Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
c969e75c555447c6115d7fcdb3bb6765_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c969e75c555447c6115d7fcdb3bb6765_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c969e75c555447c6115d7fcdb3bb6765_JaffaCakes118.html
-
Size
460KB
-
MD5
c969e75c555447c6115d7fcdb3bb6765
-
SHA1
5388f35051ff54e2026df8fca1bd68fc5fbd8fc9
-
SHA256
f6f21792233bb654f2f209e873892e620dcd367bfa7dcf3269706a792cb8e6b8
-
SHA512
09f97c26ed0610e7951d51baabf4ce746a440729ba1041d1dbe1d3e4885c8ee731780faaca4ec12f45d733cd845f3ce4eab309b811415414d4b5e9d54e6539aa
-
SSDEEP
6144:S7sMYod+X3oI+Y/sMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3R5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7623D161-6637-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008ffb5b78130c4b9075fd76bc1a7dc3be4e41b3e5b1602807b7b034b18ca52b8b000000000e80000000020000200000000f3850b117151d4a64acb882630b39e9d12b1df42b8ee410282947cf39ef1c072000000019e136aa4b3f7773f3e52bfe679e9070d3f8af856b6c8b63df075dcd9b52d610400000001bb280b33f8d5a63012e93b468ffac7c26ca757243cb28ed7a4fb9e65786c453342d506f76e2141a365c9b4e4f35a15619514cb8ff83f7d96a1989830bd2753d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431119254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706fb64e44fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000007ba5343aee3a9cf58b3d7f61ad6c52abd8f13bc6c7b678ad7d459afa2d773975000000000e800000000200002000000091a3d79e02be0ec2c10af68e3856fcf0be1f890409b6bd5ced7c5a12939ca2db9000000032a88fd4a447bf581b8380ea07ea470505ea96ddc866cea44837d64bc7dc3bfca6c24ebfc0f75bb348c26ce206c01acc11568c513383086b9756dc1550a941f50c380643f80b80b2c900778ef66c49950422b26645bf8407b53d0ca1ffe81a333ab8b488393b1d571d422f64cb5e5e37fb0ad4b13e216069d7f487f0a8210d9a80bf31957b158f6fbdfdb5b1a85866ec400000003ee50693a83beec29d0b3db40a76fa89b614fcfa2dbd451dbd6391f3ac44437647d193ab461cb0f3f01fce76c6337cf7afd9387a7a3fd94e52716b23effb44b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2816 2696 iexplore.exe 30 PID 2696 wrote to memory of 2816 2696 iexplore.exe 30 PID 2696 wrote to memory of 2816 2696 iexplore.exe 30 PID 2696 wrote to memory of 2816 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c969e75c555447c6115d7fcdb3bb6765_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c30362bd158e54cdd9b691976203114
SHA1b67e449666e3734e4f37814f2572718ed45e17b3
SHA25613768b79538b4564498a40568f9f1a1e0463f910946dc46a94c4ca360ade39d4
SHA512d0b20a84d2839f438cb7c407c46c5091e435c74a0d0c99494f96731033f5a2071cfd39f6aad983b3cd6f49b293a19ab1e848a8d055e551c2f9f4d7c778cc6ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a9df0e3824e1e136216fb3684171fba
SHA19376d3537860528cfb0620740acf0d0935639849
SHA2564e0b25a63e864dc1a2bff4336f147e875048b347035e09cf7ceffdb2585b2c0b
