Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
08eef89b18a316abc9f7c3fd9932212d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08eef89b18a316abc9f7c3fd9932212d_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
08eef89b18a316abc9f7c3fd9932212d_JaffaCakes118.html
-
Size
12KB
-
MD5
08eef89b18a316abc9f7c3fd9932212d
-
SHA1
eb5d541cbd39dce0d1d4ce09be5095fb57588c22
-
SHA256
6a10a39e58006951d5374347b8cbe4126b5790795431b355290793e7f50b21d6
-
SHA512
f6190cbfdcdf9200d0530fe1a14a1226cf7e3ed3080cba304b47da145a2eed51c50350ce7058325dcddef63a72bb298e2ca28b29bd03219b3c4c7955c404480c
-
SSDEEP
384:sklIcUVIjSx/gc8BzZjnh8S5208LOXguLZ:AglVOExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50db73858514db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e9f18cccfef61ef262335ecfb540171494297bbf4bfd1949d8f1af7181416285000000000e8000000002000020000000d261cb5c9bc621b0042f5c4f693c0a97b981586ef9054c0a061b775d3700190290000000d2c001710548b7e397ba23d8e07ec39ed0071f22b285d656216cb9be368ed25328c8a5d3fbe3b73e47468026eec05a657616274d8de73dfa8ff7ee09e055c3ae658c1f79550409138ac942539609d1f62e3f4be1003c30638db8ccfd631c190337b193881f752d7d2cdb5df87d9f8972ba9516cfabd9c6401383e031d6df0703d5cc38b7aaebff31607f4ff9970b324e400000002a02d98a4c8b94a7156abb3505313198f46ec021cf2f630030f601c18d6f4a3098b6355382777c4a05fa7f99d850192cbfc07bb498e744e3745177687a2d10e7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000015c4f098dc9b374f90133c7ad0810eceaacf37fbef6dcfb13374c91bb8b48c04000000000e8000000002000020000000a3f7904ceab8fea21e8c33c51a978d93bd20db28b68e4967adaaeb699d1dfec1200000001f9d6e11681a9fc2e344bae21675aed8dd2e6e080d8590950904ed0956f074c74000000059ffed4b7277cb30be8819c701ef82faea5d6c70c46010124dd8ba927e8cd0f1019b73c99d7ded2e482fe6dc60e7fcb7fce0ba40cc6fdaa733e24a49f6c55590 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434005937" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B4747B1-8078-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2700 2916 iexplore.exe 30 PID 2916 wrote to memory of 2700 2916 iexplore.exe 30 PID 2916 wrote to memory of 2700 2916 iexplore.exe 30 PID 2916 wrote to memory of 2700 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08eef89b18a316abc9f7c3fd9932212d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f42a35b0adfd58daa5ce2718430e74
SHA107bf531ccfbc351327419867699967d14ad25eca
SHA256c63f960e4c6b6034a671e9c931087cbbb2bed5af8fbf86fd35dc244d864cc6d7
SHA512b4050b77764755e81121b8c102a501c5066515d24d8f1b456bd7cde7bc873cacd2687963eed288fe96c42043bd013796cc743689e697c6ca48ffaf348051a37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b93f56661f207fcff48aa7e9c56854
SHA115e41cf8d3ac5cd3159e2ad99e358e394fe95479
SHA256ef0ee76a6925fc55f4be03b28ac33817a8d619f1de17ddef723b87430c9eab6b
SHA51233400f650a71820434879775e0c23e148392435d45b7025fb9ba319358fc07fcbe993a08dafb8d994f1d5b2845d2591f0fac5beeafc6bdb9bb5fce782b040d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55141eef783df254031da84ff882683bd
