Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
e08b7cf32de352fe8dc3f394b049b062_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e08b7cf32de352fe8dc3f394b049b062_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e08b7cf32de352fe8dc3f394b049b062_JaffaCakes118.html
-
Size
17KB
-
MD5
e08b7cf32de352fe8dc3f394b049b062
-
SHA1
649ce06da264099d1b1f30fbd05d51b1556fe296
-
SHA256
67ad8c7ebe73f6f0ea42cb268a3df6abf4fb89865831bfdacbb3a4700c22a2d7
-
SHA512
1f5671b8237d48b7672dcc51865036e518ca7e86af075d52e12f8b756dc0289e1a559b8bd89c0e7f306b6c701a5ca99a570b05a8ea97ff057c1d0d2bd5929601
-
SSDEEP
384:xk9u0nhb3pp4Wjgv6sfOl86zB3E6502wjJPtyPQ:xklnh1p4Wj06v+er0VjJPkPQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001b8f1eb46d7b9ef3bd09f9c41f515a4cdfa79feb53af8e1364e67ef11cc6b5d8000000000e80000000020000200000005cb5d1b6e5109b308939d1d34c1056b09b33d4318cf7e4b5b335d00190c0370220000000dca343998966fe09953db8ce7a062b9fb0ddd81e6ea44aafa275b23b712ced5e40000000f5ef845e0e843dcdd985c686a557693026b350d80adf96d995971518b7122946a13d95d2c0404e8edd423e2d76ca8687dec1c80d98f75e6046206e97a86080e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8CFBC61-72B3-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432492091" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6040c8b1c006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2200 2460 iexplore.exe 31 PID 2460 wrote to memory of 2200 2460 iexplore.exe 31 PID 2460 wrote to memory of 2200 2460 iexplore.exe 31 PID 2460 wrote to memory of 2200 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e08b7cf32de352fe8dc3f394b049b062_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9b13d3fc287336c90aed8d7f5215df
SHA16a5a471121b171a53c20f3f91e88c4a02d51ddb4
SHA25635403ed4e1f604c3dba42ed970ff257af79073b47e8a993fb9fa4f1c8bb38dcf
SHA512943409189de33fd5ae2faff0658394097a99b8b48c270968216aba334a6c08d4531703686634e45f070600f1f7cc541a7ead195f3f034deacbbcafd9a20f29cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b43a8047991f57c7671240698d627f
SHA14acc1384066929e1bb3a71d1961ed8c70c663fa6
SHA256dafce52d8ca049fa271d7e0139de7cca62fc3a9de0cc69e6643a8e7575c20e55
SHA51230d2184b35051ce0d78dfdc8b99b0121ea74250c7a21d34f5bafc8a7b6476ca8ac9c27812e41ad40df99676ef4e64967f997b221a1b1d81f34899ba270a6a88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdd36cfc0d9a9f8baee0ca8592ce63b
SHA14087f5bf4f57f70c91ad3a2ccd6056a1087e2be5
SHA256d77a7f0a229884e267d4a514a6131c1fe286d90ad94263e406606d12771764dd
SHA5129e55a057f309f990174e0eda051ffaac37ba3697b4cb363f0d87bcb13ee882f1f234bcff77a9a994fffb5fb5d2a4419d551f8e5ecaf78563622b81bcdaf75a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224044b1597fa9936d1821a8426ad4f8
SHA1ed53ab80dd4184427cac64470d4cedd27de5d94d
SHA2561512475217c717f63ed6e33212fa7b0d794683bdf2a1bb7572ca2357d8460e34
SHA5123a2ba24c0129a14f77fdcc79b0fa12b1e52995c28867c428e38f96127589c85b27dc20a69b971a08f80267723c85f7b5a0805f9afb709974b51076a096e14de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598031ef9df5469330ec7aaff7d1f2eb
SHA1103f5eec5d9ad2d10d58eae67734807f99a9e5c6
SHA256504ab63e24d2efdb28f01caddae8c26f0aff8fbe25100202ec7a8a7a4d4535e3
SHA5127599039da4b194a402d2340e41956a9e3716d5620a5f1c017d0b7e803fba1dcf16eca1f49cd3b17607501e1168035fc2d491accecdd000193c5a808972252347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce244190d3d75517022fd57510592621
SHA1ea456f4cf26b9168a621a53c55272facfffb328c
SHA256b878bcde70a4bf2bd9eaa2599abdd6eb4b894e693c5e0722cae975e45e6080ef
SHA512b8555f4f65393822539ee6ca0a3a8cb01ed1496c2e657cf8922941ed8f16b23103842042c2b6c37c866a413f9dbcf8bd774e0e8ea4c995c9f94ec614b9e305c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e11864c98f91522ff3ace52116ace9e
SHA169d47e096f11cf351c9e77689e7901032c9b1861
SHA256fb7941ff45d427b21b13013b108aa68a4c179b14a30c5118db8d8539d3b46dbe
SHA512136728f3d2c4cec0ac02d4f5f1c7572f32b510918641097a4923700086f31484a8821105cda6c7fa8d2e7bbe57079204afea51bb6f37fc05da4f1119151c80a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02b1d2dc4f8c884dfa68d35e9a2b86a
