Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
ddf1b2149f073397308161ae2258263d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddf1b2149f073397308161ae2258263d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddf1b2149f073397308161ae2258263d_JaffaCakes118.html
-
Size
6KB
-
MD5
ddf1b2149f073397308161ae2258263d
-
SHA1
189533db7bf82c5859094b9d80010ad196511d87
-
SHA256
91b9730f75d37dffc323cdc0d55837d9abed81703a72903ac294b752fe5d676e
-
SHA512
55589456a41354915311b7302669a42572c5970b86fde22f68d2e83432f68b2a2eca0d9cdabc7d43872920507ad6dee16830406775d46b8217df65cd416c0458
-
SSDEEP
96:uzVs+ux7pFLLY1k9o84d12ef7CSTUIZcEZ7ru7f:csz7pFAYS/vb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d2047f5ef197fc20ef4170d5b2611d20d2ef808fcd24e84ff398ecc1ffa4feea000000000e8000000002000020000000c0a1129acd06d2843c3797f8bbfc5cd169d3af71264d275723ae10828677f0d420000000476d662d36f1101b846283af22a6e7ade067295cd6c43415269f6a3b314845dd40000000fe9cc689b6b855ba5820881b8307eff7ce9dea96c6167e141cd4362b1c9b8254e3fa388a847a8b4462b516e067f6985da781eec83201bf141abd3e7c13a5c12d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3214081-71A0-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432373998" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ee00c823113db7a78feabc4ae44e9f6614ca364b74ea629b245b2a60869c097e000000000e8000000002000020000000818798bab034b6c816200f67a07d3b727cc89b2f3bbb09c16f3f5919054a82b790000000d75e80d4f80c75d9f75ad1cbb607b26b97ec6d3f90f504b6e2ac12a7dc223ab87d2885046524e10be740985cff62e8bca7afa89561115a0afd4bedd25cb643f145c39a34c444a4875e91a9e6ee412bd8200bb0b60b3165c0e1283a13ae394f29e05dde94b12bfc80d3ad383589ba53d6b88464899fd1bc8b9278c95404e31c4e50e415d7106b29d5b098a390d71f228f40000000febd4592237bead2a30a0f2856e2e959af06f2de9eadad9e52ce2ae0d94a6a8d12de9444de3e39f9fff7eb354533d25c3129409861d60af6428eca24f9325a89 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002b49baad05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2408 2108 iexplore.exe 30 PID 2108 wrote to memory of 2408 2108 iexplore.exe 30 PID 2108 wrote to memory of 2408 2108 iexplore.exe 30 PID 2108 wrote to memory of 2408 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddf1b2149f073397308161ae2258263d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503264b67d5a26c783d64c43c82d1af25
SHA112ae8f5bbb11798a009fa29f11065c36f101cdb5
SHA256918cc7c79f2d1003422bd0d6a94b5404bb640cff56c29f901b533a99b4a45571
SHA512ebfe4f3e0dcb4be509f782fa0667bd77cce1abfece537353d1e9b5b437698967e18c1640634bbc6b72c868a41eee71374647d7b81d2c4e6ab80fd3c75816f921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57508ca75ef44355085654a2369b99adb
SHA1eb913c8b0ce54959148a822e7cc81638e7b98a15
SHA25656ef18c91ae16ed89f4f7b907a2cdc451678b782bba3c6602e58109af157eceb
SHA51245e082fdf82ced9b617f03f271f0c6b3ab77de981345e187dbdbfe2173a5b9191940eef57ebd3a956ef660c8a39aec497a488e18abb22ab44921c41177ca08e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da1809e5f6178231f9449793203819e