SHA512bc96e0cbae171916bd294d1c37b1cb4d80b3900952fa89c4d6260514ba9dffcfad7259b35afb49aeaaa52b74667ab63cbc9f62880f303139f7c845a3acf22182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bed9e28993a2db0d2004f2a040a29e7
SHA16d7c66da9668fbcad9954d11b8628dad9733845f
SHA256d884b2ea022786640c85e1eca544461716c4490bf80eb3d81884ffc1506afb95
SHA51225f4f7699947e15ae537967be94afeeb9a133227510fcf8e8ac83cd53f5ebebc25dea07cae5236f0dee6a1aee3f4a4826a252904feef28b54a47c6acdb1f67e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5deac487c9af153da55ab5f3efcb55496
SHA14893894e845ac7d819d54e10c4f7a8ddba80e218
SHA2566644eda5a5a099fd89ad6ed41cfb1cfda61d2f09c1badee67eded28068e0817b
SHA5122dee5b43e7a26d81df81d440174d3b1efb9c6abf1b61a903e59dac70c2cd59909e1d6dcce6dce80f1928a1fc4f7ea596980b91914bfb124ca8c356eeba2445ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5239fa66f7f444e38dfd06f3b2dabdcdf
SHA17bb13ccdbdac9bb238c77e2d05cc939799e92535
SHA2566cbd14a47e02c9629360837edd15c6c3ba4be0945bc71fee25e0c431e9540fd9
SHA51298a8d5c7c73f6c04b22a48efe27b4ca017eea1aae7fac4bc758cff2fc00aa31891200e334488cade35aa8f3680561ed86dfbadb4c2a1be8268308c776fa39263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5274cd11c06483408604ff942d5aa8807
SHA16949c72e7151d8e741e041e75a9a3cd6cb4ce833
SHA2566905c3cc52c96716d86889ed6cf88af9b0c8fce317878114827dfad3b196a744
SHA51223227b24662fd818a5487caa759c19b3f094b9a1c800818443c2a7d47f5ac90f8db03c58177658f72a4f3a017461d2849522494245630510d70382ef68e8b93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD587c66c70183cb6baae3b3b49a4a7d227
SHA1203c546ea7b8c35beb9369eab5af0299b1d9ad5e
SHA256ab0c894e6b91d6c4c82b9003994a08be397bfa3d3a43704845a709b3df0157d7
SHA5121b05119ac0c0b021f647422f74343d0eb01ecb0c5a803a757086e8ad538774b21cbb89a41603dc03a7c5e417e559d06172aa21bfa9d9e3363a06f93b0bc4a061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f74ae1098f58e48bc480a9e99d4f4a9
SHA1ede2f87a16729c4bb0dac0a53b1b219edb005076
SHA2569290812fd6a81af0ccfa2787b37045526c09be7be11d8b72bf364a46b1a97074
SHA51209674e46c77fbeb1f6ae9a024b1d807136c381ddaa77e75dc71e34a3ac7faac3e851da065756ea0651748af85eeb6170033bffb84ec693ab7c865816b4e686c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f72bf9c1efaaea655e5b646c4543bcb
SHA1eccac8cc00d9c13fd193f5551046a3a420a085b3
SHA2563d611fb1d4bf13192a437fbcd877aaf72a9db7694d7f48ca19d6e4d8ad3071c2
SHA512ffa1a4e2da868b23e89ca5ef6019f0e8463f8f8aff080baafa82447074e0326724e35ac9dcb0113a2ed383fa77b9f6772211191959a7679a154087f0d6453d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd25e700c0a7eec532be9a22eb46cf76
SHA142e31cf4802585515d6f72e6ba250cc1dd3f88b7
SHA2566219a69ebe29af39682b1a25c56e0389dead04431ed0fc0c91234f480fe6e49d
SHA51293460ec9aa59aadc5035681cf6fa4a01fe2ec257f3521de59a858384e315658e95002871835ae91f2d026ee8836f05745139542c1528bde4de566c15237550fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d6310445b35566a0312e9d727ab92bc
SHA100421c037e256c70c9f97ee7410ae1ff8a46660e
SHA256c6e4049dc8c702169e012c05edb2551e434226e489cdb29787936768d39422d2