SHA147aac302c0d0e761ff71150cf275181d60de63e3
SHA256bbc265b7feedd89a3481e19d9ab4000ac1e0ecebaafe10972ef69d79062a6772
SHA5128f4a5487cc36238dcbbd3d7fa331eecf1ee0cf0c764a09c716c0db39612feb745f254972714d567e29bfefb44bff9b84c3cad1dbfceb8ea48621e6011c7bd74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1dc78854ed98161fc3eafdc6e4dcb0
SHA14d5255f875d08bfcab4038f3eabe43e9fca509d3
SHA2563bebc4d36f305daf323a027b41db8e22ce3422825328595ded99f41211abff16
SHA512c5079848aa6cb6ba8dccab0fd097d68e01c1651b753805ca6fd87870764492bc5b1290e1fbbdddca5f9cac426ec61566f8783728f34246d31281184dde1ec12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ffb5fa04db24f011302317fa8831b7
SHA1596354590865d5b4a9147b637de921255205c026
SHA2562798de107ab554883abe29bae5ced1ab1c6119fd9ccc0df8a3279e5c1369fe2e
SHA512d25a03ab00d0a1f1a64b10fa11ba8b166c0a3eb46151bad048713994724c4d8e7327217b0f3a00758559d315cd9d32d672d6e3287d0f9555cb7dd40699eb9ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68799bc4080d7085b81d999a9ce94a8
SHA1318cf3b125af71420307b09c5c86de3b58666f29
SHA256af3eef778b24d1e67374706b0c90057ae12574eae375709b5d4c4ad9519338e7
SHA512569c04ff6c98ee680fc8e2ceaf6a939a62575754c81bf91c8a9e6969e2a4ac80af85e83162a555bb2fed06f44104022b79341083474af6476b0c8613afc9628b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7dd551603a7ea8cb5cbd7925acb05aa
SHA1bb3c34f3e6e128eca45bf18e8f54754c73174347
SHA2563a9e840ba26b0f5ce37a923f0b32c9e591b9f4363bbaa2b08f9cf8c706983740
SHA5124298d90deac1644f85ae3b552ac625c53baca7e9a60ceb412e784ca8a59af487b585f0f3d4956c77de10289938f4be15df03fa83c1f65a58922963e9bb93ec81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbb176a8971bd7a3d368d0365d82d10
SHA18d539d445c35c040da54a285bedbba277f8ff5c0
SHA256093c58a826bb7507e68cae7ae4417ee8e187b1b6c0596d5df11e0f3be60037c7
SHA512fdf9ff85367aaa218b36e41778ad9831a780ce4b8ee577982e8c25acf63e65c935f452bd64b98c3ba7fb3dbc8a36b857648f23e09d9ce3d39cfd34c894b0c5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04ed3af6cf71714d4956d9c4a2363dc
SHA1e12793d80f21413a8e07f1779dc02467507675da
SHA256ced08cc5fc77eed0f662888965bb709301c7ca2eba33482d8d87774e633336e4
SHA5129b30e78fce985a8a677c0019627aa22766890ceff45fee20e59f665e1abff0805029fae97a7575b2a673f32bee8f9a24eec6517c906b65d953022e336daa798d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce751adfea6383f91ab3adc02b872c4
SHA1df529ce8a874a967233ca33307536a69ee78d415
SHA256b2e6443c9e83cdd33af46501e7452e2d400d999302e92f215693c184a5924e5a
SHA5125a41b28ad97270fdf6fee30bcca3bffa2a0c7a7ce62fed58fde13a3f30a7329a6b708fbc4a73cea1d006b817d7a35bcf0283668429e3fa2de2d6a3aa01ef6f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608d7a2dc96a6b730d70d88bc75fb0b8
SHA1fdbe0d502f46aabdda239727dd0f34820127558b
SHA2561ee250966938bf47672cf954871cf8f9248911e852444e6f6f15dd7ec0d67993
SHA5126f8d4905a5100c23e26577dc3536516187baedb45691222a3220b61757fc8dc3f4b1fe45e39239829f139e7fdc50b7ae46053781bf8bc60a1112c362176a60fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653689cbded1a59d5b0c73dc440ef33b
SHA1914a1417f8cf319621164f7c11bc3f245f5ef18e
SHA256c4c58221deb6a120b17ba8442abcfff96451cf99d44e9aae16573cea46cde2d9
SHA5121968f3e6aef67412b63b33f295160895fbf8ee920dcd691505836dda083922dfe98719d9ac28d09e1fc40c106b295a64bf4bd1461c277e444e5eb3fff081a2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd5e5f1cf5d24e269dbc4491e398de0
SHA1be9ed31d71a83dc97c17eb55ba99ac39695e46af
SHA256452c77b22a8838bebb55ac473bf7771ee0bf244f22c213d43bfbb3770817f58e
SHA51288bff879e8c9b5b84c7145cf9d49132a7416916185e3f92a09d454b5ad6bee422a60145fdbbac832f78a21eacde1ad3b0ae4829ac60d604d209a9b9c1b661c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fd48d838228c9c05d46d3d9c8b5333
SHA10172d26da542eed7b4e7d2dffba4f728a4e290f2
SHA256dd20163ad5e741355275533ec1280cab8e90ec86726cd5feb2414e6309d458fa
SHA512653dc34e5fdf291f225f0b0b9b3070618e46af39bc7d3da83571da7f832454942e5fd22219daf42c25d717712c84d3443ff5abb817921b71f443d6406c33bb4b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b