Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
c84efa8470efb626f33bd12442e40794_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c84efa8470efb626f33bd12442e40794_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c84efa8470efb626f33bd12442e40794_JaffaCakes118.html
-
Size
461KB
-
MD5
c84efa8470efb626f33bd12442e40794
-
SHA1
d197b2f438aafcf5c7d91b64bae74d685af9f022
-
SHA256
41adc0d1f6f3afb4b679617db9992316b457ed5b945a67ec8eccc3f8297aeca3
-
SHA512
16d24d3e7b79552306db2c50997c806e20325d0c91614128d027d40ed86d441ec106364e360bd8448a5fd4a45e2396599b0ecd15725d50cfe42f878225cafbb3
-
SSDEEP
6144:SIsMYod+X3oI+YctsMYod+X3oI+YKGsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3O55d+X3v5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{844C6631-65C9-11EF-B0F5-6E739D7B0BBB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c30355675601dceb6e8acfef530007828083e9f7744596c2b1fd3ff49e3a4c78000000000e8000000002000020000000fc4bfba770146bc1c99a754a44c80c3f8f88f2559c84c61c694b3c1ea471b6029000000030f4d7796fb622cce65515cb5258e99c22aeb47fa54abf57033d5497b7c2628bd4f8836b637e589e0489fa5251d8dd4fff8ff8ffc75e11b5800ed659db95243b80201a70c674a21692cd456a9e50f5935772709bbb544abd809232f9ce70a1e28cdb639389f8479e59e1d3a04befea1d8ef171c5db76f74b606060ee1cd5a03338c192717eaa870b61d8bfaa3002ad71400000004598dc1538001f08bbcf1549e42fd23893037606bc472adab5d17009d0ee18fbe9af91e98b04a1bc1d74f5b9d517e8bad79bb14a38710be2a6d36a58c751100c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c006605ed6f9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431072033" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d47d74e11e44baabfd78f4fe4ef51548ffcd2660df7cc7662cf0023daf41fcc1000000000e800000000200002000000089d48fcf692b3066fbfe115b4780a82b66a4918fdde58c5e2a4d0990b0a67ce6200000006d08fd41eae89dc708054e488e28a62a7716a0bacd401385260d352634a957b540000000faf216eccdcd2af8269814b8d5cc9c756bcdd8f545891adfa643ac5abaf57ef1e2832ea1f2c18f193111ff6cbe86c3cd9eb264e0356232652f24dd5658907f10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2500 2468 iexplore.exe 31 PID 2468 wrote to memory of 2500 2468 iexplore.exe 31 PID 2468 wrote to memory of 2500 2468 iexplore.exe 31 PID 2468 wrote to memory of 2500 2468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c84efa8470efb626f33bd12442e40794_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51dcfa75e3d4783205e0a9d8067932f42
SHA1080c6f4bcc34100acc726b026fdef42f958c0a39
SHA25634db8ce375d9dda7f415995609ea02a58e7bcb2c63d7cff48d7b27241d2ad233
SHA51245d9afca761ebaf12f8929dd44021a8edc31978dce0e2677e721a0aa0b97fac239c786673a4fd534bb24d4a7b601b122250d906baf2b0e9ff347169685b80c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea9c329ad5aac370f8d057f51d9d915d
SHA1d97ffb72b6d911af310826725da5a185e2b7d093
SHA2568b5669d83ccfb70d6b596b61aa8a45725de001350019d1d8c4edbfb88d0797ec
