Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
c274abbe175c6d3e47eeabedef51e790_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c274abbe175c6d3e47eeabedef51e790_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c274abbe175c6d3e47eeabedef51e790_JaffaCakes118.html
-
Size
50KB
-
MD5
c274abbe175c6d3e47eeabedef51e790
-
SHA1
b1cf3269f4d965bc5d2e793b9ece24cd4f03b903
-
SHA256
9e5d9c8ea50a91b892c87f7b3732806371e4148029f8c2db73b7eda1d8d849ed
-
SHA512
033caeedcd98907339fc61f4b0495fbb9a2acc4a7d6cacfb04c1755c8ae1c1ffa0f5887497f230ee9b743da2d741671b98447fc9bbf7633815d9f1b8cea17323
-
SSDEEP
1536:ibcGDtJsWyTJsJ1BJskL1Jseb5Js0PVJsOTBTJsOTBVJsIuRJs645JsdGh:MNAg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A965BA1-6374-11EF-8FFE-7A3ECDA2562B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430815661" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000000aa94b9a6b6d0b41912017f50ebf84603825cbdaf83009449f4a398d82e909ce000000000e80000000020000200000003a8cca489659c7147bc2763fb771684fd2154fc5609d490f848fa3817b4732999000000087853055f9bfed5b98fe79a4769162bdb3d73c5d39a6ea42846f0de2db0e8d014d2448ce014b29dcebd134201fffad019a9a25dfd6148a6a54ad39fb4a39228941d4030822ae9bf2e890edb9278c399480bfd59fb4f4952b554c02758060a536e8255da5b68e5f570ed61897d657ffe92b6499bd46755e4091ccdaa5290652189a4e2ed7dd5db25ac26088beb66156e84000000060b90afcec7b5045581f3b9739fe2af6b734a373e38eb9bdb28564dc59e4e5189d949cb43201f191b1b806a5cc87b340eb6be5b16a8acd077b6438a8a957bc0b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000259d4fd727618ca5670321dd92b3ddb0c2fe7ca167c597e9562693a763268ff5000000000e8000000002000020000000343076c11e131ec76a851cb5d75a378920ebe86f4cdf34c78edf5411568e3f1920000000027fa5567294a5b96124b34df1696e1b905bdf87e19f9788d0f473198061724640000000ae1920ed4c7e08bfc710096b10308b3e41e8ef3697c72feb77aa7fd913826c8fdeaf211aa7e7c5cc7f1b7d266a48e0d3f27b9a00f9ce52769887e13052f29651 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709d5f6f81f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2824 1924 iexplore.exe 31 PID 1924 wrote to memory of 2824 1924 iexplore.exe 31 PID 1924 wrote to memory of 2824 1924 iexplore.exe 31 PID 1924 wrote to memory of 2824 1924 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c274abbe175c6d3e47eeabedef51e790_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554ec8e859458771151052efe475b9d78
SHA18007c45f69a338408879b1631ce31bb8d0f77dcf
SHA256c4c864d29664f5b903a809cbb65492c2f24900675a2ca7d743f5cafa6b4fda3a
SHA5121763cc97428492ff69a2568ccef8135586cb2b88ebaf45b15ee89a32cd2a73675d13ab8552183eb2faca3c128003146d108d2f82fb74685817ad4e4876cf91da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54510a8c588bd7272f9e3ff216f44a130
SHA1b061d596f5739c7d0645232b0066deb7636ba5d7
SHA2569c60f309437d52b5f047004723b43520290d154db24a4df37f4b1d830e0c8bb2
