Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
d367015b8e857c29fa24fda80ea7c48f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d367015b8e857c29fa24fda80ea7c48f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d367015b8e857c29fa24fda80ea7c48f_JaffaCakes118.html
-
Size
3KB
-
MD5
d367015b8e857c29fa24fda80ea7c48f
-
SHA1
d7687a13b9d8cce3bff8a1cd259081ea45a26986
-
SHA256
193a9be5a162cff15cda25249211bbc5282d00d2674aded0c6eb4947f83c62cf
-
SHA512
b265d7ab9f4066f072b74510f16d130913c00e575551fea816ec8438f2bf8bcdf709e56e31fa8ac76ef04d6cc5b771bee16e5a0f896a51716c882b4111fc45cd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431927075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000e68e4b4bef17cd75c05ba81167d23a4728a8d48829eb83f2a987bc76037fedf000000000e8000000002000020000000cea7dfd2c571f9bfd86a37b3a63dd5f370500e79b825ba3a47f55ca6d501ac2620000000757517b9e23c138c2293036f58311d4940c9424dd4bfcc78244b26ed4c19f93340000000c07fc5b17cd392dd1cc993ec607de157df6923269eac0e6fc1e090f74745b6e0eb22ea0b0201a62040741941cacc33cfddc16aa1ccbeba3fe5132ea2d1f6483f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0531b269d01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{518E30B1-6D90-11EF-999E-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000b7d13f4b1695bd5ce3709e60882b9acdf07bb6674d2fb258331d0827e7962f62000000000e8000000002000020000000ab731db9b3167079242a77d8f19cd3e2519a6c5ebf33229c78f8403eefbe5b43900000007cd92f294467c799653611a644bc9f0d4a42320ed07e3ab2c7352a05716c8aa69bb84cb8ad03e828fb8d721276c197064b0effd667cc1b96cc42c639475e059f244681c947e984d988c17659cdcea80593bde73a68698e9f425f7d5d128fcb03e7e1891b99c28e59745b13837efef4a979b8eaa2d4af30b2c3f747d4345032bff6227dc591c6e1c8101564a7c7ca206240000000de0ae827fecc606d3cceed8a68b38deb9fdac95c982993445a162531342f7a12247438331e3479f044f375797d8a29fa578fc76f953da9823b02597512bf877b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2764 2844 iexplore.exe 31 PID 2844 wrote to memory of 2764 2844 iexplore.exe 31 PID 2844 wrote to memory of 2764 2844 iexplore.exe 31 PID 2844 wrote to memory of 2764 2844 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d367015b8e857c29fa24fda80ea7c48f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c958629b5efcef4370fb592aa8f42cf0
SHA1b5d2d7d640e7f47f2d9e207b9202457030b7269f
SHA25619d126657e68ee7043f6c2303da98647960b11339bec6d2aabedc589afb5669b
SHA512b0efa60640a7f577ffd069aa978442a0f6d98332b318212a11a5d93f9d458864ff7afba67d9b10f44ef125b5143071ff85bdc1ae09c642e3a68ebc8e58660b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5698b6e2a7b4128d7a3b64817b3ccfd
SHA113a66f4fa7174e7c3eac41eca46759fbffa3d1c9
SHA25686fad900c32309a4e20ad0716023df3d572315600999b1991083abaec18254b8
SHA512557daf9639f0b3a8723db4be6c3562153c8be03c4a0149a0b07bc94b26672070af9078166267c8dafad93b2d97a03bb889dc0ca13cd53e0502a72b9db9e89cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e798774d49d3945d467b1acd58c6c979
SHA1efc3af716472d36957884d8f43dae56ce4a70c13
SHA256ea819d32978c6f11153cb93d828d1ca73a1fec08b01281c404204c67c0411d03
SHA512044be4a1f5e62ed720154cea250022541546ccb2d36abab5c9eb13e952450017afd2d6757ce70ccbe4ce1a28b5cb7b07998c84fa999cefeb053049b931b67564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ef5b1f84674fc91e66752729fe06ce
SHA175e8913c4b74feb1b872b2b5a874b614385c73e4
SHA2566b9f07f106a3b2d25b28f2aba8bc0d7bb16060273608518eee2dde91697c16e6
SHA51245fe6dc8c553adeaf1a0ceab8ccf0ea72d275703296a88cfb8161174d1fef31e6290acd2fc26ce4c3891bf646d06d59d12542e1c096a19475019aae8f5c5e22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3197d399f1391ca7cb23a52ffc8eddf
SHA1cfc9d9077aa1f61c9f5b36212872edcbb0a7af89
SHA256c2533d02727cc216420921e39693790476e0d4edec321107a3dfde37c0967627
SHA5124604416e6ef2bc5e7f4fe21a5e43cd52868d6dacb1e8bd902ef5d7cae0291154b1a1b83d311c78ea94366c5f42944886187db45d670d284b291563325c91c482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab5e11a6e5d0abc63c27120e92c3299
SHA1ae20d241d1ab59e17c2184d22a4bec47a9f28b4e
SHA256a1657e193735ae7decfc3e9bd627876525e89a3f0c35dbc1278a8912b6198c87
SHA5126f699ac291283e8417b0ccdd40a20c13f7935295c788f9d9221f923566b299e7005911eda1d6ce8b6b3a828c2858f7bc8cd176a5f127d8ef5484e06ec012b710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22919e565b61f2fb55f22304dde744e
SHA1cd13c79aa63374416357e5ab92dd2e7f2afd0060
