Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
afa4fbe2810b692da57490fb644a3e8b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afa4fbe2810b692da57490fb644a3e8b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
afa4fbe2810b692da57490fb644a3e8b_JaffaCakes118.html
-
Size
1KB
-
MD5
afa4fbe2810b692da57490fb644a3e8b
-
SHA1
d1df3c909371d37c0044521a14ec3b3fefc4750f
-
SHA256
2289ef5c8d12fb0cfed52af84757a0afa0476dc5869363d3e935193ca9b4445f
-
SHA512
7fb1d933a5d0256e917b7c43e03d96a88cf1e1e3f049a5695d1c9a723508c6536dd8d0d92cddd4f092f45acfa408d561cf5b0145ad3ca6b69888fe17f606a62e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1005fdd10ff3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006931be5bcd71b3a8d0aba493120ef1f13b1c9753e24bb137fe8a0c1634bd42ce000000000e800000000200002000000045a8ee2a6c14525e52c36a98f9400a5ca38ca44796fbf1009a7f9393212dbe9d90000000171d0110e8dfd1abdc5b8b2b685fab3b56496cfeff1031d3389a34efb52a56a342dd48dc3e515d77c5d4b2e5235390b91afc964cb6188e2b37a7969ba14690faff29574db781aff9bcf834c230d44af4b7bb9bb936baecc394a27cc1a4a42343630d08e50f42a61b451f4d040e47aa49c931eef48c7aef3371e21ac7d799ffd3631fa89181c7d4af35a9586dea10bb6c40000000add4e794e5af7eefb0e1f5dd8aa38a0cfcede39ab7cddd6cc301355a6522dbfeef2c469771e8dc834d1d97d2c581ccd53542629ac8394fe984bfec5fd03f20b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBE91AD1-5F02-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000689b9ac91ee7287d8f019772d698e4cb4a9daef3d9c41886a7512dfce995effb000000000e8000000002000020000000641905e8ceae34ddd0bd458efec9a6384a8673443ca322145630d123019254c120000000f2a85633decd2cc0529578ffdcbb2e31c76b1482a53b5d470c9ddb523461f673400000003cab61418256280b3d6a026d1f8358b470be3ad89d5f582c08507f56df701888d1094235f120fd9b61b798a4c2097886bab3d5846593f5fcd016e209e9eb42f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430327057" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1904 2468 iexplore.exe 31 PID 2468 wrote to memory of 1904 2468 iexplore.exe 31 PID 2468 wrote to memory of 1904 2468 iexplore.exe 31 PID 2468 wrote to memory of 1904 2468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afa4fbe2810b692da57490fb644a3e8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3975e0f52521f2a8021e90a1cd93a1
SHA1ce839f9440efff02158308cced9920eb53a4f20d
SHA256ea37d16f010296bcc0368ef6cd59bc5f8d1853b38056c6492ef4bb322423d59f
SHA5125aeda04a37b21702bf8533d4a5403256e606ba53a34da83ffc740fd824bc64528a255c96275ced6f6d2e056ef332c7a2e6a80a9db4b7c185ae60e1353d458b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f485d9da397e517487995cca2d56915
SHA1bc7612be803ad4fe876a328dd9339309be4a7f55
SHA2566e8ec053ce8e0686b2855d7c20ec6c4d9dcbabe7cc41cdabf494fdf594f62e99
SHA512c8a381001e266ee89fdf55f59a49df4a974dbc0f0ed5cd6485847d868c623854459cb0fa7037ee7c43e67edf7da60d0cca7657b1b0d958d8d2c87b425ab397da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d367f28556fb0078402bb74325a8ce9
SHA17d2323d7d3bb23c005b1a45f6c484eb5052d7000
SHA256b8476a69252ae328ca552f1001d9a092d9e9c5db002e6934b5d96a74e52f9b24
SHA512108fef580557f8ff309ee23018ec8d5dccd64bdebddaf333d5f5157d3427c85595e00e7f4eebbccbb0e22b5e99c567635fe0a694665c41fd4b0673e5c885fd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd6f40506fadec948290aedf0343427
SHA14659d27c4c160d0c0124851630226df7e568e8b4
SHA25679788ae1dbbccab3b1ea4ee3ffaa8d4cd41693c91a9c2dc70069dce9853643ae
SHA51281351c2d95cf74b8d17b696b7bbd6150dd76473ea731e31883702de11ef58e051708070726a48000f25dfb386ac77355d8aa79fac27daac62a4bcb7e9e7d8853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf81ac51eed1879ed8a44327ef772c7d
SHA1e0624a0201657c0585d13883d39b71fc37583f62
SHA2566cc938c26d89061cb3043ae72b012cb3458e1f5642542112c8bcea2af47eebc2
SHA512aa81b1b3a28564f29c971cfa152f777091565400a8b461370eaa1ca78a37fb83eaeef54d711b8d699141dd703f37fbf7f851c263704235d21e7e784f3c9858c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe65a86b1101195fc03b47ba39092e9
SHA1bd304bfefb4d5ba11ded4ae2ada59df88e8eefd5
SHA256faf9a1810bc176c87ce1423940719e0f4134633c60d29e3f01933e1a57e7e2ad
SHA512e4e7cf8e1cd77f41785b86863a287cb1ae8df4efd3b9b3f2784050ef2cabdb43af55f5ced64b64b7b2f3d3a07d9057e6b69f621fe16a1ba7b3617a62597be5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541730d6a39680e79ca40944c09a7e6d4
SHA10066ab690480156fe0d7e36fb291504bfd6ebe5a