SHA1f07136250cd918cf7225529f8491dcd44fd1f8fb
SHA256dc22b0969846061351f516b7ccc357b4094bb2824afde9afccb04624f4c44a81
SHA512f1cdc3c941c7d2f586ca9ee4f2f144d75c94ccfc1ec5bf59c2394f101a557ce46d7b3646de9140971e0ee1079d3dcd26335ba834b16a57a3dbbc670e24343388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51692bc2058f342a43a84c39b2d13ea5c
SHA11abc1ac3c602c0812fdb922a1a68cfd875d184c2
SHA2565702aea7ed04fc7872f6808f58fe0640f87fd0cb290c992199c0738e3f73ac05
SHA512d3248b4b16b26cb2fd33e11e33c10ee1c7f6869342d8eb462a162b8bbfb5bd4fea923cce918d6fb8e8567d686e8c4e4d606b6148b12a3db25d77002a8778fb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d909420732330a5ed9b5d07c6d3326
SHA10f565bf950b00a81bd933ac52354feb043c67081
SHA256e6e919030602ed19e2a2457830702215d1878c0acb17e1d94af29c12fa12cef8
SHA5128b61a7f88b324aa5849015c5c224fe5666904cc27dc69caa32e421adebeeb3c5e4fed7ad78cf97a58d4e6d38d2028d0e3dbc109cd39edff48f7bc58b3909882e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508725628b3afa592ab75318078b0bb75
SHA1831d6fee9f27d08acc7baf4d29feb5a0e231275f
SHA2567905c82c7e448af8d6b9cb3b135f352f3aee9874cc686f0f585ce0cc01f8789b
SHA512242fa3e9448b86f998e4c2dca40774ae7777501e3e02a42ede48a188b19821dc3eb987d82bd2bda9bcc4d452f532b7d53b50c6bfa3f65aa65a0b6f7e20233091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e74853ed3e34c3217023f1b2e12dec
SHA11e10c6a90cb6d1bceabd68140e7680b52402c308
SHA2568940f063528d66a1e4f28e9189561245594ee32e9d1cc84a077f2901053dd7d2
SHA51252b748761b2f4ad9e940eb95413bce4d48967107d1f596ab37682e2889ecd0483f161e36c25efc8856f2d9a8ebacf6677ce126812f0ac947a43fa6ca768ee846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0d1100aac5f5cc3d7b81fe237907fe
SHA1bfe73090d9940f6e1c85afd4bcd616b8426f5781
SHA25639b2c4dca228f98331a3516debc65c7ffbc1afcf431b3a4bc5f650f31a729465
SHA512223a0f784fafa99fc07d1fa15ece411137f0520969084ffce967247bc4d4c81a07b9fcc455d06564c7e29ded7ba07f97cf2ba7167f791f374251516fb4e23999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516259f0c959c455af86be0100079ce78
SHA1935307f8ff958aef4083f8aaa85a487a4cc22607
SHA25627edc0100d8222afebc5db3000eebe4cf513e8d0703f3b4922a94107256d18fc
SHA512bf4091c78661c88984acdfebc522a5d28e78a0da0835d550b3ff788a4758f2168706720c0edfc64ac5ddc5cd6dc5ad2fe75656ded7d18ed957c75a14cf847f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7494dfc571422dc5f0df4e61401244
SHA18f719688f9c583954931265da6e842711ee31708
SHA25621a0d1b4942a7e9125efcabbabe40856e2d72e433cf1cd3e6c79fdd619256e38
SHA51291ddfdef1d55dea22530a4cf64ecd077d64c8b744c49ccca5ea33ceed8e06e774f617573413f9ede7e06197c2c0fd7879a65c67341db88db4a335518a11aa690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c3f1173f923d5b94b5f2bedce6fbe8
SHA1ab9e35cefbe2e9dc5f61c4265c636499fdeb65c0
SHA256264a47c9b657acc8f39cb1c0b997be402dcd8585c19f3225d401033040f0189a