SHA1ee091d4c506f9cf41fc5d2531b5f6537ed4e5352
SHA25601f6170071d5faa3082514d7803561a06611ba124eccd7e09df247c6d0fb3bff
SHA512bd5294eb234d894ec01814bbaf7c8fc53e76041c68e7a7032586d5d2b4cc8a3ae02c59b65781d09b1700083771c0bcda0aabdae62e18f7968601141034c204aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a11e968c9eef06455ca3c63a086e91d
SHA1b27fc154131b11c9add84b2975949861bfbda175
SHA2563dcdbe1d115227eec592c53f88bf0f0de339ce43f5871da85db62bb163bbb68c
SHA512394cfe0e489af2227fc0e5ceaaa5912755920286b07e03451f9e208c5e5ea0aa270508feef80b54e305e9ee1843144949b5a6b5aa2e44712e641fa3c86914209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bab6a57eaa8ef77304cc62466c7c7bb
SHA1fd5173fddb463a01d1e810e5902c0ac29f95f4ec
SHA256e7f1ad28da740e685bfcaeea2b9bcd14c03a358d969c0e08531c3a12d9585d07
SHA512bea42139b3d4dea1862dd1a6c29797ebf67903d54985824971b0ba998a479704d48313ec72bdac41465b83a2b990645ef4797fb3cfc553ad81f7237abf81544d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feeb12beb110f1e75b8955963c707129
SHA1b211c2ca99e3bb7ade74da84aec6d5e0b513f1f2
SHA2563dba30c9a49b23952fdde2b5c8c10b11eca5a0edd2f3322ef8491f1194fe79d6
SHA512efae5577f14c57e6ad34b208499be1e1fe2a6eebb5df7637e6fb0a0dbc1495deeb8cb259967564b6da3e8b3ab765eee0b8da14813e4527460c360a1269c9d8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048706dff5867549e16548f2a263f495
SHA1f7ebc469878cdb40e327862ec354909368fcc3ea
SHA2563c9a465e19b2ab563a6c7c039d129a63db22059063ed2008a87b6fb6e6216c88
SHA512128594f07e8f7fe93154bd09623eccfd6727690d37815e95968305388910d8ada0675b4cf94523f264ad734034483d8ddf3c02095b3977798dabb9678fb31ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c8ac59c1da0632846028ae5e12ae14
SHA1903aef1ff278397aa93afdd38d93f62abd05ceb9
SHA256ceab17f5909de79176aff4233f5119f2ff70dc3e2b674b66f6a67dc20c29ddb0
SHA5126947e55da65f47dbd3c1e1785c6da44f3713967771b4535be0c4a9153215848e1883d2c32ba970bad3ab647e2eaf3b346b130e4473d37ed532d4ef6e252a87a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4fcbee80c7547e9dc39f8d36305dc9
SHA1e2577b1f72d34e374a14e8a72d1dea61c635b2b0
SHA2562cb40b293b421f3b180dae2c3b391cd197833cbb54ca447b4f47cb5c3500161d
SHA512701b1832b55dfe673e5b5ca7eed4e69f55f2c3e95ff0cd8831bf49512ad04d2ef450a62c4ea5136aab874792462b2287f5a72f930bcb5208947b5e130b20147b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed2372046ec34d2bbdb73298e624655
SHA14e052d15904ab4f032dfd35425a20fb4a443b5c5
SHA256e47100c388dbffe39172774794db0bb6b1ac70b85e4efa5f773fe02d15f95c1c
SHA512f2dd05058a9a668a7819bdc8376c50153f1c7eb912c89b01db45578f55dbbb11290ee78eb927ea4553f61625bd902d6b2616a0f62ce7445cb3be695cd84e1feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3bed4bb5583893f959f6de356a6714
SHA1ac986f8348db44b1a5b365be2ebdb19c771f8431
SHA256a64ba055267b2c18c9570236b52afa7dd7a9cc3c04c5e921675cc1f80587fc99
