Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
c0bf6113dcac73f82f0e588b60652b98_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0bf6113dcac73f82f0e588b60652b98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0bf6113dcac73f82f0e588b60652b98_JaffaCakes118.html
-
Size
231KB
-
MD5
c0bf6113dcac73f82f0e588b60652b98
-
SHA1
2b01803dd9a6638735da6b473f16a62e76dbf243
-
SHA256
79dcd163014167a8a26328b2133b97da04b493046d2c74a798cc947328098b17
-
SHA512
f72cfbf348ddb69f3ffe42608defc6b9c3d9d38dbc3c3a904a290a2ba4ea9eda63fc0c7c8ddc0670007620882c714a1a7bc8a1a64de5a09b075a171b382faafe
-
SSDEEP
3072:jHqyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:jHPsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06d1c8aeaf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B57BB2E1-62DD-11EF-BB94-CE397B957442} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430750851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000c06d13276e1c61ad25543d194ea4f1271eff690ec51c63132bfeec4fa63c1794000000000e80000000020000200000009dbd393718a587315dc4a8ccbe181743d7cbfd6571d28076687d9741475c28a520000000b4ce57e7d3027efd85ab6e456cd18573cb18990c1daec8bc1d56f0f8fc224a7940000000535f31f636bbd7fbd1fdeef11da07a1dfaefa2159e317f6e4b9cd674948d141edb391f2cffe0b3ff149f97b4ad676e3beb1c2cdd91dd2b6b5f3ceea51473cea0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2772 3040 iexplore.exe 30 PID 3040 wrote to memory of 2772 3040 iexplore.exe 30 PID 3040 wrote to memory of 2772 3040 iexplore.exe 30 PID 3040 wrote to memory of 2772 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0bf6113dcac73f82f0e588b60652b98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9e09b38cd027888bee127b290a00d4
SHA1c4e6218e4602a7a8145f97534dabfa09daa5ba08
SHA256ef313cd658ddc8a7f9ebe4533efde20d74b10b57ca1524fac7980f7686d1ea2a
SHA512e2490adc311ba641580cadaa4751c2087b6e7a576f5546b296e4d80bd572efbd58369b19ca8ba215f393b7785daf885fed0a7f9c1658898aa8069ba8c458ddc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ad173c81b10df44b1daee35f5e6b7e
SHA1d01d73a4f0758c433a3fd44b4821e6d33edcd407
SHA25691f25ea3f9f9e4ce8d20087fd37745631156a7d5de28d72730c96b0abff7ed78
SHA512b8f8ca756bf5893b78989359ea8e1f80c132320948d04530da8c7fabbdce3434d6fbf5151eb7e0e6ce6a8f05a4631ab365cae30d502bba36841dcebce0bf7825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582701a5d0820f6e5be2c2e28ba311ce4
SHA1b4011b1915b80a824b107edb8adb6900ebe57089
SHA256c9561e91af01eead4abaa0e3c3571733c579e206ecdbaf42836a4614d4ce505f
SHA512e24c5eace12f200e77e3e08357bce840dba151a11c70fbaac18dd7e447ccc08bbf1397d823d40c1c531245cc48b70577d39095a49f83396e45d869dc07a50f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4684fd55b38e59b89a0135948f8fbf
SHA17c846fcd91ecc735683206c91b129bd67be1371f
SHA256fb59c96101f4324388c545df532c240bce9d6b5f1f54eef2651376e913892ead
SHA5122ccb45196cdeea9513ee622ca2fe5634d0bc850ac9c465df931cb548d2daa8cf4b3f494a9935c7cd7a817fa126e9c38fab61d298aeed555e51a6f88fcff6ae04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db08799567770b2de146cb8ef1e65331
SHA15fe70b3b3b5ebe7e89956343deb3e5c9d366ccf5
SHA256d624c70b26760546d8a7afa419a40058cdc97ccf89ae09a1a94e5b2aa6fa81de
SHA512db9cc2d8336f6fcc2c0adc675e749222490743da5595825bbcec118ed25e4e0e9a8fd6ffdb8a7ab3f3d1c55b8095baca4a8340701c60f8f03236bf08f65e78a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ed22825bb40234bb41ac6c4e100e66
SHA1de9d6a2c4722a2aac0cd76aa83c3e97c92879899
SHA256b93487cd233ad37423c3a038a72d1202ba4d5974d7a65604fbd706b83ee26aff
SHA512ab607ac2e305d31000ab9943f21f490f6f549b7d0fca3c488f58caea14550955f708786b3833eea30c0c3258225f9f26871501fe6faca213c9284171a34bc315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caeafd67f35bca73939f6ed1a2ea587f
SHA131aafe5043280c6b7f5b3d74835190c8482f403a
SHA25670706210c31d55d2d6dd5d9571a8c3d7e9667ff133ad525961bf58f563898902
SHA5128cf18b5e1bc4621e477f541f34c18ff7cb78fe858dd90a8c06fac949c9431b4b60f0bf6ae6d1c9b4b46ef5920c5274111fb125702255abf1ba5475c67b105d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359b9a16a6fec6757ef67e0353b3897d