SHA5121a795432969db6f48dfbee0fed3547d7825f4cebda4ac5dc9779f8000f3385f1419e9eef9851d127f420e07b5f44e775aed55fbe5688137285327930dadba4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5533788060a8216414a609da197d83850
SHA18eb19d88092a537ea11b1377cf398d7574c6128d
SHA256b8b6ab63095d6ca25ce5304dcc3ea3dec396338b6316c4ed68fa79683b12c5c6
SHA5129e78882dcd37410ecccbf0b3fbba1bafd92e5d7f3e6964c0d3c6696cad7bc91493444fb809adb2eb0362e15f19f3723b77af59e77904ad07c7b667ce17f31f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c907112bc567259144d83d54e9cf300
SHA11b1b20b0568f83750c3ed5129b935274cd2c3dc8
SHA256a23d4a221515b5ae406dca09abb806cebf2e1276bcbffe0aca8826e3fb1dd469
SHA512d7014568cd835be7b1df6111c9b47a9b21da0fbbc2130a89e292f5302f1a4b6f8680df328dccba468086c93bae406a4b8ad25df734454748e70d64d277c900c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3a732c4880111034dab8e904b0ddc8d
SHA1423d630ea8d5e1db9e9642c9b801cb544f13ef20
SHA256de9d3c7edffe0e2bf0ca17146fd86e4d8cfabf106792a6f2b834b46c5b19860a
SHA51283239785330ac8ac9989bc15dff57813045b095ae93458d12a4267cb443b2af015b6b0ff2bf93ed3e68667e58d7b05b6a01fe8041a61ccc47df1a2dd56664eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fefc8cd7e5b1248d7d19dac9c8a46a7
SHA16c5121478453b1cf5ae0913c47f77c1e094ffbf6
SHA25690c29481f81f12b7fba695b122995a7e1fdd6c706a1527fecfda8cc48cee9662
SHA512ccbfcdf2574f92d6b60c4ee765405138fce59a5e5a9a68acdcba3e39ed8721d9c8621e34d376d41b757e5367671d5eff3e29fda9547d26a79a0f226543b5f92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5412a1f0477d2f98bdddb16000dc9d515
SHA1052628e0956204078842682f27f80641da8485a2
SHA2566ca737320dbdfd88ecb7f727819faa998dc20ef3b82c0b53572b3ef12201cf8d
SHA5124a8b299a45cf61fb0496e4509128d32115eb208e0aa86b056dc68b433cc91b3c93ba49f5bc0ecfdf6622b499a99d257fd5d3bd1c302c023acd3f2db037dc16b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599227469c29a5e5235ea3f55e86b4bb0
SHA1327e4a5e467919146a15798702b6274d9fc42f56
SHA256b1d88c1d04d223248dbc1feee2b13a20581712b1e6682546263f8e33cfcb74fd
SHA51214cf088a47ba20b26d98a37645faf3eee87f806feb3de191a4dda80de8df993acdb80a12d4a530dacc7b9f230d8492c01ea695c7905ad4a4d20b6e99e9bbb01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df22a24fa7922660097377c8ae1d6797
SHA1c21efa88bf8ba449fc917fc1601cd0c2c33525a7
SHA25669c0df73ebad802437ae0add81513665381dd8131a6cc267f0d8159279c02cf6
SHA512c363ef2077caecce8c23986f32c0b03aa412ecf03b36f3eccd6bc9c111d4ff1dde4d9430c249e329fab281fd4a55ffc36cc6c16c6e4a0d76d8494e69d44ec772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eea67d6ea91d9d196c64c93ec95f9643
SHA1e747bc444a50bf793cdce0427b8754b8da0f219f
SHA256c42dd60da93db033869d26380e593e7cbc7dcce00b7c6dcaadabea263b9c6bec
SHA512c7b29bd4b41eac526c76b12e6b5d394b8a0dcff1bcf4d16d9c2f0c397663713b8f35c8ae68aba4ada6377938e2e1a827ef3fc8435f462601a73371d4a0b76c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e4ff0f1a7c310771ffe0e205f738fca
SHA1d8b33e4d84aa8512d0a4254d890bafaadafa9cd0
SHA2564be47074bbe65cbe78de946da99cf16bed81cc7ee26a09af9b910ea4cd58c1dd