SHA5120b132fd13506b8e21c833b08ff31435757e37ed58481e388a7d6356c92230db703d6a8818769fee88ab8cb72b27dea5e5c1ea896cee20e842e08aeeb5c218ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2ea9399a2515d58d849981bd9b32d0
SHA1e0868edace4638bded3e8f1e3610487ab0bbccbb
SHA25687f8e23e8a0964c932c149fb0e09cfdeb2c0e60eee02545f9e2fed0a4d9ae2cd
SHA512251b10c33ebd07d0d71f76d2cb406c537bd85be31ba2992bea8957204d75b1b5db5ea6a76daa89ba21fa753eda9a5f7c403870c783eb6c7259d40dac33e47dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6770ba9b8d3b28823d674ae9ba1f3d
SHA1821095626d948cf7512dd4a1468b4d6f601fbee0
SHA256b5bbd1804aded3f8c31e05230e84a45eb130dfaf56abf00fe1d17223c10a4a25
SHA512d52e670dfb112aead6940a9e54c148448704e622bc6a0501002dfc993b3fec65db086ae858fa955c5ec86f53cc02f5454f91ad94590f21b5d74312e5ef9a7d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b149eabdeaabbf818a4c478c6025015
SHA19a2546d7361f3112f2db98bea8c613671d8e09e3
SHA25675815ab68ff79e898dd44a3fb85ec13c2973a9306bc53fb1b8279ed87a0d616b
SHA512b79a7fc50fedf5c90fb014dbae2f6fa60c8aaf56952cfb28b5f97fadd20c86e5e58018a6e234fe92c3e081327ee9460dc455dd78b5fa2bd109ce7fcde21e5c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555779f84e38af8381bb924d64694f433
SHA186c65ba19ca71ba9737323cae46eb2a6552711eb
SHA256bc5963110b51228ebe9499927a69bfa2430b5a7da8a71d709f920796bb4f4a17
SHA512f869cfef0eb0c5aa92f9cac0da6b4f11d9a3090d1c7ca67ee5663217f41ac2c1247584e9d8430c91001b23ddbc78dab027707eefdf21e7d78e36ba908e861fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c21cb30323ef3432766c797775566e
SHA114a90a3d5ae28209dd023fe4afb9462a3296e2b0
SHA256139693c8eb028178e303bd335b25cc6a39582a455d6b36ad9c2fea606997f217
SHA512b602fea174aad16cfd09ee52cb759e4aa75b71c9f6654dd14e6b83af5703a180a73326c3eb0252c5d9a4bb5f8135cb161ba598640c8685328da836ad24263df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd42b5ed35b2df568c6f81a3eb37dc7
SHA1fb3e99d2970f4f411d7d8257d9b0601d3479f540
SHA256b06f483bd356cc0671b4939fea6ec949f11ee36933ee36e3403ab0044a7f0a32
SHA512d91d7e50211bd38f6119d3c6996b4a9206f3250a52fc1ca07dbd43c30e16947829a1a02aaf04ce9c09b514e441d706da42c7722d814a2c7bd33ac10770d02d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54533df749e00259aab1715b7f8ffc3ae
SHA13087a8c5c7b4f93db5cda47bf66813cb6cebc142
SHA256795bd705d16402a73fff3558caa8754f1c1c8d6574217a81d3a77f1e354bc713
SHA512892707bc70a39e5f1bf47f216e5f76bf883a371cf06fa5f4042b96d1cea75300cfc03db8a8d7bba172d7a906546b8e494fdbd471e2a569e2ffb80880c2e5990c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c7601b9001469b637997cb853d8f62
SHA1bad31145ec9173ad491bdf2cdeabf2b25d7831b0
SHA25641dcb5fa11f5cec4522ec45547b71e857eae7f1bb6c3b38afe25b1be8a5884c1
SHA512f0dffd1b3e8f37ab8af3bd5de12ec3fe0d0fbc31ddcc9c2756decf6b91633e8dc8261d0e57477973192556c84f5cd158c05a1d41973f5a85d681bc45bd21c074
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b