Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
2a11936844a300c1e16a7e46ae24e260_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a11936844a300c1e16a7e46ae24e260_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a11936844a300c1e16a7e46ae24e260_JaffaCakes118.html
-
Size
21KB
-
MD5
2a11936844a300c1e16a7e46ae24e260
-
SHA1
9180972ae066998c9286b88e13caf57d33de1d8b
-
SHA256
633ecfc9c8634a3661160cdf9b0b9b6f497437815a3c54d3ea493cd3f52e26f7
-
SHA512
3104b1d508e0492efa296a9f4bc45a2198270170e23332a6c66313a72b7849587f888d9946f4111d250f691a8e25469d28dc4420637f29e10bf47cfcd0c4c23f
-
SSDEEP
384:+2XZXwX9uOJXNZKh58+J4JBJt4eegVkYe3L6xdHk+aXQyhyYFPHR:vXZ5OJXNZKDi4JUkT3epaXfoc5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006ee8f1533bef953aec38d7cb9676a2295e24b1165163452054d8866eefc08415000000000e8000000002000020000000bc8cdd7a3c8cd1ed1367668b208b0a3ba9768f62b018c6f5b4f92bf8940e941f2000000074215ae085cafe683d1769a13c0786ab0511f882acdbbcf13b5aaf7d045c591d4000000045bd1102c60edc87bf080aded6606d3015f99fc583d10fb359cff6cdf672ad537d87ad070bc8d95a5ada482a84e86447b2f585b2190845cf5692efdb35d8c65e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000031e5ea6e66aee01a6307b46ec83c4840b5efae3259db9be04e8ab36c5a1744ea000000000e8000000002000020000000409792a5eae714d03a7d0ff60487077a214f57016b1cbf3d65f2e44b35121c7590000000aefeaf565b73beb40309c60c75ec562344caa1958e1432e45cc3cef27dc14c1758964a128b4ab60d5fa8406e92384022fbca87e9171655125e7808ce719c39b13225a160494ac0c836f87b388c3b28474bed32007f8da1224fd09c8ca066a815d41579264cd65d37bc794b0efcda862a57a53c29c0cbaeac36f70b7f51687ecaf75666c79f8c83d3a15f3c45ebe01069400000004624ceea3579ae22e9c929bf49ed9ae6ae9dba2145507896439b4a960f9e30e5a0f4e2ccd9d01d68bebff9a4eb49d2082cf13108f3ea4b8f65b0373fed1d77cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f6fdce441adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA738261-8637-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434637913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2584 2516 iexplore.exe 30 PID 2516 wrote to memory of 2584 2516 iexplore.exe 30 PID 2516 wrote to memory of 2584 2516 iexplore.exe 30 PID 2516 wrote to memory of 2584 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a11936844a300c1e16a7e46ae24e260_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0890e359cadb132a8f5a070c155dbaa
SHA1941fdaa25abc7a5d8b12b3000649b13e04fde096
SHA256f31dc8c2a86297c1b350f55126f1a3d5b685bf78d018b8159051ac85b44f3206
SHA512afdecd060ca64dd0ec0f2d0c1dbe0ce71acd2ff5bfd746bd18081dea504d120974dda7226195180e33a79134601b2b9c653fbaa0f8fb3afdb1f85e9a58dd1c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54342f85db803c7228eaa030a2a24629a
SHA1741dcbfe61a0e26709d562704f36e789f60b20d2
SHA2560d1419ee80f7cdeb57ecf0055719e6a47b72804ca06da1adad63841f4ef14840