SHA5122b9f8a4ccbdce2d8c9ddf26226af304d9923f2ec8f6e8768fca2beba8b1a324ced0a6371f823b6f8064df3f5110af80bb94a2312d89abf5b85e7bf371e043606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53cde65a52ed2b0fa6960c2ab11f17bf1
SHA1bf315b84311a177bc2d2da4035b6f73d640b0bca
SHA256ac53fb8cab21475691fcba49772fee732835e9e80ea0759090b28ca2c3edf8f0
SHA512f2b30006b7a82a5e369be38c9e34f3c418bc6dc1249eff1aac33fbab74847ebff692073eb87afdcbae1c536ce7c19e8f2687fea234133fae287fe57769ef1683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5428c9e473547427128d62e6b3272b6bb
SHA1829302e28c1e1d8f6ad64db29bd06464dddc6205
SHA25637ae8596a25cddceecc4308103eb44a2bf1adf5fc7384a900cf47f28d618966d
SHA5124af8afccbc7bc290512671294a653fe5728a6cf7f620a17417634aee7e0794d46a7f710b69151de5272c5debf3bd20328b00b82b89a55bbd063e06b4b5fcf843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50125d30783c53de1ab5daba7adfd0947
SHA14d2e66e0f74d7dce857b6b6c8164b9faa1ffc417
SHA25643efe75d4a5f90e6fc106b89615d3ed5617ca6621ac3c6b200fd2cae0f122d95
SHA512aec0a45f25464a60a9574025fd996c2beccd9bca44b299b43903599765a939bd56793641bfa236bb016e446faf853362c12fa508eb9c6c0b91dee25415214c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d268dd97d91126c47c056bb17ffcfbd
SHA175afd00d035305715772a35a098afd6fdd356c02
SHA256af9bc82ae4a2121adc16935e99945744bd4f789c8a0de0025eb09cf9dd10fc08
SHA51207fd19eab45ca9ad060629ec853d113da77ee639c155317d01616bff926de16db6999b7f2df5d8fe3e91fadbd27385cdf68487d00dd03a8198332f7aec91dcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d021b1750bb02d08a9c5cb735916593f
SHA17c195d20e4e45fcd7b35843118e3ae8b38ab8319
SHA256501d74d882f934c9c7529997f0779aa79765e386f85931a2bb5c3bdec58d4968
SHA512e0602d85e2b7a352d89bfddb11ac5acf080a6c6671eaf682d37e0235d093d2665b89a6acd0f04732685897f2dd9825783c42a36ef71dc53495df52c9afb452d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57321344022fb4eacce59c1c61064e64d
SHA18b4ebbc5072b9a0c4ecca43aec6f85b6ba2cf970
SHA2564752eb56ff305737e89ec5f33831a4e51c7eea298ba25e650d66c955c3db691f
SHA512afe6da43440f7e3cbf1d7dfbe7bfe133c5928685e2850fe75d4271d780b47b68c8e64be860ffbcff81f12554421922d61e2c70bdf87103e85e8b8c4ba261a15e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cff6deb9eac016b802c8f972e256c91e
SHA16fc8829637f26db37eeba8370fd4a265eefad94e
SHA256449cc33b84f6cf5007db4c011d4422ea3617fcb2effd7a2df84490524e81c197
SHA51265df641ec0d37c5abb09507b5b4b50c4e6ec1c4104596bb7424388494675ac97ce02379ffab9354cede053359269c4128523b56145fb475870831cea32cb6044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c86e500d8ec3e055f6033f88dcce048
SHA1c5b586212b464e2d604e9c09fb04356eb58f2319
SHA256f041dab91a3e62bbac0ce54ede9355f661024204a29fd21183e42dea05b8ac1f
SHA512b6c60197131dca124cccbc989e71919c8245425ad674ac97dae3542e7eb1c3351419af1d39450fafb71836749ecbdb364522fd6daa0cdab219b47c288ca48d36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b