Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
c123a825034ea9e9c9886e4eb900ee53_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c123a825034ea9e9c9886e4eb900ee53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c123a825034ea9e9c9886e4eb900ee53_JaffaCakes118.html
-
Size
55KB
-
MD5
c123a825034ea9e9c9886e4eb900ee53
-
SHA1
fd9ec67d2e6ad059fefc40f376d995d3597bc8d0
-
SHA256
32d7cef9168b39849c4791d0ecbad4011cdba2ca84641385da17020278277d85
-
SHA512
5c8e79c95e80940d2eda71befdc160ecfd6ab240ed3afe82b6ac0900eb0af3859b1efb83f16269aca529f5881e7caad53f205c137b9f357699a7b9fa49d93cc7
-
SSDEEP
1536:9YQOsIgSyEZdEz7reguFuQbh9EKwFroHXgaHNk4RC:/ogSyyXRC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430765430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000563227e6c4b4905af52d82021c65e02ce1abf990dc21a29d25e815cc0b0986b1000000000e80000000020000200000007087a186a0a1dcf09fee995d9d7c9f10a88062ce0f3471a0aedff83dbe9ea685200000002bff67a6ca6c68c30849bcbb06bf79bed7baacffb1dba8860f75043d764ed30f400000005d9f01f37184218d160137efdbdbbe35c66daf6210b20d921b1216f6e8bf3674a59affa86cc77a5d0842d799bbf28f9fa0990e8d34a67b5b2d9e0a093c06fe17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000dbf2a45e4a7bcdbcd645191d43fc02541a167845fa39b55de657f04f22c16af4000000000e8000000002000020000000363e2eec298d8ae45abadfa293520279bd88be8a5923cbcbdf5733f5760fcd7a9000000039ab97b5eb5b5dd81f7b49c0a364b882defcaf1bb6b80606a8b32d00e9d6e21c36e59f774e4609ef018ba3ab20f2a673ac04162121ce21efbbebdb508bfd9b03178a2ff06be9b382d6546fa22ab22dd7ebc6b5be49cfdc2064df2d0116c9a176286e93c6fa1bab549f0f7561bcb33a70f79990544df12bf7a92700a825d531213b721193dbfe28cea2a3786c719274d940000000aed3bdcfaa5272c934b111ab6b0999f78c04a9963cdbee40d873617f9f8e6cecf60684b64a2428d02a9621a7ae9172a7e45002f4fbe1cb9fa0ad267c860e33dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7275511-62FF-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fad57b0cf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1892 iexplore.exe 1892 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2184 1892 iexplore.exe 30 PID 1892 wrote to memory of 2184 1892 iexplore.exe 30 PID 1892 wrote to memory of 2184 1892 iexplore.exe 30 PID 1892 wrote to memory of 2184 1892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c123a825034ea9e9c9886e4eb900ee53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff55d19dc1e35b8235559622c833467f
SHA196bd49a21d9c4f129054dde788e6ec3da3a3bb23
SHA2562c62e7a23cf33536d194a0b102b80965092c5a6259af1c941c703939ce72dd46
SHA512000aff3618219ba9b911f15e7da590976098b64c667c1003d6d4e3a82c965e032068446d7d1d51365a800b0b86b4e93623a75a5277b441ec3aa135511a679fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873fde5b6dfd05d24f516c57839516e3
SHA15f9c53630be78198061ea408dd12f787669bce86
SHA2560536d0218da8599883321dd5cd3a06dc53b4a3aa26dd311245dcfb6aa0044ab7