SHA1813b16323b3c9d9f54cd978dcdd9950ea124392a
SHA256fdc0f4fda088d1f44954baba8f4ef67f7dce4a2eb1d677f7977c00522e0b3042
SHA5123d37c88202c23546fcc7ef265379d0790ed7339e9cafe97c27d510b72666554a74560bb682ab3a2537e42f0c3b8b7ac82b2abb7b0e9eecc5e3d4857b46feefbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0b530abb384943d18234cb0d6c44d9
SHA140227643372fe1f16548e0561c8a0b1baeb426ec
SHA256f43be0798fcad1f5e3e42e8fdb4ec08189cdd70b82931277632c218bbf4abf33
SHA512c8c9bc258498231e69d9b2d0a644314276804fef8f22bf5929afcedafacd86b376b123327140da29622729ee8b2bbc70828434121283c42944a5066814550dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754d48da11a5f251c7eebfdea181e4d5
SHA194be4cc607a983d9745d267256aa09bdb1abd264
SHA25630afeeeb3236e06b41d7cb83aeb199d3c9fd7574fbe7ddb3a70bb2b055cc713c
SHA512fbfe6e08840942347b9c88857a06ebb264f28cb18a9e10c760dc053c16283baa82ef700557ee65ccd4a43913d202ba5076ad1f109b0cefbc153f160082269885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3f7dc523333ef998e644dc981de2a1
SHA14bb90a7cc9c0ca7135b94f815afbf2934a68427e
SHA25612cc3ba8c0888bf96633396333d2c831c819754cae9152e50e5a091a0a2f1273
SHA512de48b8831e562c761987b62d252b428f8aa8cd67d7d5662a3b814c362938bf9cf2eaf8fc110cbdd3275fbad5b1e052b5261daaae7f3e1634024b4293ee757eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c419a42dca4213c5b86bc3662d983ab8
SHA146e294e453daf1e21c7824760ec12d0922168777
SHA256f7aa408722281cc936ab55e7bd6a13c4198d07b780424d77bb1b3827f5f61b9a
SHA5125efcf352e08df893d110b815e0f70eae2d6dd45f654ef804828a117b696b61bbe2ebaf61684b75b05669a54f3cf50a4c13535fcf6b85b909850ba8e45bb20e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59079ec729258b2c762ae39e32c6e0950
SHA1b3c39c5c14b1dad1a94b160b9d3883f616af7a89
SHA256d342f6377e4fc76930b73f62bd258df43bc76fb0198bb4d6606cc82f5124fb97
SHA5125b7b38903a44e68b010c708e5a918f196f2f981a4383b035e6b89356c4368c50f71ea105c11f1af71879a878631b525454958799496af47f6552bc4a5ee88c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6947eec2398693933fb37a25a7b73c1
SHA19522bf632b5e1dd87881c4036b5d1ce3b57a9560
SHA25695d8f5c5f10776ae68d4ac0867b915f2aaea7cb1ab0af0f424026d6fd38be766
SHA5126f160bd52d847bcb8ba716e1602bf6f13819f89b7c8ec992cc3b03e3c9b14e8f274aa6acb63733d54dcdc4ea86577d84636eff1b011e5860d22af75b37ba2829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52559f023bec775c3f72d8ae680aa8ea3
SHA1b6800b31dc341b37a7d13ff43e9763c07b9c964b
SHA25619062238496a0396bc03920a277b6ed6135b9217fc264d776095d27886f38573
SHA512fb5fe65ac0de225468a042e8152b76bde19431b6030354c19b784d9d6b3ea704214bbb171df685a573f1173d9a3ed1a01267d670427e773bba01e5ace441895d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf87faf3372f79c8c09db42b450c400e
SHA131e22f92edcc4cc1a9bea9808cc1d470f03929f6
SHA2563d4809e2b55f1c013d8285ec41cc4d07c92411f23e9ea0398c314d244fa82a72
SHA512625d5c0e8cc658b17d8af4d8e04182f199c0c05efe508b2372a27b8f10761c5053d4c23174451629573b8ad079991873592b9945d69caa94798d7db8eee6601e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b569f5872eda41da3f26b91f3734c56
SHA1865e873e2f8cc5ad250f74760726e0662aeb2256
SHA256156cbab23f9b2393048ce0a6b294008a17f9ef68aedd837b976214992ad2aec8
SHA512e2a5e58a3cecc70035c25d66111a9aa7aad680137bdc1727075b0b81875d5ecba3db9483798a8047aee9bde1547b98d95f81d95d936df8fc75a6bc9a3b91e947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd45042414e1a7b490cc9b3a20eb0396
SHA1a1dcd47f4eb8df9d58ae4321d46eb4a16330b851
SHA256a947fe9564b7a5e4bb7315e96397a6286e8309a422124eb18c5cef7b79fb3c82
SHA5125028bd508954b87485ae8667a379607bc9b09ef55c18661d006d5c1b9092e1944df4acb37aa87d7524604608c85e1258de132e56d004afbb95584a430b542744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1870ee664d6282a240988cef26b2ece
SHA1a101430aa2bb83d3e5d82dd13a861a87a5a514b6
SHA25699a85a410f36bdbf27d7446a38cb8a86b31552a38ebe45bc519c155dd0af03bf
SHA512cf335870660d9a353e9096768281e150021dfa7d370d33654e6dc723f702c623821b98d93d2823f28a84aa1e4848918bcea0a827b3187e46214af894938a269a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b