SHA256e9b285eb1502d253fb1d69bf4edf88ae09dc92bced5d8a96947b2ed912e54228
SHA5125c2cd0c09837322fb5f1b2389ec1def866143974dda7d149b0c94a63ba6539ef35d5edde89e4df622258b9558a1c36473373c2e2edc07c4b0214d5a6029e554a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b874aeace3b30953136c1548cd4232
SHA113941f7cefb27ff39d36efcb5faab9bb124894fa
SHA256b6cfbc4bd1d24e039c2e4fd910aa28f6adae4d1e2f9cd595ccb59a41b530b4e5
SHA512561e9ef447db902e02b13f692a86d59037011be4624d38374c021f799ed684522292b72d23e8ae39d24bf5c1019ab48884952063a5b44bb2a419b9cbe26479dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e09b166a1d69b7f08c46e95c417cb94
SHA1e76720acca8abea1524e80abd7a6a38192b4bc0b
SHA25660c96bdd3f276da85ca98740b4303089fcadb4fa7bc8c2d08f396389a34b22d3
SHA5127ddef5cf4c285fd0707bc4a83ea675ef0447d5b92f607acbd00f7cb277b506d92e0b97491ee072a0cbb253e0b0ea177d40b3733d0c68a9d3304dfd793deeba0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f47cc8a571b9a6a3bc986189e4dda7
SHA1c3726aa8ea8dd8756fa2b8fe3b82ad99ce59d819
SHA256e1ba53fd7ece8621e328be28d5999d02b4079eec0e87901b9c4798f2a367ed5b
SHA512aad7f02022eb0c0a0c369eb8b8c1c23bbdb1fd07e6a48598983aaef95e1c5317d119c9dcf7e414495f91c252cdf59874b047c5f5198e506d9b4443a77884ecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be7cb0fc5c7bccab448d2646f6580de
SHA1c6ccd5b53d01220d30ae4817d19eccf838b1c1f7
SHA256eb20c4c521cfa09fb57af5236b4a5e8d37fda3f91d547661eccec58830b19e82
SHA512bbd91c00f60760b467f934a811805dc061932dfe2b20fbce75faccc3cfa601b445adcf981f1694e7739224c1cd46581e3b9b85ef5ef73a03fe71e3fe0ff5b4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46717072f2a95fe5b331cb87bf75b6c
SHA1e8c0c4a5c36787f53772bfc32d3c97f66c17e3bf
SHA256fc883f0a86f1fc036ad4bc108356037c08dac00cb3cd3829ff19a73f37191128
SHA512ec3d53da17fefe3d95990f528b5ab3a77e8b5e454b0761a67f28d53be64a77d46f569de64456e4a97ed0d0ad8bbd2bd749f63809ea54d4ee52dfee59fe8f2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516619321bab925cdf635a1a3e0fb1cb7
SHA17a41122cfc88b59682936d5165e2704b8c19fa0d
SHA256730e1f92b6e2dc2672cb08db591299c2d3029fe32d5e8c284c18474e48363431
SHA5125fcc768160f18b1c877cbb08ce34814299a0123a8b1510be6bf1e9c07b10f351ea68f871b220d36840ba18b38291f7a57a6b1bf0dac167c807d30a5606f8c661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc5190551b5ed967dfdb7cf2cdc4e23
SHA17109f8ef02b61fdd40069e72dc079de74a877b33
SHA256a9e186f564d45c84ca009de2aee5ce4cbd940d1f10d27beb370e3aa7ec599fa9
SHA5122de04bcf0e793e7cff99fc1c9b1868b72be4a08f794a98d170e42ec39641cdc7362c453a38e8d65e6ddf29a69b9c417bce409bac905f4e26726f6dc177492b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51035c934d796f114fbeebca65496ea9b
SHA11e5c86047c067c6ed38ef2dca5e273ce4802b483
SHA256fd31e9bcf8ec1c7204d66de3077e14f4acad256238553fe3170c54d543049504
SHA5128a47d18b634384608ebf17859992f89c46faa7d8aaafe7199cef2d1db5afbc5f455eb17ec8d65eb162d58e1741b9b555fe9d879c3b2032fbd620712b7e01c67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55753ae88c6d6ea3d54db0fecdc3ce0c4
SHA1a0279fb076ce93633d560a49b7129a086379ead7
SHA256d0c3c27c3156be3294eb6dec482011c1016188332a4cb4153291ef6b16835c22
SHA5120588b5571c816adbab7461a05d2379387a3b29311c20ff938b5f89bfd3b0554f9108b25629888ea108a2906e5cba3e11ab6846b0e5b6f11eb75f090ebc1baaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c352365d369768f37fa3ab75e809f8f8
SHA149c9922ff48182c03efae760d28da0a660c99e5a
SHA2564a77481d17f4dddd120e59d10f71ee123890bdb3bb9fde0d890d8d98ec12059b
SHA512f54c32a7c013d8bd4d3ec3ffc760fe07f366b3f4f5b04f713a648c3875f36687edd33bd152ba36b6fd70a1aae149a1b099b48e6f2243a7cabeaeb3ca91908e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6772b77b6210fe582d9e9a24a84cdd2
SHA1eb0dc117519fd9f943df51742cd6c0bd87b83562
SHA25668766753b7997f1d2edc64ff30f2b6db489d8a1c1dff9e49e89425b406971c24
SHA512a8a5597839352118fab429e2a4d2b8915177e1ddd8a44f39391e1d492b806aef59eee85bf58bb71513e3fd11e14ee3bd595348ad0d4f134e8f6a73a568656715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d66cd64b48961ff2296eff4a99ef3e
SHA1348c77b5610bdc8aa1213382a0c9ac8da31e0231
SHA256e2eca46aecee42a76768303113a1261ca5f16266cff9fc960174bb5caaa9eb2e
SHA51290a2b9905a10c6777cadc0cfc3a21aaea663442d242e943234e8fd2d446201ca4ae3e295d2f25441b8c7205742338c0f91907a4d7e38006f2ed2f4409cc285dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b