SHA512e011a2884cc76304da0ba38f22fffe976bc4d96ae193e27911185ee7138dc74f0ef80957f2071bd6454eba98dde80cd156db8f59fc8be1fb19920dedca1846c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319dc89ddaee6203b43e68ad9f734984
SHA1dc573a75dd8811905794b71e5f4099f3db697d8d
SHA25674cedc88ba439aebcd8443e836f27b4b1efb4b6c98caa88845296d2c68e3331d
SHA512753b70948b449be12f1534665e184e25827e41eda28142dbb9ebfe05b7a478b623d4c7d5ba82832026d2ff31aebc45cc0ed30b4234edc2fb568214b3de7157f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3bf4c159a8f7e1ba3b4c74798aca56
SHA1389ef7931ff24a10b4bd5f2a63a40431c35e4f7a
SHA25634709c8525def4de83a6c2cce7377652b483fe12edd47aa8ffb9a5d8f36ba409
SHA512947c4100d2b228306c8635cbb552972ae5e3b7047ad5c94f49b3a2a6fde23a00c09971c4f7132d4e3d34356ccb00b201f88e8cf8726ceaf2db7443b1fc4fe530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f397a18329b7eb3f888f036c37cc9a0
SHA1f9884c36e5b89701d8ebfe06dce57586192ef5a7
SHA256b0e66f53db2d641efa2cd7aec50a3d8d684faed943fc8522b37c9719c1f2a23b
SHA5128f9088819eba261fb39be6b545faf5e729e95668ff704c02678e1f7581728d3e9f84ab73f11a7119e1fa6c5f1a976a3493f276e378b3c17c576f4875ece2bee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e883092fede720f94ddd42867cf24c
SHA13e1837a5b0dcfc8b8eadbf9bdcc95e064b851e15
SHA2566f5cad1c436a4b4d4c434ee4065a71d22dcd506fa89dd0f19cd7906ad35cd705
SHA51214eca818f751c1ef8794014873923f38939ae5de696c5e13107dd774052c9d156d4fd33e5a25ad97aa18bccde1823e59e609e8de19dab974ac65f15c88eda831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae6fb37a7f35db32fa56875df9bcea3
SHA14e4f015bcf8534c535103ee2922a338f727dea73
SHA25686a4a105981a17cf30651b806056739109ae097d41a5be530a7cb79f0838e64d
SHA51204c89562c5b2f1d667d1a62acb6010bd07bee48e75820b5425be795af20918d6a5311b4820b52a9d680dadb7d7df6211432e75d5c0b12b73d77c530940eee2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae5dad581f15d6799067187e2cb0f83
SHA1b7bc66ff67093c69e8a62964cc04aeae44f3c1df
SHA25699a69b27bc2f26283e901c2d126d5a61eb2a6b4d13a40a069133a21c838841b6
SHA51279dde7824289b62422618a04c7022e80936367113d7c8c859e36a267fa382858224fdc7a60da610d69380f09a414af8edb7d6f8fdafda39beb74205ddda5c5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997687af5a67a467d9c914ce5d019855
SHA1c4d35f442a7ce808a639724e6ce03009959c2934
SHA256b2aa55650a938366fa4afbdf668f89bc3cd52fab13391835321b668502d2602c
SHA51298d5d05c8bfb2ddbc98117b99069b1e10647b9e407911326fd2d8014311d70f1feed00b9bb8c41907386af7fa957797b01cf6cddbc450e15dd60197fb5cd02bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc603f4efb3efb9e574d0dc199e13ad
SHA18dd64639ddc2dcf43f3348002621fd711b8c7cbc
SHA2567fd464efde254f89df60d3b96a46459ab537f71267f2f0b33036afcae33baef8
SHA51236b696dc501a4c208308d53ab8416d3bec3c95e0c762ae83b55a6a3b840c0cb2f8f163112a5e05ddc619367dae7f7ea38f1b3b4df10203e89748747c73f760da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55403989f193db3c784b0789aa684ea34
SHA10f8c2e27bfab24cd8af344db5382161001108f26
