Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
74ed5b64a343e897437601fcbcf39915_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74ed5b64a343e897437601fcbcf39915_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
74ed5b64a343e897437601fcbcf39915_JaffaCakes118.html
-
Size
34KB
-
MD5
74ed5b64a343e897437601fcbcf39915
-
SHA1
af8105637b689868691e7114fb14510dc177720b
-
SHA256
d4ad95cbe7650431a7072b756752921fd01c24be32275ad080deee2b444762b7
-
SHA512
a2cd8e7845768de795d66bdfd54133139b81f785cdc996e970fffb47578e2acc954b86ae9611c83ece1b3cd989f7fa3ce4fa322bfc43e509af9a0d1dfbc2f180
-
SSDEEP
384:KDCr1P1C5KolonoDpoio2oBo+o/ovKvjkHhVbJ23qpB7WJ2BhCKxLYy8YxyoUy56:u+Imu0GYZ/o7/VXwzTu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000600446daacde62d70300b522941d229951adb07de496f71ebd909c3461eb3223000000000e8000000002000020000000cc2716778ee11d0ddd30a7bace8fd08e03b1e5497955915a8c72f1eec177635e900000003b37ffd2c342e90426030addc68609c2329afa415e6b4441f4788a1a4bccca7f5032ea79995174c0f5f022d85210c7265e3a6fd3c1e90f786b1fff1bb10bc1c4b6d2985da09c1a53921497188b90fb35a0354e9a2d313a8302e2203e6e509542d9acdf7890adf04c75d4b51689077b1423f2854ad8c4512cefeba6e71ffe4a7b158f44bc109175419edd400a10c561644000000077c89ec5a7e383d2efa0bed65688c0ea2e78705f638ebbac15205e63aefd7b6d7fe96d80608c05b16375c1eded3d51c7f03897b58baab1fce6b3ca3ad2bdbb80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000a7fc01286aa8a4de9810ffdd5d26541d1761ce32e324b373c8c7023d581504b5000000000e8000000002000020000000b719696895e7e535d4f403488e52e274b73762d58de3326673e8ebfc28f115dd200000003ef4f0aba5f61974629b5750f68ed6c2154fe84c33ef67338078f57f112e349a40000000025ca7287587fbf346f024b1af52388595b99e681a9ec2f647664f0d7b4529eda7487e825f9558eb12360aadc454158d5fd697552d711c21a57cccf8ceb5daf3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0057a2799edfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0928A11-4B91-11EF-9AB6-F6C828CC4EA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428189299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 536 2076 iexplore.exe 30 PID 2076 wrote to memory of 536 2076 iexplore.exe 30 PID 2076 wrote to memory of 536 2076 iexplore.exe 30 PID 2076 wrote to memory of 536 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74ed5b64a343e897437601fcbcf39915_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b36e338bab475a0c520cd8d5e804ed27
SHA150f5d27995de07604dacb67e47a83e25b9ad06e4
SHA2560ede6bfe663e720bc9909312203fe473f5fb2087fdf3551c0c3598c07312b435
SHA512ff941c28135f619851828506e2adda66dbf8082b614fdb5bf02e963dcc16f6138dab74081ae3c0833d179dfa05127a059eaf9eb0271a5709606a306eb20f9087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5340c01020352604b10d3901297975912
SHA170d68eeeadcfd9fe85dc2c4ddf09720bf378bde5
SHA256e98b47876e08c32a07b4584a13aff8020548f68873528a08b85cf45218a00e97