SHA51257cd77bf15eaed5a686235a9614cb27b0326324bd9c336fc1502fa2cc68b4bda89bde2232df22121593d2a0e36d3c8ef30b1d50c1fbef4dfbef886ca5416747b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd2180d9ab386a11e5124fd0d6e261e6
SHA1a4ed80484b5504c59c0ab4db92ab5f936cb79bdd
SHA25652a6262dc2b36e4d96ade77678de6510f0cae3169b62a60eedfaf6a9e1dad291
SHA512f1cbd59ee2ddb51b6231a2b09e99a472721dfdea09af76bd3c56adf3fec5f06cf1cebec57ee5d53c99779d46c310c96c6e05ac738a52c745a22c20d456f1917d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534500b05bd5954b685dbc649c38172f8
SHA16015e4a32a90e21e088eb9bd120bc0deb8cb3d44
SHA256061748457a039903b07993dabf42a787d8df6788bf71230362f52a4be35152d9
SHA5128ab440b1d787b849b97ed979ff587dc691990753b56ea19de69a411e96d2a26b02c0ba6a4298792844e3db20ced335462a8c7ae5b70c1c4ebc817df3dcd3bf12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d36f2e4fd100bef747fa2182de1b40
SHA1dcc34ae915428845a3e5bb99c494816dac309739
SHA2568c94841f3322b53f2b88e44c43cc32bc5ebc72e34d50aed2f7b54c03b2971326
SHA512ae339287d8f4726f162a5d22646895832c10fd12ffbfb4028b6182f963a965254f736011937ee461ab2856161fe6f49874ab365bf4621a8eae9046c56ee7a0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af165d14208c28470489597c721cd115
SHA1bb1982af5ca81fbf87156e77eaabc6174b67c119
SHA256a3f40701031bdb12ba03967a3048bd7a07a10f1452b24df14a82ab1a0b09c41c
SHA51216bda2619dac487d6a81587736163e824692fd39d3761e3f33ac2994a8149bdc864eea82d3396c939ee415b3a990bdcba27c322d341b55919b0ccd8fd0441433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826fd8bb0a3bfadeb30e2c9cd43c64ce
SHA19f3b6adebadd12b6092a1c11d5ae30bc59ef527c
SHA256e5ae79d966895cb40770f3e9a0d37386ceb73b2c760b4c8399442728c9386e75
SHA512ee78159ce2eb9dc10eb7d1713d9ac3eeb496181086440bbe4059454b10e195ea125234ddeda0330ffc85111f03f0d535f6b4f73d6f29e71b0cf9c63804324e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623e09ad2cee69f67b5fd6e62574e8ec
SHA1d143b864cf20e75202637bb3088294fd1aefec14
SHA256949260bde6f7324b67880f18accc757b5d0fba5b724b235281c4b618dc7d5ac9
SHA512bb19759ac0156b6b8e4c6df5a3cfd8f1f7629ca339b82872367f86372e2f21aedd5697d079576be3c2874dfa98c8a507cb1210ba8ef337c443e4567ac19e35b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b25ea135025b4df0c91aa6413c7ecd7
SHA17477895ce74aa70d0a009669130f2f9c469d8230
SHA256d453fec687a813d2a48c6d57e61b2d706ce9122567def4fdb2a5b4cdc5aeafc1
SHA5120d433c72109be0229cbee7b77eafc721daaea676a5659a9e3c6e8eb163b2e02e7f39f7d53aa4ed4f0f5d5d7d0a38e4c928a35aa902fb2b50de81c375b7684b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e4ec92c3b4178c72a53a24d1d9470d
SHA195d643991c1c70301584b35d2b22a8ff3a724ed7
SHA2564b400032db35535cb5830bd5ad9994249693ca73b9bcaa2962f6a8e8af944388
SHA51299b974e280b6692d321f84ae88473f24ac28deecdc1aec8c80363eb866e78c976e00652eba19053b8387a04a92f64a865160ec5b5430cec8b5404f6e515ccd05
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b