Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
db369c702680289031ea7714554a014f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db369c702680289031ea7714554a014f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db369c702680289031ea7714554a014f_JaffaCakes118.html
-
Size
342KB
-
MD5
db369c702680289031ea7714554a014f
-
SHA1
83e86fbe9a733bc582873fd1df7ac966acc773fc
-
SHA256
75a4d3bceebc5278ea1842fb8751d34e91700729d4500739bfb8c9c3a43672e9
-
SHA512
1a6a20f3904463cf87ace1c1106ee6ca40720946f669728e3bb1297dc057d68cdd3bde66d5fd16b848cd6da3aa57a38fab6b31814eaa8909e5ca0a0330127618
-
SSDEEP
6144:SSsMYod+X3oI+YmsMYod+X3oI+YbsMYod+X3oI+YQ:x5d+X3G5d+X3p5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432250532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f9db0acedc7d7e32a3816ca43fe9162ddb7ec166e93e5dec43caa8e40dbe8b06000000000e8000000002000020000000d04ba4712056e72f0173a9b3195cc711e423cacc5de598d8eebcb6fb179e5aa720000000fb1bad75349f2b52519e3f085bff6c801781134af69b21c827c10c40e4b501c8400000008a61d420c85847e1ddeca7f8cab01b231d3208079c186358add052a5ee6bfbe4c9823694c7228d841b556d014a6e353b87363d11086a0aa70fd46d35b51e7554 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C7C9211-7081-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406801418e04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2252 1920 iexplore.exe 30 PID 1920 wrote to memory of 2252 1920 iexplore.exe 30 PID 1920 wrote to memory of 2252 1920 iexplore.exe 30 PID 1920 wrote to memory of 2252 1920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db369c702680289031ea7714554a014f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0304a0d292c760f1456dd833d3b4ce1
SHA18f57d9813a8091fa89ddae01bddee240872f91a4
SHA256f27f473979f82c8f4192c6acc6b386f57b85374b9296a1b5f4199303da62a56c
SHA512bcf91866668031df8ef9c040be150e4d9338796e9657222a1a8e113357ac96407564f21a1336362567c8f59ca5b405ff09a88e676629c60318d0ce7f71e92e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d2fe0537c811731fca9ba95844ace5
SHA1687cf4473d105000298cb364b692796dff456fcd
SHA256075c375a69299e88eff537cf3de6d92ad3ced9b910dd9d96caa367386270edcd
SHA5120d59c82ecd866be6b0fee1225b2ea879da31ae71b1f5117248c4c2a1b70b9ecadd507fc27eea52e38cb5f60df0de8c3c687bb72e3d6eb461682b6755553d5a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cadc7c8920a403a091ce04e8976dea
SHA1e99873e46c08c1812b4987c9018b2e6d230a6bdd
SHA256a980e34b4e789d3e71293617c10bf990fe841bdda12ff794063f453cae2da4cb
SHA512dbf754890d82957d17cd876a5be1bf2ed11cd031dcba8d6d6756caf43e4879d61c71ecc2513a182620953e3030dfd23d98943159ab68ac793a0ba09513252415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812a1295a498f973dfa79c3ae67fcdd0
SHA12f3e73507bc204c940992d238adfda8718249c34
SHA256bbdac44ea004ada67a6193517464093b89751a4a751bb5ed70c6f8f77ef788ba
SHA512db6abef91dfe23076640d2c996f56cfb3c503f7684f79900dab7f277349ea2c4353d5344316e3fd5fccb390f71bad5d062b34d1f32c76cb9672d015e2b1bece9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f7ee9492db6ee8acac7b5768a82438
SHA19323d93d81f2b3f3912f173ddaeba35a3c68eb5f
SHA256e71eeeef3e04c6ae7030f7816c77c5a7aaabc407a6b94cac1b492eae0ae19bef
SHA51228791f8ab0d7a758cb1d54f7cdb9be62ef3370bacddf6eee21302ea5fabd451796129b737c38fda9b2dfe11c1e8d2525461f26af50bb72554dadf6ace57ff469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13940a430de3cccbcb71c61f82c29fa
SHA1e882d91464485cc5eae9e4514bd01680c11b93b5
SHA256bd4c95db743d39e6c17a908116fb1ef99c0d539e4a640e447f92e2be0d4001a2
SHA512c68c0ec43d1a9fdc8d3eed994aa3666d2d62caa084a23ede1e605d7892bffa51e40fc942cd65c2d1fc1cbebc4c3d05311e40d040460503c385e09882eadb4f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d860fd29cb5aa088925d9c468a3bd167
SHA1e93e0d1e479aafab62359156ad65ad23c4422d65
SHA25662f0be9c40aca929d2e6bd96c899f6dc0e57d3d981d9d30ac356d94fc954ac6f
SHA51286c56d791ac9df1b39bdf8adea329532eda96d62ae0541f6c926d09ce83237f574d06b7136f74892fd0bbc73e5f51c48703140e9fff618680f7f5eee3788863b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5b6352425a586890902cdbf4af7a18