SHA512de1f5fe098001784d853af75bb70f2b936d8162495d3062394a388535e80bc8040d8943d8f8e388ba05f3bac6592d3a8509ed85e82c4601a3b0aeb0a3048f3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8883fd45930164e83d60fee1c00394c
SHA1096703c81caf3da737cd3bed85b8008c4fd9b97e
SHA25681a326c802a9bfd13a1d19de42475d321033073e5fe7db562e6eedbb6acad5fa
SHA51204b5cc8b4cc4cfdb80b7972247f61c92fab91c7987502f0f6a702b81ef778e50d5783ddd92e89d550bf7029153f180cfea125f2c17d64ae8c496b9e14dfa9001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5daf31e131b221d40a39a6c9c90f889b0
SHA1abdd7db30ef00021dc9b5171ebdcb19559e4fc68
SHA25608f9f9bc199451fe2401504ab8e0c7c77bb904023bc46e97dc181a16c20ccbd3
SHA5120b790cf4923ad6ff8c6d9e9fcd3b85c65eb3dcb875047c267f3ad1799e9f8a83eb81077cfa4d0525fa62371e243c9ccec49f1a77b5c93231cb178232ee2b81c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d29f2b8cd63cb56d63c4f0f696c9b9e
SHA148a0463b6c3b7422b3b705d3404050b5341108d6
SHA2562dc1e2110ea9f749081a517d384b60a2c72c4e704ff3254532aec1d0217ade4b
SHA5125808db618d42f49a61ca916f1b47bc6dc3937d7e5bae363e69ea417f65b985bc3c936bce8e8b8fdc58a38af582b19821a302ec75b5891aceda3418809461b67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9249a45a145038cf65ab9d8629acc40
SHA1e0599e201387cdc87a06342a52fc2f1a9d85e58e
SHA25631bc4e5174010cc001260f5347bc9be5d9740de899460c45347e4a9c0f1514ce
SHA512edd49ea2476760283e11dcbccfed9f5ee836bb0cdf0c7feb42d33015981e6cf897e492cce29870ac6f804f4734ea78b906cde2038207e09e151c8e3d7602348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a87e3881c7bac0ad31d0ea99be3d7fb
SHA124e33e205f0b15cffd219ac8af92a351519a038c
SHA25606ef05ee05ba8c87ffeae4328a18dd1cd861604284d175642b3fd227aed38352
SHA5122c479e79ea63a1887c403b6ecdbcb5d4b98b9413af0e225a578bcb7db4259371976761eaa404bd401f43af2dbafc021c09d3063be23bc51665d26977fb300a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc14d731f5770f0cd93532dbc78555d7
SHA1c76c61c3ffb29f5f8eb9cf3b4316e8a4ae4436fd
SHA2569b3956656f5e47f2b833dd6668b0b54431ff4368040edeadfba16f506ae409b3
SHA512e13f3fabb6ad562bba310f1e3ca02848762cea47c5e3cd9e558ff6add8c31fb5d1d782799e79e7d278d8477c9e9938e351aaf3eb378df9ad92cbcc9c4644287e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52216271eaa4295f170d39c3b093a5b7a
SHA1004d6b1dcd5c4e1d890a0f5038837a1451cd770f
SHA256a810584033faddbbf33c309552717b8763cfab29f34be51edaf2ecb519244ee0
SHA512105f65c6652d53d692b80a4d3a9e7b1593f2961c28891da84401e151ae7d6b4fd3880bbbee4c4ab541a40d91f9ed1cd971a8e8732df2d9d4e9d3c4d353e67dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58759602c77b390d43e32fa3a9894ae45
SHA173b06132b8601d09c4e919d9c8dba6a0164865db
SHA256d0a57391370c39a11a97388d7721b102019f778b728432c322668afad6575827
SHA512736366a9f8e81f8d3e83690b8f841bb897c6bceacc04d292f16c7f972b394a1b40fe47f626f57f7b1eac7f2d6ca86d944f03cdbae0674ff77ed76790f0698ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e40f923f5356b37225949d58a075a517
SHA1356c1609c1365368162d5cd5a6cd47608ec4cf38
SHA2561a99c1618c11e080c8969937bf579b7251c79100cd2de6081d26e5b047ba84f5
