Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
f06ef0de8629a6c582fa60ac85063b5c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f06ef0de8629a6c582fa60ac85063b5c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f06ef0de8629a6c582fa60ac85063b5c_JaffaCakes118.html
-
Size
1KB
-
MD5
f06ef0de8629a6c582fa60ac85063b5c
-
SHA1
33cca76328ef608f0fc296d27ec1ffc8383ab122
-
SHA256
b70e12ed49ce82c900fe9aff3581d5f51230e03785b3d247bc0efb734b0fe87f
-
SHA512
189a2a75c0e1419b151965bf5a1d05c286adaea116c4c0386eedf616d630ba27ededcfb1093c9548a67de139975d785fbe79c6529ebca2e30817d32fffb1f736
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000029a1261384594cf1674bdf0963b39e8b99eda9b5aec0c9b359d8b9418acdcd3d000000000e800000000200002000000053dd77ce66d002458852419012df27688165167b0d3adb482450282384b2529420000000739fc09a9b854df3ed106ce4bc3eef3631ab53824cc97848f7d48d559b473d0440000000433cabb64a00aa4da7b1b7e828c7b0a91862323feeca419b45a27aa1a0259b0a9a8e6b323ae63445e85426694fa8dfab37821978796b11cefa01846e88c5c87f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00ec619570cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000881781c8bd7e5b29854f2970b0b2ec2c993b1facbd6baead6f6219d586a956d7000000000e80000000020000200000006be07249abaf34ab4c5dac8e6806fb50aef7bee1a229503dad8d4718d9620495900000007c44d1ad7ec1016dfab65abe71871c0a939d7579f46e1b9e5a355ce69c6d31d882cd98d003c5956f1178c1ba5be7f8532c670ab3f0f416c143b6b974d19e0677c70720805a5a1bc96f5303006a3938d03217d44b4c97bfa7e998ba963feba4bcf3b6b0977c3815b5d48f84ade908e04f70dd38594b41de3d8af2d0a530d80ce4e4fcef6578a9171837c0fd7ff8c4131e400000009687d3af66e907e8da070a4d2a806063354358db5bddbb50729970e04fe2e52b274bccabbc8222b4fa09a100c5c1e1aae19580375d0fc73577ef810901910e02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43534B61-784A-11EF-B8BF-428107983482} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433106450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2560 2968 iexplore.exe 30 PID 2968 wrote to memory of 2560 2968 iexplore.exe 30 PID 2968 wrote to memory of 2560 2968 iexplore.exe 30 PID 2968 wrote to memory of 2560 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f06ef0de8629a6c582fa60ac85063b5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea9fd0cd11eee46ecbe34f7d901938f
SHA1b385a21f4072c1c1784bf1cdaefa7f4fdf0b7e64
SHA2564df4bf9a91e79b280f6fe54373938077e0332d30ee0b0d76767906137d741a2c
SHA512196ae7ef97130d0aafa2f7c1bf7ecab504284de1be5885bd1ebf5654daf1aa14294e491330189f9186f14bee62cab264f85a9491f1d29a357256a94f546b764a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4a395cc6eaccf0161749b0fab21e64
SHA17f85216925fbd4543b48dfb7f697f393df0719ea
SHA2564e6d58f62e05aeea109f252e7c341a09c545865f0dc50d0da328f15addbc3f43
SHA5126b68caf1873ac48cbb5d398ecda1893344f42ea2f6e4597de98028228cd9145fe329f37f88959849b50bfbb8960e391c88c1b59d8adc5701b65f3a9ef2f9c61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4cd81a9fb5294b46f8d62eb0240cb8
SHA16129ca88ae834b256b4ce12cc85dd3aed9027a21
SHA256e9447158ecfe24ef64da67583df0a6d87b9a5af66262f25dd51cceada8ca1a1f
SHA512f2cae4a97881684ce22743f43cbef8d17c12a4b350179a2284c36403005d8147da0165268d47f61f4edc25d7a97354663cd155f5c1e9e098d4a021e117001668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf4463753a34a243d44ce18af1ea20a
SHA1cb83726b2ba0b548ae5fcaa4bc20f4714183b479
SHA2563ed2fc22097fea705ae9bedc3483fa5c5249a4dacb769fcffbe253e28b35a596
SHA512edff59de48ccf93e75bd54489b1c4fcfd401b5793bd3d4ea5028ebc1f02b075d7547282411dd3b01f6e8dbe610c107a3b0faa785b8bcca2012a01ede689a57c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f5d62751fb1d326f79d49c8b1f3511
SHA1b841029011f2f39710a5908214f379caf65b4b53
SHA2569e5d730d76382a9e846d6b935c8fe8ad1658382d0e2ed90ec1d372a5a22cee11
SHA512ca39ce6624ab758e8ac0a729ddcf6a06537abe183edfac0e3fcd0f3e1c990842656e6d41ad99d904c6d60f7c99f0d370a9a30e786d9701d7913f8b68ffeb5c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503338c4f2ea9d2b5773c7ac8f7af6715
SHA15667410e1cad41465121b11f25a8532fa5baeaaf
SHA2567da13355e4f6ca8bc519de23a2e457e30bac604918977f536a51bfa55d4c8af8
SHA5129fb6bc6f2bcbeffdea52de764dbef25bf671e391de214bedc39f2a3af7fd1771c9284da7e7b9643d8b5ee4ced644ba0788c2f6b592cd8a0bba4079d3dec50db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ccbeaba068834856b55f505e4c039a7
SHA1a78fdfa19ed8fb01d6c1e881d03720e945cd0355
