Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
f08ead80ef886707719e737f097f9823_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f08ead80ef886707719e737f097f9823_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f08ead80ef886707719e737f097f9823_JaffaCakes118.html
-
Size
23KB
-
MD5
f08ead80ef886707719e737f097f9823
-
SHA1
bcbd19e7275064d9fb0e0d001cc631e6197bcaaa
-
SHA256
5736d361d279047007291861ba6e23ec25cca85f4a875f50a78097068702984a
-
SHA512
03cbf5cc173689e90669919140766556fb03a4b0eb5c06280e826fa1270493a1e95e397096c5d416d358b0d5e153b462d248e02f631e99de8c45f49f6acfe124
-
SSDEEP
192:uWLcb5n++nQjxn5Q/JnQie0NnwnQOkEntXjnQTbnxnQuCnQtGwMBUqnYnQ7tnuYb:vQ/SeE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433112573" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000237cf8d462d9d074da895b6878a65291642968881b9eac9e0cf8d284d7a617ac000000000e8000000002000020000000af744ab979ead7d45cd5c15cbe7379f5a91321ec7581e615571a8762ce21088c2000000034e64287bf8532f67b90852e6e928cd7e2910e4effbfb0dd73e351c13a3f5ccf40000000e4df8d1fcce93cbce8406e78c1d9d79f2d06fbb7d23c2fb24834b996145bda94852c9102c67e97b9e03609ac2ce2a496ba7119dbd40e447df45532956826cc16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84CF5491-7858-11EF-8B78-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01d1a5b650cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2492 2364 iexplore.exe 31 PID 2364 wrote to memory of 2492 2364 iexplore.exe 31 PID 2364 wrote to memory of 2492 2364 iexplore.exe 31 PID 2364 wrote to memory of 2492 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f08ead80ef886707719e737f097f9823_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6aa297a6bf7959157aa137c1e2c88f8
SHA1db778696853cb1a22e4b271abd40cc9ef9b09a5f
SHA2567560b173e26bd4f294115c68c2ae6bb354f2f843be34b5e6441c29bf6fc64204
SHA51249ec44eaf65a748339c08935151f1c11bd0dc8e9097428797df0b0eaa0951edad33f20351b5218aededfbe2abcf4050b013ccf2f82c64d87b30a2ffde662f264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e07640a05a26bf9507cf18e22591f9
SHA1d2cd65fb8d67cfa78147ef2bd5b6588e4c1a0d7d
SHA25664ab71f62beef5df13ee2201600b1be8e44011f5c481983955949a95d9d93dc0
SHA512602503e3a76a6f0b5c1dc5951ea911065ed38ee51a58169c323f29a012874c18a79b1cf2686f6ed37d212e8ae74e247c5542a38e08fd596288f949d4edac3c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512da9078ab2513ea5de78573c700f689
SHA1679c9e3692e6427587c882ae3a5c44bb8fde4b91
SHA256659c63d299e01af831ca62da474a2719df30a05df82a84b03ebef180601515b1
SHA51274025ed2acb75818a67a704c45c81d75d0596f1648e34ac5e53eec04ef85c704b40f9420d2c7db37eeef0f6f26141f87179a8e1609ca5b923ec683dbdd745d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da55e733a58e48989177b14681542d0b
SHA115b66eb9f67199586d15c24973c6ea70576d4fde
SHA2561558a54a2e1792b379340815275e5812178d896a3cc86ed62b9dfe754b1e097a
SHA5127d4866c0cdaf745572ed7949b0fc5fdb6b45d9bd8ca1f60d6267fd457c86d369176421f98be6e8e1ee0c590a17580852c804fa2c0a822d8bac6dcaa9161b67a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0631c353f469b53a5165d461fe7535c
SHA1371907add64c53068c723c7414ed41bfb30115c8
SHA256cf5c6a01506c864ea7e023cb4866c2ab5e1d3920332d46dcae06bef99b342d6e
SHA5122f9b105a44ff9c04806a79c17e96f785ad175faa558c78c249f7ba34c8dc3d7ed2529e8f306146f4fb68c76fd209b1d454daffe4215835dd7e680ce558a4a92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e2ad90faa385d0cff7c9ec00a43e6e
SHA19de1b0b24f71b24380fa72a1028d32551ff53d01
SHA256c99b8037aee11c3995cf039af5263912f287c8843fe79333530ab67980a4a6ae
SHA512a147ca5c5538592cd4a99cfe9fb1613546901bfa66d42ad1b89892de173cd55829ab8e78f91cff078ffded1222be04dbc120a2bdf3f9beebe8e92539332c4ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32bc8cc3df76c1136ee80694b832e06
SHA141eac1b54c50b0f7f6ad72582780d8029d037929
SHA2561b4065e1e3506602dd9b4dee23fa0208ec7cb379c25c35594933f322440a4fdb
SHA5126bec6e569875cd9f4792e222c52ffb0a24dfe0afabb13633c0de181d66dfd05b71a5b173041a9048b000a3ea790fe2cd29774d1ef496229efdb3230e71ab30b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cc7645dfd80b18cae6dd18d65e62eb5