SHA5128b6494a29903edc56a20b6e87da43ef9559fbe9a872f53f52d65d3fae1d41f5f9b3d1d3209ea5f3942db0a9e4eb7b4e4fc9bc6ed64457caef7dc57ed97a20c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f0abe3ecda54968b3822cb628685f1f
SHA10bedb8c5837b40ebfeab5ff925edc851a13f4f33
SHA256e7efea876b351f4d25bced34f42ff2fa86aba1f9627e30606206e79b6748d43e
SHA5121d9d227c161f249da59ad58d518dcee9801eaad422022dae5ef738b429714c7b16b91a9c0107da8934b26142c233124c8f4ec84bf60ff054f6beb791a767a3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f06b529754cbd799548a23b7a9796bca
SHA1a206aaf973158d0cc51288959c88560b0e1acb5a
SHA256fcaab4ee8ae32e04983cfb10cfe316497bbcd070445f7af3a849034ca10a9a91
SHA512d53c5e7565ff7d937486ed1648164dde150c356989039a4060e09a35939eb716db1effa321294cf16c558b3c0db972e0a354682acb0fc3e3ba44da925043b1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bbb5979d718214a0a83e8e89a0850f62
SHA1c5fb0ac998a557a0eb5e7ebc0348a051cd894a43
SHA256a238f764e1548d064bdb9b5bbcdb650983f025052187ccab801dae60070dd3a6
SHA5126db96c20004f3c57219dbb92bd93dd22bcb2c71979d57f539b3fe4a38d8006e4a97cffb91d9e802eb34db44eb55ac870f097c5f9706ed52b8aaa61b5878e275a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc4e562bfb4163517e16745d1931cbce
SHA130d2bd33142f9c05d952b524d4ebac096decab93
SHA256b994a8750a423b65381d515f3efa8c6feee9e514fcbd5e1cb5e8488aa4207867
SHA51201e19c3276ba2b3fe1cca89e039ff04374c932cb4b2c36f420e544b794a354aff5a02f7914d27bab2a8b4fb57b0dceca0cb648c189983ad7c54d62229a13df43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f040be7817897171cbfd547ebd8d3090
SHA17d4ae63318c1d98c6df41cc006a003c3bd20a593
SHA256d7e6f2c5e2e33b5d0e919f7054906e5faf86ca734cf344fc328073f13065b083
SHA512f828fa725bc03fff1cdf40a96f91598db484942e2e364e947acd626d931f97b65f3c3700424192f8f6f2432cdd436ec6266c0f080c90644290aeeac590d5bba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c13df274fede915440c97cfc1941555f
SHA1c840529a3e202e54936a1c9251f585e4e1ade6b0
SHA2565c800b2836ce460e75bbc435a6f51e25466e6e92bb6df25e61350a0447318c73
SHA51281bb3848f925113e2e360d76e02ee5933d1a693a55da2168ef7d3123a843ff4a295bff4cd331624581fc363ea8755c9883623cfcf433c1142b0bdc1be6085e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af94f4bc793d57a9352c4ff92f1e1e59
SHA1b0653a0d2d80bfb15f924d9916b847996f8d428b
SHA256a1738f07d3745bbfb5065e693528cefc3931ce68bb8be202d2c05e429d6e330e
SHA512f10f12a271e4e474c1830d4f1600c9d140778f1e8f924702939e0327fda22101b85ba6540bb9bb15191d79caa1d52a69cd6d6c8df0f5d87d36f4f1c9214f1ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fefddc3aa12de6f43255a3d3898bdd20
SHA13899d4bab2398d880479048bd0ade1e661a672e9
SHA25631a18fc8a2252c7ded467f69ce453fb8d55e6c99d98d86636c1b8d1cdbad432a
SHA512c752c679075a663259765659188a98bcb8843eb2179ea972c5dc2f1770343ee509b1b76a87d8499bc0d744b61f338bfabb8c8d350f8ac8979d98410770e198b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b