SHA51224de614af0fe4c1d2e4712f2fcc91d07d1f655aac16e946dff1297d47f98364636197d6dd1283d50736be04e3749c8229affc050367660fee424ab374a966914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc27475e5ba32c0447c583eac6f80305
SHA15c79a3b362fcbbec1fd58f980ee2bb73007be7d3
SHA2560d643fd9fcaabd87410dc2bf03e062d13828ec3e527ebb4a2abbc23f15f10d7e
SHA512f432a8498184c2bcb10a9d942df3962bd35e368c5ba4911841ad06700233027ce8721fb28fe4b5d243165f61da6760907b44949d89b9c71f793312cdff747bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57358b800db199eaccb3d0536bbb05eba
SHA11a6214a7d235d7b2c78f5f9a9935a55eab591055
SHA256cca0e814bad0214db987011cab8309c4b96c430eb335b6479c2792eb2f28e96a
SHA512255f34d731c1ab260a6093dfaf3d735e348a3e001a2250e4c34786109d49c22ad201c495fad224999be12c09dfbd1641d3d7e878b0f2bf38d06a270384ab3032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589d6402db80757c22f3d657f3e9cb13a
SHA15caf805cf3caa3c2c4f38332f22a79c888d61d9a
SHA256b8d131dbdb7ce729f2c1fc7e5bd1a1294bf5ddcf8b099cd49295d5b1940eb3fc
SHA5122507a2d233b92397149eca4c7ad3d27cfdb3f4563f24e186361c12a2be095403382eeec566d8229971ff06b2228717746225dfd045024648a62a99dd4a9f8ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2cbb82101e9f203cc660c6d71d3ecf4
SHA1f5dbf16b4593607e59d43e3479991a8de1745550
SHA256c8177abd1ea319da374f54db6e9e38bdd393450dad648f0948de0c0f4b643570
SHA512a1359c1985017ae8a87faa69ca8800b700027fdc985a77fcc5c6d9bb239e1b785e6667f40eb831c9af2070c8c5c74350167872e4bdaddceaef2236b88a3e2bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5edc92ea1c489ddee2efb7044572c766b
SHA18b59bce27602586d734ea8b7dcdd5acdffff985b
SHA2560cafb0bebebd24682069ca0142afdce864343ea3c664339e8e70f97f9251ea82
SHA512beae8428bc4a6abf225e036ccdca5ebbe36399f9a8be3d50450c498615e9e812f60dfdf06406ae2ad5703797c78bb5626dba75d4feb98be8134f921ff4c77433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2dab7f88c1d52c4f49d7a9a63c62db8
SHA1d91c42dea7cc664993d0c15a202931fc3b9a0f58
SHA256719223e2dda88963f920b7e2aebf3e180707e77b0e5504549ea456c07eb95bd8
SHA5128854d5255673bfa7015b3579248bfb12d6d00bb778c68193a9204429da2ecd25131ca5977ac6e2487021299ce20796528ef2c730f30d43bcf68b82d04db6a7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7d658f0c4bfeee1c5779ae0301a3205
SHA17f3be8c71cd84eda651a5f2c249e699fdf2916e5
SHA2569d5ff9c1b663b2ac0402f2ff89798d44c8608bc7d82329505760bbc25f4027ee
SHA51256f1a77d50f9dc9966f9f5d023786b9fd8e1a2a37bfaf39a91144f7267413df8996e0c1e8ed24775cb49adf2ddbb7094ba6bfd2ff0378ee7e6c3da001ce0b550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD563dccc49797e99b5233ab1b535633dd2
SHA1c44eddcaaf7210caa68fe85a8a5f85e9d0ef5d32
SHA25665b43c307fee62d46ce5dbab4d7297a3926fc2b8530607ba509716fcbbc0e91a
SHA512019b6e63f861bc30a46f4c2d9e7028b876f37d5f1405aa8704c7e8f99f54e8b6285f0416fbc284cf06bf857a3352484662a96149e54e9fa4184b2bb651c86197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd382e6b6ad83bcadd92faa7cb3ee90c
SHA1ccadef242cd15bb28ede6b759dc5f2e3bcfbf5e1
SHA256f7c3bba4d7971fbca6ede07f941ca5f0b3d6b90d6f83d5b36a45b1e5649b94ef