SHA144cc7e944a12328172a2144f335a1a90167defa5
SHA25608c0c5d0211f3e6067914a12214099dc35c9ee523229acf55cc9f950f501f8ac
SHA512dc31ba38d80b3c2c3e02bdb2857a6a4c13bf9e297c141892b18d134c29005c6c1345182c8cad9bb859298f3a158e578aaaf9c8e7e9b3725a53420e2932292a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969bd55a257d42a8e844c15bdfe46572
SHA118187f208f24f76120d1b1a7fca17609a849adbc
SHA256437f9f3c838b7b8c5eb650e1cc50eee0e0bc40f7575befce153d604e8daa9ee9
SHA512e4eba901f1868fa30773025cfe1ada91bad9a50f1020e28a70e6354e0299b91c3c27bbe92f2bf8344417c6a265365a0c4c084dfc7e67152d18b5425175ae0488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b825a006907439835dd40ec2eee4cb
SHA1e4627bfde175919434160952d658c4dd201475e1
SHA256761a510a68686a510f11b27ed24e4bf52f3c8f924f2b0d493a698abe1df42c21
SHA5127cb8824d8e720bd8bde5d97d57abeb1268494c5536f3ebd8163ab88623959240c5be1dcd46be4129caad8b41245546e5ad6ad39ac0bd206f3117466779793d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f937ca0670912889b23ef400a744b1ba
SHA1a0b36cf1ea5ad88e7df95b9a421153fa21e631c5
SHA256f7107799f5e3ec1060c6ac67ee3dc0f5857aa775ca6a0bce9b4a22bac3ee42bb
SHA512d0303d81bedea967a3abffec218c481190180241acc14237443a877a32c897fdc1e93e1e6c7c37dc08f05f40bb1346f0900a31b96396f61237e9e78361bae929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559bf8fef42add77859d5b838ca7a795
SHA1b39c0b68b5c2f39ad3bd4438630d0f2cb32b1626
SHA256e5dfffb92c383605d7db2fea0516a8bfd2a3ab23cc4d0cdf43cb5d9401cce221
SHA512ee0f22586bccfa38b1d2544aae88f16bcf664c88cd617792666d7a3c40dd47ebbc52b8043059e84cd1961a9a10fb7cadab21246690bbf394497754eeec1317cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd60b255f396e1c0b30dd2b9d6793ac
SHA17007ea267209de791511ca26d023440560fa5dd3
SHA2564a1af2f0863eb8ba5ac43222afee5cc4af1a8cb1028a91c1bc1883fdb1f74648
SHA512687ef186f0500091c5d58c878dd73606e72c0a313f292d8d727e7a788b44276adf5a8122a02790ab8c5b3a7a49fe0e85c6d2c5a1cbeefe469316ba49074742f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e5a8e726c824e07c601afdf847059a
SHA1415a844a87a6996f73fcac5d5e0594f7b11ac6f8
SHA256ef20d606f416fa8bd9dfa2bdd8926487b36b6b689a27a6bbdec5daaebe53c314
SHA512b3f0f80e9ca6b0291fcc13beebd8cb3c0c8a1cb648a0d1bb263cf556b8bf9895f131a5323f3f1d06a4ed64d74de8472c97f3034b54cda4d7576fdbd42a1eaa34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb3d3519c3bfa5a050036e93b873bdf
SHA14d44adc409418e10ced74d5cd1afec37d1920082
SHA2568ae814f80b202d4cd651abcd7c24c12c007009af20143b1e0a144937204a4dd1
SHA5124b0f9c0249c8451fa4451ec50a7478dcbf5e51cfe16f8202c7cfb0ae4efcd9f100bd498aae80b624c6dbdc98578658532815a86a99d5a466c01caf3b9ab53fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d030e300a785fafe8bda899e33eb4e
SHA1fc680a61428109b4c633bc45c3d51f15ecca3a31
SHA256ecda470d0e836291523c7b7ae234c379d2a5a45004537737a9395a85ca4cdb9c
SHA512f9ec2e043f355408500c39cade11f272d2383fd7c54b53493c9b601e4dbb5a94856710fed2a7080afefd959c0ef5d2e9043fee856147d24128199aec161063f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e531131f2e924a68564aaab94763b0cb
SHA1e7680e1100e69b97a8027b15cf29eda9c2a14894
SHA2566d68c15320b50680d7b65adf60eb36415eaa655e4507a09fc0ed51521b9c3b8c
SHA512e42018849349e84a9471d5b2d52b629dc498041b526b2b8f45e73e2ae9dfcbb6bce3dc043873f5f7b07f2bc87594737f04e3337da67e1f200354956a5590fdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939265c072c7d33244101149c32830f9
SHA18c159b763568d5ce2752b0c0b747ad2fefba93d9
SHA2567275889653719391e4cfed249ab3eb028b29639cc29db108e6b301afeb2c2362
SHA51267a24d19ca739cbd8a2084174c99dda70ddccc2bb4735e52a7194bb0b664251189f2d49f0bf1e92f3070fc48518378fa91c68223a61a5b8fc9e4e60b10ded381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34b7c428fe275e209cacba789c4f38b
SHA147eea46669f044c9bf9780576522c98d9b56043f
SHA256913d589c9817a4edf64777ac21ff50711c24eeff89cf8644fb2f9f6e65fe342a
SHA51292f96b58d0c58b4d95369b85993e2d98399e15977281affd815cf15393aa6be5dfa53c17dfa6333104b9edcc327f3bb0d0996612610ff78edc79e5486de0f66c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b