SHA51268e776a0f5d429298cbb70dcc41281667d340c6205dd50454a75bdf60c90d125514c99aae426daab294757fe98ac4b7394c30e023715eb3bd5f1247d29650656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501333fd021fe8f2ac7d4c0ebef2106f3
SHA1f977a72bd37884edb0d9b4e4754e6ec533981196
SHA256b37cfbd0b7ed2ccb690a92d3c23c2f21aabe7eb763d5259d7c8f81c3cfa72320
SHA5121c9e70c5a7bd82ca630f9fa6800ce9c2ea915bd1c1663489060df9466dc92d3f12d4d179d3399e44583985d124d1df89088de0b59789f181bd2e6bc6ffefb741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d49046e2eeb5079bfdbc6f9d1818ce7
SHA1271c3fecc10455364cf60c7321d7116534bcdc42
SHA256b60341b301a668702d72064841fdcde9cfa623d4bc7cc43eff7bdf800deba66a
SHA5122c3f90b51c79c99e3231d1a14a86e145daa8a48f3b162552127703e269250ba0778a00ae42df383c8ea5b1a11f08e066b7ffe5ba79950a8f496623ee698970ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2054b42a04347ccba9fd85c7f1a648
SHA1402fa10234d39326c4340601efa0ce11841abfe0
SHA256464e7c76bf9ef853a89fe8d6a3b0d04fbd05e6d875d1c53254ba883857388d4f
SHA5121720ae542581f9423847023ad8ce1c0e40a4403a8a01977f14bfde7e85d8daeb2a481fcabeb77efbff3ddb331b52aade6567ee12709d60f3d44ac5e9c9da186c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468b2eb53d0335cfcc0e7cc5b6c8da6c
SHA1a4269b5ca9492a972c9187f59bc3594a55b90635
SHA256e5827ec8010da56f88b6b487a6448fa2747268b80fd3971826cfb8d78b964b3f
SHA512e93dd709044fdebafb9981540a91b0c7c06c6a3697f90f6b33860366fc87e2ccba05f956bf9f9c2436171ad690b632a2b83e02fbe43e54564586e587b2b3d57f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc71e2470a6410c7bcb0215ca8543f8f
SHA12e094c17584f32f5bf20a998dc865f76736040f0
SHA2560463cac6ec8a075dde35bdccb7f4249f562b0ae920810d99894be778dcf12c4a
SHA51204ca4d1e0e56647c4dc980cef31a0ce806ae1415a0a2a5cfd3297262735824155580ee0fbd0bebce2bd6fdf5aadcfd1416f8ad319da0b41b6ef9901bf82ea134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f132f8cf7b866d2d0ade5effcfd0ca3f
SHA15261bc301a997088ad9cd52653b46763e707b428
SHA256dc3aaa0ddf0e1f405aca1bbd4e92224c310c2340197b0b4f79d2684e550292a1
SHA512db44779ed20b3d1fbf90e80396bf9a8860689d3f91b6d64a0a34f1ab7d9f275a895ead8c4fdb737fa9446e35e905e8925dd1817ac11e8200991e4e1c9e6af0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514cdb85323e506e9fdc328a96bfa8f27
SHA1e9e453d310c666f095a0db99a9d3443560c16109
SHA2564a70ec88cc73fc36e6d83af5c8814d4f687e7173e1664dad17647b28a6fb5aef
SHA512f3d38150fe7e213bfe39c323f654348b253873156f6bdd79ef4084ee011436eef74abbf697d06c7b9e3fa53e80005768fdcc98c75af82a4d3dbe4a802efbe86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54206cd03072de1ea93a437248d1b56d0
SHA1987b53767439b430548abbdea5cd06ee23d12f7d
SHA256a694d4379c47d27dde590596ddbc5935f07cf9043666c83958ed8c150ca32b2c
SHA5122cd9a5853f3f23aa6a1d0905c386184ded92c6d1451ad679af7647ff2a86282335f0c48f6a91ee79d160295dbee6702336d254d62c3151e21f3e3f468bf13278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861daec6aff242a5ca3dd239c37a6825
SHA1f93a35157221332c978480a7a934c8b2640b31bb
SHA256b74ed9000b9f41230fe6a87418dc1f88af6b21ede081e285aa8ece84ce6bd53c