SHA5127ff701618a685d3a74a5d233408fcb3013373571c2018dc74861416d5e9f49c7456291d4c55cc0f30fb5bf1deacb2b14ec30de87eda93dc16263a4cc2416bdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500bc713bf1a86c4298b00a1d8c994999
SHA18b63e266e8783a17f81dbf1a36b0c5384f2dc7aa
SHA2561f32bd1369adcd1d983e2d0bad8b68c65a1fa936e97406f511591a455173ed2c
SHA51246742a084b6eeb794ab2302d0fdaac916d46b17efce684c6c4f2a6efddab2fb29bc5032640d8a8ddbd23de8c89f9ea2d8bccfe94f33405f986591871311acb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57864211553bba0a3916bf0da7b4ca8d4
SHA1314627ede8b7073d2de07404dda48e1de909873a
SHA256eb8f742d661074b11a85f4b1056f1c5859d644e47674924efbb86a492a39f872
SHA512e0a53a89554d0e0f8ac587d95e744aafe8cb831d9e8743e6c38bf9629ca1ddf3310e43b03280f94b482cfb704d2c46655f22cc9f540ada3c2c39bda961f5ed8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50fc561330632f1b0aa70066f41e6939f
SHA1e56e7e2f76f3e4e57c05f0593a48fe3a3a10baef
SHA256013991ed568a336377b6a9e3e1966b9f89d6de30b0820bf07034121892a49128
SHA512756054ab62e8b6f9672216202c1fca94e45fa2757e6786450c6f73f3c1630161eb7f756e8742f80fad93cf18304e84bd01d1ab8bc69c506325570e2d5154b6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f657843a8a54235f22638730ed5a735
SHA1a0c078408d76801d6788e3e5f4704fe38d72e039
SHA2567ea1abd2728d419c4591e2c4655dbdd5cec887805c31efc7061b3869bb9f5907
SHA512b38f9ab096dec35a01b81a93d706669c5cfbf0a92e2f84eef346d3a6106e18f594c057c9eeb7c16bda8dd0995937fa6a8477d763c6fe61c28cbfc5c8a36ec128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afa442fd7143aba88f03073c39556041
SHA14d28836dbf8c7585c175cb8c51262e139e85c285
SHA2560d53cd1b57cd0a8f3e173f05109c43acfb5b89545fe59855d76d75071a46d5bf
SHA5125ccac7f863ceb23319e02226d3cbe6e58dc5b141e654082e85a7652ece3fd705f6c440dac6d9dd72bf1aad0c7ec1f5a2047220609dfb6c22a45cb8768029786d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe1e732e6786c33cc5b9b570c72789f7
SHA15d91ec1cf12a400c6d0092ce161907c1c02d43f9
SHA256047a17412d28e7053c95c29c2c7c42b125cd81109875535038c2d5b892301ecc
SHA512fc98c6b3b52d8a977d9cef92a2e8f16cef826fb10651615ff860894394a8bcc0a9e619d08949b9d003a3b59b84d788ec05aab1e2be78a098d282188d67a47894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5704219b4028a1b506d69f52fac306e09
SHA13d125585bc9640aa3b9254b2e278350ce55b82be
SHA256da296860c826fca505674492e43c713a9fff505e44b3427cfbcc77d6e061b544
SHA512a82c437f1e7e86c49e7f25ed55964231c7dd6325be1189017067357ae6b55d08daa262eaf8c1fd7c079bec5f2743f33308ad44e644f3780e628cba95f7603aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7a369620cc9292724b48d907307096e
SHA1bc0fa35ea159d7edab2db999e3c6571344a00192
SHA2565c88ae36614dfbd5e56994b3de9613bafbed1a74df88f740d77e8ff9e96cf574
SHA512ede7b54b325ccfb1c386777008d0098216f7554ffe8f0e645b1dcd4c8626d0e1bc997c0811a9e49d4dbe5dcff02a33fc338d481d9880f97a8be1d7cff71e7961
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b