SHA256197507d3ab00659115bfb1ba86c9270bb3d4f342e4b1abc2087a49d34f693c0f
SHA5123676d870b15a0ab8795c67ccc7d631477f41bb7783a2b9e54a44dea33f2c922c4eb1652a760a96a7d6eb61346c63c87af6293e0aebb6f82da350d1a252be0b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2c34c17698faa2b5d354b130344b0c
SHA1eb973d19ba2b5378e0842467920d2bb6146b2732
SHA256d45ac7384a50923c038551c9f3b05f9393dd5944444facd6c3778d3894b62ea6
SHA51232e0038e29482facd22214ccdbb77e74251cd237f16e3130f8c6b2eb5d435e81a7ee6b4d1182d2e4c203521845ec0d8a0b4a2cd1892f5484bd781e6018bada50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ba4be53c5227c14537634e5acae5a3
SHA1b8f297d432614bd1be8732c2ba04ab8b4cc1e2b0
SHA2567641ff91ae58ac4a5ba4ecb256cfcd5970aa53a15cd998a9559c3ef17170c431
SHA512c360ed09a9a9f0eaa5f776773366bb11e4c34506b5f5b3256840f18fc8a8a5677da88a224f40c4ae8a12459643a812020674b87bad36f44cd2f7a285620e9713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c00957649d1730d8ec3a79b8ce08a5
SHA191915a9d67faa68856a8f6f786fe14c43aef8978
SHA256c1d94b6eb1d01d28e4e8a861b678467aed491a47501019f3345a66a1000cd6fa
SHA51236d70c0843151aa3736cc8a822648688ba365a379d07c9408a72583642b91a0ea4f0c12b52646ec8598eaffa5f4a1674396a5356b975f818eb015090d6d459c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc8746759a6c62994185b346def2598d
SHA1ffc8a0c5c3b6b6f4782392245ecfdf91da34cd2a
SHA25699536bf869fb82aee0511e54585a203b9f43b36475746839e9cd90ad4e19cd36
SHA512b05c0fc41a3d58c63ceecc02d4c705b30b36860314af1822423c4bcf037757dfcd26009b2fa6f6617d01eca65d50e16e5a5e424ec06b0347a6a998f58a2783b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563113f7ced074ee4035f9d5338064860
SHA189b8cca19fed4a52dd102bc29c75480e0ab2d75e
SHA2568153bf80d1f20fba1ad8aaf8df0da281758cb383aabeb801c1d9540f4af49a3d
SHA5129a246eb1242afcc04924877720a03e350fd43eb01ea43742560a7f21e67ad297b5023c81bea9d88201282f63aa08247397b167dbd8757d97163752c42575bde6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a532877643a78b24c46ea9806ca175
SHA198dd03fa438b045854278eb3e7a0c368e3a3d692
SHA2565d4de287876de46e2efa67819baab76550abc4b18a073bfc88cf30363c33a4c8
SHA51202c224a1c99669b717c40bece294070843ddf861bf1b1f6aacf2d729edfbd8f6d3da14f11096f975a4db19d20d23264bd492c563252ad01c0f5be23dbc63001f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880768f8bac80be768d76094cc23544c
SHA194bbb92af1148eeed0aee3be1ad5df945019821d
SHA256afdc7d877aad47687569657290065cf73985805985930f3a49655903630b1503
SHA512e719618ad34c070295bc9951478fd8b2ea781ea822321861f977dafb497fd59723cdea6dd23c09e9ee7d11f2f85232b334dd9395bbde370677e00bf8104a37f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3742b6b42fd3c7cffe9f8b32cc9e6c
SHA1ed90cd5f95c13cc4dc318fa3d6a67743b85946ff
SHA25660cd3a95495830f0c71ce4499c20d20c4de8a8937662a6b1645aa7d04e8c005b
SHA5126120beb12dd86b7efadf05b0fae00fd09e9b01d39860647d0f28e920bf8737d0ac5d328e93d27e95424e4ca0086115365576bcf0eaa52c29903d643505bb4b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bd529e8f980f6e04801bdb64e40c8d
SHA1a8b2ac9c4ded69517b3deaecf5ca5bc8f2564738
SHA2566b4171ec971886ed4ef7d21369224f0598a90afc04418249de6cd83dee8ece73
SHA512649a9cfcdc22cdfd28e16e7af137ffe0f5b8a403c4b1b306ffef390b419aaa76f17d24b69d49ac754d0a0729f076bf461b55572335a39fa0e5ec951107562e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687a447cdcd9be2a5364221bcda161d0
SHA1bc3673f2836111b8804fa414f53d2989f95e4284
SHA256439a0b3b39b8611e0e3a657cd554c48f5cba3558ddc0c1c5ab4ef715864a59f7
SHA5123ad47e390dcbc6a1b8e21bc81704d551db6ca7d07a70b57ef4129dd1a593bd5a2fceae1fce3b48068bc478633283d6c9fc5e59f65c5ec9abe84138f352ea4f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507d1e61c9e4455b1bae9105079369f0
SHA1418d66322d6ea025577abdd27a46c88b735368ec
SHA2561560a552a6cb4e7691dab2341f06f390ec96e24fad91d13de451586273f33457
SHA51214d9c97c6292d287112935c003b93bf7cfd5dddc46e2fce7327d0f82f501157a920436c458e7c10ef58487cf9ce73d8f3820d758857c3395815a0d06bdbf27db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb373730c36be80e2910a33b5f77886b
SHA1ee5e155d8161ad78988298ff34d0d7c87b1b9dd5
SHA256aafd69c5173f32326ea8dd33e0bcb5e8cf8613f8759f9f390c3a0e9fb9adcfbb
SHA5124b1a543a8455d8672983afcc4b68a31d0eafe25fa650498c4bb7a898fbd76dcab5d16c465405078c376090c017a02aae68d20d85b5b4cbc5dcc5c0bb4372ac1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b