SHA51257b988343f9000ff9bd5047086e6df96ac7237e0b9d5a9577a86da8001faa95eed142eba1cbf374643b9c607275445ce1773532438d10731a93fab1980c2e047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e3df21b54fcdb9272387564274309e
SHA198d289b651416aab229846d72bc627cdce168943
SHA25676f74a997a8a6bd1203fcffebada102be24f724318043b379e6209787df2c733
SHA51279eb7aff57709a49b39b7f961e08e2287624623097b4ffd02554c4bc5071573ac4b77eb2c1930dd598fb6998533e24e71bb3d04a9498ad7add98372251364297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4f197f6ca9770ce3bc018fbe4a2081
SHA1d9af5a39990bba94dc022ea6c92744ff7b2888f0
SHA256e7f119696151bb9539f24db189b0452816befad512e7003402ad14136dfdd8b7
SHA5122f9cf98c2975acb157c1662616e1f2b3d0f86ebc6f2771c90f9e2c249f1e153f49286765f4e18756e0c25e79035f71e8cbf0afa7f28b7e1e13cf314271a8665f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d27fde77e71232f35062f7d61df2c8
SHA1d1413129f16abdbd2435bbe9aeba86655d2caecd
SHA25617927dfa22ccb7728b1d8b063ea4af797e5a27f6de0732c11316f5d7adaa767e
SHA512d3bc53b163062107ef4167db761e54c5cf1711e61f7d410bda5c6a71d2567de756672366de0cad68d1f7c3116a31316ef433f1bc417be32b065c604cc76fdea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cbd0634969eb67b1d55e25992f4a68
SHA13625e55b281b399b3bf5dc05af5f055f393b71d7
SHA256ebb6306f1c08ba84f902c36cf440e2ca4bf6d00b7432125b5d0f7f64f08218a7
SHA512d0c74f97de169ea7c254b12abfc08a194fbbc9aaef91f310455c62ec2ed93b9dc192db397be955d5cfcd939135a379f4893906c4a00ae872863d6e8870dbf278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f2fde327feff93bf87008518a13af9
SHA15ac5bec4c9530d1bd644d264bce3734bc9716a2e
SHA2561b2fbb39fcf819e300008cf780c4681b0a46798c74c9eace1eca288f27902e63
SHA512555a04943154e257c9ec0ae7a6f450ed0c4c71622627c06040b48ae8618b202b4b799f1d535cd98fe4cce5be20886088d6936fe86b553c9a24d27998165f732c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502979188ed87dde6c8f5272c213168d6
SHA1943d9beaf6f4bf93186227c5e85e809609e9b9c4
SHA256900f4eb9be8167e246cee0e554b911ab46c1563d185ab3ddf5b017309d2d0dee
SHA51254b2bcf01677f9cc92dde464c6592c098eba7148ff212491cc80fc499f9e74058b295801d58b90a6eeea0a4e363919ef7a7336aa796ee27b505ffddecdb4702b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85cf95dd02d647490560c2cba8bf925
SHA1e131eb3976eb72690d07e0908a6afb88fb8c61a8
SHA256cb58e55e8c60c06a80eb772c2a7056105709c93d546a512405d6e3139619fe23
SHA5124284e6f862a82593bf5c1ea38ade1dc369c4ec2762f17fd0084789cfb333c822dd7ce278e7bb14c6df8e90c27762e18efd2dc6616bfb103fbc0c952d032844cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb14268994824adee692b2fa6e5e8b9a
SHA1be5de762cac5d61c7f3f04f8748f16bf6c59ddf4
SHA2561a5597cfbc5cdf35cc64ae6ae97218ba4bd1585675f74a2dd3ec3a9b65f9ca56
SHA512d04cdea4f1f092be9f6c793021801d80fefd21a8d0bc690acd961b01223b00d692f2ae9c50565a9377133eaa1a5adb88af0a71f54b03416dd1f73738603e9039
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b