SHA2566ad12fad8a787a86de0a70ea32cfa1bce1aff538948cf567c03b675b24d7f851
SHA5123a67cf26a111dc25e57b566153fc272a4d0125fd6868457613f5c3c67f2746ec3b40b094653c68f70ea010f521f49fef93996546a176e40bb3174337374bb196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558931c76958a3f7a72778d77a35178ad
SHA183f7b3e57016125bac3f8275e35d0e6c5ce04055
SHA256774410b648fd58a58a8d51b53df08cad978d824b7b62601c7d807614674bf287
SHA512aa399ac7cc62ef0f0501193e4785213b9961ad259ac9c370b12bcd188a2c398f942be8a95f6cfcff8f0cbf4695aff617bb882b76d26c437cc6ba4fc0da1a1272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748e681a7a72eec9ea5f100e8d113cca
SHA160f32737affa44f24457ae256da0bd201c5d6796
SHA2567d6a9a2e2d373af53665b6a8718cb39b31a3515d87a0b32123bd4600907af48c
SHA51248dd58091b67b27736b569e7a9c43ea2f79a3e0ee3004a8b3ce2216d705a0b25e7eedf02636c237f34a6f1889972864913b7aa3bab27af7ce2b4b8244c73fe4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5748fb182b9f4e68268aa6976df337b
SHA19a84b592a558e5b56c1ff9a859548c26c02489f6
SHA256a425e9202c2867e8de6af69b1111aa0df782aaba95fb8b75452fe1575a5c2579
SHA512879eb9a1c9f9ae2a32b93d99d6415b61d6e34ae83074b01dcb459e0c524090884793f76d3419b1b3eb8638b4a32703f89ca895832a58fb5db2b102e2cb65345c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b57adc338af5d58a4ce4983fc9b5939
SHA11e18a9513b62251c588c2c45d233a8cc6c136342
SHA25666b78101a7c4c5f3c6d55edb8f5ded3cc729035a0cbdcd5a9653ea4d35c60e63
SHA51283e3a96ad329861d6947268de9a31d9d4011c8987daf4c40fe5218121263badb19bd965305ade27336fbe04593f9b5f34e110b8a1acf60a6768bf688f0a39e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a01e0e4bd0d693f716b067cc0ec4c05
SHA14441c43aa31fde55899f692acb03f5871a0535ec
SHA256783505db245733c48c4b48a3518f87947c4e0671ba2cb2c2fdcd3199214e9115
SHA51256a5d2f5fe2cf9c699a09c3f7c45080a0b59860bbc5b15fb5c5d5660c71376c2734693b7efb897e392504415bbffbabe9cecd9093aacdb6e663eb72ce1d53b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a420d3d182b9b4dd57c29796bfa6f84
SHA147af930b29bd24d87183bfcf3caf81258c88f82d
SHA256b9092d4758a4b52ea5569367ef72249783a59eb2fd9ef576702f0e00f9feeaf7
SHA51231a85fe25ba5ed5fc8d07da525734c38fea5c5394e9dcd09f615d0c9d8e2f6a1507f50b6144d99378602cb6e0f807d1c4b8d47aa1a064d374988ccbdacd76172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b977d1108abb1b13b540fab1a159708e
SHA1b3174b6917cb9c5bc1b0fcb0bdd39c5aea1513e3
SHA2568e15b53de280731f904dc017173173fd7c4cda8f48a2ca4cb8e6bf05e4a1efe9
SHA512305e0573b776560253c89b663a35b8e2b7f46e4f64cd3598dbdc41cddcf3432c951647ea4bbef7024718c5d2cdad737f6cf6dbf6888ebc7a91753bdd6dffbcb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ecbc9ae528a87a04b69e7b882c6c48
SHA1d1fb419d5597b057acfbf86b4ca59100c8f7fa99
SHA256e3888b081df63fe2f541d96968ad3910c20ed9d8e5be8ea7fc8759a0f124371b
SHA512aeac9e7bb4abe4471bee1c162369c01f37130aa33f72a9ee58ec3b9aff0b0c2098f44d8449c8984048b5e6652c5d758da6f667533503b492df3f2c04b4eec6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553675b7d26ebf8b206c094187f8b41c3
SHA18a086f524c70d8068dd25609f12d7234ae162fd2
SHA25623be9e477b164ee9582e4740f657cb12785a9ca384ff676c471b47d3c8c3e0ce
SHA51214f8712fefefbff50342d14946db015c4d92c0207adbc799e9314a696f6e8380cf33f7a54f072d695a46fae19643718488e78b3aba606dc57dd30abd77940f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8ec7146a790584e0f2908d7922f5be
SHA1a0935ac9d7769a69088bc0024f3b8bb9b715dbd9
SHA2569117632a164cc1fd9935a470c5205365af5dab0a957d20eb2003e80e1ae5e444
SHA512717a3e0c0fd210e7ffc96f6e3f006da94852808580f076763fda496445170acffe7feecf79f515dcc2a97fa236634d4f18b6a2a89925e8e949827a482d8a9720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d257ca77a1b8fc9d672ebc96b73a3307
SHA1775bbccadd1a68f5ae0a443b12d8a5eccaacae83
SHA25690f0a31ac6ce8756454999d12aba4e4a54600a4297d750e6573eebdf45590bb9
SHA512eb4aac3ee52f569d7ae3490a8774407fcb1920da74ad55adf080fe4bcfc091f1f47702700de058be6e1604a3f3f46ba44a6960ea67204c7be33f19194f60300b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690a7c0ed83a9210429490a35079edd3
SHA1308f776ed8e25f80f81e8b6d2497c8260a844191
SHA25605c86447686c41a6e9016b1446d3ad511a1767b6c278548b90ca55a3b8aaae08
SHA51211297670a7994b43c1960c5c3f38630d00d40a4b198b0b0413042e2250d4799bc24c956f4f15204d188a4074193c3465296a2498cc08878402b2b5cb5e9aa608
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b