SHA5125a9a2ef20ebb259160a77333f6bac4763ff8a77330fda7f05c03d2e4e7ead61aaa2c4afaa58a5695b453982717754fb96fee4cc2929fa76995610475e246a0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5d9e70c7bc25a9a410c406101cf8f53
SHA189f786026a12d0bb3547e5bc03d38005ce2ac544
SHA256dba4cf0a7f2385d5400375286e4c06cba2aa49c693ad1981f44c5bf1f56c1721
SHA5124dc16cdcb63ea7d96a574648cda8b386ce5b51e733637cc73740c960975dcce14578b4d663812d4ac298b4bba7b3ace6be6f68ba8bcf0ade3ab4e0303e7bac88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5474eb9ee87c497234dab6f803ca9caaf
SHA1496f6516b06efb739969d932d38f532115f2719a
SHA256eac5127f831686008791ce941a3a8ebb1b8209cff5661bffab36280bdafe389f
SHA5121717c2be273b4d6f6feab5d4a72977aaf6a0d964dfb6a0f4f5f1824e281ead9acec6983c09972735b709eb83ae0179e03ed664e211e13c3b41dc6514e25efc23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dccb791b73404caba7cb1624f84c19c6
SHA1cff15251daec352a5b737fd364a47886bc3d372c
SHA2560351b134564b5cb4a7e1d6d118d7c1bd505a593607b28a304f49ca5d0c7f037b
SHA5124d3a801b56d16f0e810c7e67fc528cd2796524ab3c03f6513db1a905fe61de65b23ebd3360204d30d711147a3a516e6ef169f6393c51aa1a8ef198cee26aafd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bc2ed67c0acaf2c4e22eba2dcfa1727
SHA12c9faa01ac8ca65921ec190060d561fdbb8ad90c
SHA2568b94fd3143497029f65492e8db01a4bbee2a72f7c1f51f04660f26e2bd6072ec
SHA5128af39c61b0da5403175c3d5d2afb8431a4a521f99d35ffbd3365c49f270fc988196555e04c3a16e52216eae58e39aef254ab6b82662e2172e60c0314dc71af01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9399f2225276d4f486df464785a98aa
SHA1107fc7ea1cf508391792ba7a4f053cc011d5d57c
SHA2568a143249519274afdc95572ed9cb4623c32937036f3dffda48d3af6ae80c1be6
SHA5128164109b7b4634a10e1c3e99ec61907704341c265fdd3ff97d282f9f0784a80aa144b75cc7dadfe60ef8e488de27a3cfb4675480b63d1f364e35acfdb9ac087d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558922db15eb4bf5b36169a9ce5065e2b
SHA1a478628d28d7be8de2b813743079c00890446419
SHA256249320a04168d2b9bf1b633ad19f039b45cf0b71eaae4256eee3d58ef544d322
SHA512b9487c3a181314899bfac9a1fb4f41fb8e34d032eeae15540b0b0a103d8f25959a9b16d2b46b1b4963b23059e5a00fec172bf564a7c75b6fcc834f082befea0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c0864136600e1c57a9863f98782ba07
SHA12972e5d2b5b130c3d4d736750bf8075680793992
SHA2560722e76f791669a7a9596a5679244fee76001e0b39aa4343a63123f17b39bb75
SHA5125b826f78d942dc348878b4e918bede6254748d4ea8a8a9cc300ede1b3f29fb3c96af714d4b49664d450c1a1fc518a94ed20499bb988ae98a4649f0f2d684c90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50fbc967a810639eeab87ba7f06c40203
SHA1ec7d2c8af5c933bfa6ab69793057e362c48f103f
SHA2564c1ec277c24323a2654571d8f059bf1c898dae3eed481df40b1a740897a0ae1c
SHA5123fbb9bd41d2bf67f7c949238cc0cf8c7373ea43068afcf7cd428fdf720f3a2d5960f13f2603dc3e024675cffc6cd81331ce605de1c3730663f77474cbd4ceccf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b