SHA182deb01f2f92047f99652db7f9afa69711c60124
SHA25631572e8727e55233cb03279af2a86bf22a8ed6f41d6976468979bf4c176635e9
SHA512683cd8b7b0350559b2b00a040d4a9382ad500a5064a9415a2ba04005f07241abea395e44026388acd29774196a9a57da91098de5697292919216fa32d9c3f2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500762428e365015018e43f9fef56b34a
SHA1cb96213c3e6e0e010b9db4c2e38674e36f2084eb
SHA256ca5960cff97a4300a8b2c6fbf4b5cd2de41d61d48ad68de01f1dae16a2b910a1
SHA512ea29334c1fb275e6aa1aecd36fd7d0c62621fe639c0f4280865d54f978fd6e033480208bbaf4e284851d190710426b41d6d0f1d0680623ccccd8826d5cec3287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138b57accd1d179a1e5c7e4218bbbd48
SHA13a1735f142eb70a4166edfc20dd7fbcd0cd7c2c9
SHA256db5b3d438147ff9689ebf3a1e82414b6948329a0ddd582259e735cfed7ccf051
SHA5123e2781b1ddc7df191b64c5f575d63163e443e6c412eae95333b01e20aa1e62f08b34c1daee00b66908c199b3a958bd09891a34e7ad0a56c9555ca5fa92cc05dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc454313e12847adf2dc14e8e6506875
SHA1d1213f5bacb69213f4109ee36de8fa9a6de9097b
SHA25692d36fdce8826c8f30556d7dd4e5ea8b0e15cba1a0642c00374fb6eb0f3d1948
SHA51271e184bb4a12d4fccc7242370a812dab5b99a6328078b93215cd59b79c56b240a863396dd3a18ba3b3c106ebee536ab8356de2f3df3294012521721c96f3b8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf87084bd389679411dc78f39a7f15f
SHA1a79e92dc32a1c7907415ebed65ee3de325797515
SHA25689b2062144b91e8abb78f577e6e745da70c55c381bfe79f2a26d49d1d54ba7a4
SHA512ed8b08dc5fb631af608bb2a2c62e9acfe3c42f418a35f46cb7aa9c11ef55e95c6636f4e25b49a43c4120dbf5503d9bc01d69d27d5b8942743c2916fd422b8b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9a5e690b331e2a63f347c6cd6b226c
SHA1b518cf1367fafe52efaa84c7bc984895a84960a0
SHA2563b91c5a2a2f6a87610e4c78748896fb89475808bd7f1496a43c1695abda75062
SHA51219b44a01d1c62d41c728ee36c311b1f9231cac75fb975e30df61d0da8a523ea0bb92d24186fa189007827d67f1c4a8de3e014ccbb915ea5334f7c5c28ac414b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ed50a2eb851e5138ebeee93f0f56f6
SHA1ef5ed7f87c3ec2aff7ee06e727ea46be61098278
SHA25628c7ae7708a39b05a5da8493afb8ea80fdee1bfb39a2a2875b7eefb92a513d4b
SHA512d9ac754c23606be557d3151660651d13e1c887b6d2ba4a557a374bc6afca4015eb896285ca7c860f5e2525985a014a290c099556e9d26e57563dd817454e04de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83ee2915a2fe8ea717e6c81788ddf01
SHA1be72fb728b414f1a25694b00b7b2d3d1f0989c75
SHA256683517906e76f35e905a88ccaa19b049ea98a6cb55c381f510d206489ff01155
SHA512550bf89e528c85c02fac2f4d4ee91adafd50d45fa93830d58de2cbb3ade080f7a8c2a5c50e461c55ba01a7dc035c9abdf7458ad53b1dd305bf0239a666ea1e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547189aeccc7a731e29804e6f8de1d57
SHA195b12a649c12412451f5e9de746a754cb668b6f0
SHA256d0971175effa2b2b05080c9593e35edee8877b29af908823c6c43ad2b44ba57f
SHA51249934c3385f69556807c69c8dc2993fbd19bd156707b6fd7efb56af14c355d05f02489ad00ca00f3d06b02fc63906050759c571a26173d683537a70014303e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f1b3860e3c98d116331496122199dd
SHA1b851da2e24e9668a0b25b780c3bf59b0082c794e
SHA2565e21ea5fa88061e038f500507e1c220d647b9b3bc6586d350ccc74fb6b805f60
SHA512901e14c34e4e2efe3de8fc80c3abb836074bd5af36325b16c40a5ae3388b6302e9ae23a0a358147faaabecf455221c81e2844a95ef91bee4ab0a8ea860e8049d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c71f21ad3fca0c8f55d30bbb43b367e
SHA10028cbe069586bf9d391602dbbd79bff65864e80
SHA2569c4a759d331a611c502c945cbc4d35b7711a92da46244a5fb1b2f119cd4f1088
SHA512d55cea2a6baa35aaada2a456d19f7cfc3944e10231d1ea93c52284d3c8f88507adc48bb5833315a9b182306f08771e5c753dfde6d00db18ee151280340dbd3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a59eccedd0ec7c8cf91c46c349db74
SHA1dc4ab85bb6de8643ec00133e54b22972ba6f8548
SHA256b0e04153ed9a0920ddeb963f5f3388fd169fcd212104bf4e97d31ce7d89c823d
SHA512a4ffab7b36589cb6f4c0cd95cb811e21b3a3c6a47a449b67b6362e934e6c2c8f902ee8c1a179c6adbf8511181aa81991763b2094406a4de0864b597f699acb64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b