SHA256dfc6495d53889faf457ac6434f161834f51488ab8df27f116fe801c00955af10
SHA5124171beb8a813532ae52ca6b5a7e26f3c77a2a2710855d07b167c8fdf6e147865a867635c2024b87453b8fc3ddfdb938719750267a3858618c9585d2e6fa060ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4df3bbd822e90170d4c1eb907b37d7a
SHA1ecf6d9832d212af2b535507037c9b79a0977cc28
SHA2566c189977cc571ef2181f61ba88a8ce61681e6f0a7033e3e5329d6b95b3417aff
SHA512735efa3b0565ca252ba8b844491ac179900564eb9515036071ad787c52f018061b996da6b230d6175297b64dcde85eeed59f081ff94b2ac9b507ccc6ef02cbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1119086e7fd1f367799a2f08019902
SHA1954aa34ce199ea1c80d0ef86efbe21fc183d7102
SHA2564204b9d40f66824fc5ae3cef933f22034d2e72a0cbbd1d0e32a9f5165a0085c0
SHA512cc7d113e1f15421ab63fff5099727017af4111d44c5fc9d75f64fe0f475cba74a47354b0c163c24b26063a3175b1670412a3c338e7bfebb304af1cef140ea0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6a3c793c117b1fda35f20eda662aaf
SHA1d7b268c447cd3166b1c8532a3337be896e556a5d
SHA2568894157b4d72acc2eda48229b39f2603ea8fee9ff7efd0b34010410c11e69139
SHA5129f8598277ebe0916d7ef0615912ddc29b4cc353f40361f1e854c7d8d5ba53c1abc25303b9cfc62ddc148e2934eb35f391a2ed2a14f5d794ad15c114b6cd7f648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a87515df3ae9ae89be559e4a2260d6
SHA1e3057909bc45985f21d5cede8f2530616f666cd9
SHA25646e2903d34c736c7430f4832154eeb82fddbc72c097ae7c759f4eab7bd517f0f
SHA5122186e5662596c33c6fe0925917abf91515efdeb04761017718c07c96f593b9dbe083814c84ea05b79df6b8fda3f6aaa5b138787bb0e7edb588fda64a8eac1631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f0d3d36918f7b79f5018a2be4010bd
SHA1c3c64a716a23ca58498f2f97f2675f94e4a412e1
SHA256128df37b2e7625eaeae2917c0db30052533321f9a5b19a0ab3f97c62d747ea58
SHA512f1168f0504b3dd2f599237aa0b2061ca767c4be087ecfc0c45ba663ca46ccc3f1a1cbd18172efeb68af332aa25060fed39e1ae9a85b1d2565d59cb83defdf2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e34c6a18966397ac16fb01f5dbfa045
SHA10c69ef20c72b4f31dd11fa682a806a9d2da7f001
SHA2569f44e68124cbdd3bd76b38fd4020e9af330554b14e0a0aed82bcb16127da024a
SHA512d8577d6a655e9210e69741e97c5f24d15c5b446152be3ad739d331846568935a2af8ff44de80db3e24a13573f5322030f1c8bf8c7bf375e936e41e51794fcaf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d881e6c4c2db1a45dee7162432fa419
SHA1a534e1f8196d215e114d282379589773d5fa4444
SHA25614ea73097577a58d87b761b5896e6a02bb448d5f77a4f8afe988fe25230f8acd
SHA512d9f824718195ebe3b0fb919269f26f04aed076c854eae16871372b6e30bfe2888d73bd690bf5c1edacf341b7e3297c0c35e419e9f6cd05d3d98a17c9fbf1394d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8aa05494df9f7d9750b941af762878
SHA1c8e62cf625cdc50a575f5063dd57df10a0e14f1e
SHA2569ddceaa832f2a23f21205fad8044c81372f2dbfab726fdc649d51f1c84352f9d
SHA5124fc1c87e3d406878e188d3a2e218a8401298d7d58b938c9c67df7300d0902a29cb3dcb3ae9eb4c5ccd9238bdada914f55820f7072c901743377e1aff7f802d66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b