f9352ac7217e121ce4320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596612ed36bc41b2e54ea5d58f5c47530
SHA19cfc00ad30e9086fc640492adb20c374a58dde20
SHA256be2c05ae08a64890aca7eb3cb9e4fe9f26464f964c6b5ca67f4b3b2c07cf883b
SHA512be0f35a8c673018669999f363be9efcd0aca2b7b7b782914519cdbd5cbebb15e8186d04490b6cd46edb2ee6a86694529691fa2d669db0ad122ade9428361888c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e093e643e01fb688344f256d74fc75
SHA10b964b9f96a44de14d02fce355c05d8722693b75
SHA256500fe4ac0d01acb8199cb7237bac931b539c65aa2159601843bdd4144b089762
SHA51238ecaf22394ed8a22b2ec3bcc6057da52a64c9211da12d2dc63e1dce71be4085161a51ab6702768ea54ea0edb6bae32aa22ec2ada9511210c746e6382b2da947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0975d524c754ea412d14a2c85ef781a
SHA13e1373f259f5219dd809b33a00f659cff19bae6e
SHA256371a5739785a280ea907033686bfe5d712fdc72af638d51ee6be45e9046c56dc
SHA51237bc92fee1df631cb6413004de2608f73463a03994b11771de2072a944e64eb5a34e221aaa9454a7f17c065c85a70404e6cf091f9d4ea0ec30fe60a64d355dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b27d778f2f2cd07b7031fde79798fd
SHA139e68919c323b5ee5f8f01d8ffeef71c0a57fa98
SHA2562b680030ef43fdb6b4945ae3b980a24f55666cba9c0ef6a8724794ed0305476e
SHA51251eca08c1a7a6522863986e3ddae6fbe3edc7ff08b5edf1573882843c8323134bfb6df5df422541226e71d1989de71a35d1594f9691a28b198abd29634b353f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367f5244005089f556012962238d9307
SHA1e92f611a06b25a4711a0e3e97e1d68228f16dcb7
SHA256b74426913fd6769c3fee9669e357d22c74bd0a1a87dea63f6babba9524b945ee
SHA5126e289885f98fe1a5017d7a2e99e59741796f34ddb48dcf2a856ab2e282276e48b6f61925ae21ab94713a7cc573d6b35698184ba5b5bd93dede91c998a245f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb3320dcb0f0f084c189bbb8925c604
SHA19d514e52c582f0cfd902df5b702dd94768cb47a6
SHA256a3c5cb12d77d44f488f7002525dcaaf0697cf90863262baa1b6099e7872eed03
SHA51242c64b58c89809f7e5afd4675232ecddba4c55cc4a2d8dbf1c5302aaddff94137f0656316880b6cd50f452fb04ecff7c38f63cfcebb56c959efd613a45cfba05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bebe9a484ac501dc49c4259d4623dd4
SHA1f9fdcee9f1f71c058ec64d7fd082528939aae1ff
SHA256c5bb2520a5b0427f7e40a5c3de8cf238a4357f478635d7f0215d661e9a7a466c
SHA512a61dc44249df72b3dac34c394317cee391808ef3e8fa80786988d315165ee5408d25ab1c193c6f1a6a37c7c82e6322c3839c8cb38c5cf084bb3aa3566357543b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f122ae82664343b7e6db5460818e43c
SHA1d34f44d7f07c815aa158001f218c1f279fd0840b
SHA256c46a07f3bea3a6c90b9c4ebfad55cb7865067c918bda649827b711432e049a60
SHA512fef717b6c50f887b704a87180e37321dfb68c30de89c7d892a0f7f87b791c2609c1be15a8d1824735d40cae3a0ddf457643fbe70d8f82757fe2917b74e68e481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c8a53ff3891dd50af64b9d0580ba87
SHA1ec44e9062106590eccf3662737373c67d7c09c1c
SHA25668851541af628207f7dda4a600f6bbc772ba67d30a814d2240c7dea159144860
SHA512d0baf391256c4af2e870fd6a731bc3f3efa93272557780f663de4e6dc1e24fce4b3b67268d0598a0e61be2def6229dcf7cfdd685e9bb4a7e859c1aafc5e51fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a2cbbb2fd6dfe0588d866f001475e8
SHA10ba642b09989c3b5c7820fd2b31ef4a7d12a2a32
SHA256467b8d3643b3bf4c20ad0b4b20a96be73686721ce05cb4ed061c88d586a9ea66
SHA512568c658dddbfaa7c5e9f6740aa228c09143949f0531571d015c95331fd658aac7368bccdf1bbc40d920cbf30086c5134998ad9797a5e9f4b216d565236d31878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce07d8ab9bc687d1664631b902df5ec4
SHA1e39cccc42f8be058791ae7474dbb70befdf50f73
SHA256353da1d6a0a7bd4e48b862530cd64e8639d7e674f6f50d0840cf6f2af57f7965
SHA512da852dd59458458077dd580dccd7545cf684331b4d4c45f1af21d55e32a868539998159892fb520f31a79996dcbe99e9551ad1da64730e4df498a3ddf874a02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f818bf28f378ad9e21d80b8305a503f7
SHA1985128025e5e3086101779d2eb73520b73d3dbb0
SHA2569e54dc557c089c6a34c5dc4f49e2414cdb2f6eeddd1656a28a6bab696b8568b0
SHA51289973f3e5dabd60bb816000b3c88a93fa50c2dcbc3668033f97ce0e72a602687d6385e8b0ee5c60906be645d90e5322459371e2ae3ef5650339793fbb380e3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b55ed2ac4bc09593f8b7a12cb27e9e5
SHA1c4e4b1317791adc64a4c1f1bb8c65dd72661730e
SHA2560195ecbd2458a38569a053d8be084972117b20dba42bc3e44b1eede5b81d4093
SHA5123e9311b270ec23a426fa3cf86cb0f9e2606bc0f1f1b8fba7ef217db529143c85102937ad033b99177198cc080b2fe0643b1a194eff8f6e1e6c326462d5e72d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56538fd8554e07e7ada7180b0877f1c2f
SHA1474d56a2a58f20fb814b499b7465c00ab0d5dde8
SHA256432bcbf27e12517e48d2b94d109cee5352d5d779d9737eaf0997f587114b464d
SHA512c059816d05e03e2f648ab03d48360a676981fe08d7563d3055ac1c41fc1ba12dda88f17054b4b5baa203f3b592a9dbde5e7876a02fd87491dd98a0adac82a5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d606121e0581fdd78c640cd6ae296c8
SHA108bd5c5f3e4964f9874285668b2db8ddacb8056a
SHA2561e38e6cb00ac7ff46c2bac7428c3951ec6809995e482a9f5acdac878178cad24
SHA51269406d54af56e39744ea6410259917252744acd4d380e139d8764f588642abd0d9323abcdfc529dfd19cafbadebee89ad2f319b79aefaf783ec9750974d4d5cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b