Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe
-
Size
32KB
-
MD5
f9ba5159c5c081242fb53eebbcb4e20b
-
SHA1
1dfe0a710289cfa5779ae50e66d1cb5dee61f1a5
-
SHA256
72bacf865162bba44c757a86eaf20e648810e0e05ce14139acd6819e74977b4f
-
SHA512
ad8d94f0abc27336effa51c6cb17b1f7358070dfc71ec506114d5b0a1b7c0094afcb9191bd3820faff6829b68aaa442e8c83ec3fcc00236c28fddd768042f522
-
SSDEEP
768:/m0LEGYD82RXjZsmThXmpcBvWxO/EYRsYwnIi8jz6zgiND6HjNqTXqIhtjIXTxMn:/myyGSl1YrTt0S5K0O+kGhw6zV0xXDu9
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E19F20C1-7C8A-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433574007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07141b69710db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e102d267feaf122c900c45ee4c5c7c63b057faaa6151d3f3dd7e35c698b7e8f3000000000e800000000200002000000088f433b13e9ff6550ad2f8c133241eac0a4918db61073c7994f9bbc766da0c8d20000000a99cffba38f6b56c9537b8718026c49aa8fe39b32f542849e126293682e49f4d400000006c3490808d83cc8f9865377511181a20b89dd304b59f191bc50389966da4874de4938dc36069272477f532ab547b9df0677c1b93dabf85afa4b1c2b36ee51e27 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2688 f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe 2800 iexplore.exe 2800 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2792 2800 iexplore.exe 31 PID 2800 wrote to memory of 2792 2800 iexplore.exe 31 PID 2800 wrote to memory of 2792 2800 iexplore.exe 31 PID 2800 wrote to memory of 2792 2800 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9ba5159c5c081242fb53eebbcb4e20b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8bf4bd6729ffe79033a3946ffb98111
SHA14912ead5b9d5045f4868d175b411ad706c2c7f19
SHA25664f91a8c878fb26841f9320ece10f14525b731c2b58d1d9a457a45746239577e
SHA5122818985314a4ad6839f60a89696da8889f52a7eacd2a8e66990259ae5cd1db5eea687667c122134e17013b073520ebcb8fd3b26c1e7c6936410986dad973599b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb03e544996b5c65e31047cae512152
SHA1716cffda52fad7b41aaf2888f5fbe4889568a0dd
SHA2562ccd38802c1d296b8d71e7307ee61c0673897d9f9145544a85fd7615e9fe999e
SHA51206b89a0e547c97d9a5b7a7f0532e3980e782726c528e195ed96afd1856ddd1b37b8a0c428836a0e16ca5023d6f7113e544162a3c4ae8e75c6586c5c32b3ea7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a195a8bdc6c52c4cf0865d76708ee7b6
SHA1c0ed089327c8b9c02927bf1935f8deaf6ef992a0
SHA2568a2fb275f1ad9446d6f5eab3b725305d2be387f03da88c149e1bbc67f957f22d
SHA512c4b9a12da33fae883c5c057d34fe3fbe4c5495718f765a4ecbebd3006fe293cadcdb7424f3788ca47f9301aaa3870452568d6c1e1a339044b9a68f5bd92ed636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b264c610c98892fe3987e6141fe7e98
SHA14980654f669d331ea2267bdf87d001e884c8596c
SHA256bf6c6a74df6475cf35f608556e242b526ed5610c06806cac5060f87fb214d989
SHA512a949f4719e93bd3c474a699ee8258e582bbca7f3d875df2e494242d01396b450af05124a1c2abb61c6fff67bb9139e3f134ef2bafc4699bf9f672b6bef67065c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a35dc685911dc7319db2db4fecd3a67
SHA1cf406a0364dd95c2dae5e7111565cf629c3c1599
SHA2564c2f6ac40c76222c6b92f900df7f13974a164ed8e7c52a738be01acbb5c8050b
SHA512b89da641d2a2d08a8fd3c999b0c85a30144053de50fc66037277d842ba0bb540272309428c7674a73010f167b7fa6ed0cfc264d6c11bdd901ebc3aedf20f2ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d29b7ec21d1e8206c89b2122eb2376
SHA1c2978d4ebb1f023594592aaed5599cbee58c76da
SHA2564efcce382abc3cf195ee32f65f3aa1d431558ee4dbdb52bc2c673f6edab0b470
SHA512411d67c98babb57fa6c8a5070a34b4fb2d9e055aecb81f9d4a41f7f395f557b4dc4ead638c95296232d6ab2ce329e93ed7cfdc28dd733b09f048ef630f57221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5941e97a4a55c9764655ed9d0bb009a00
SHA1afc7ea209c4dd411f4b392e5076a14cbd1bd48bf
SHA25627a04a8a6d5b9b188f3ea4bb4a6f91de555458bc5fdc19c7a9b609ef322c1355
SHA51203b776f77f34a910ec36de54efb28a399afaee19030b5ee95049b6494f9e9825e8649d313f85c7e6621165bf7c5f65fc3f109929ee4b2906d2dc5b789eb689c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248634be50dcc7cdd38eca9f9f73a5cc
SHA1570567a5bc17788013fac10f28889ba16bdc000d
SHA256e0db1da3640e8beae406999056367eb563ea8d20e55998a5a73ae0d5501394f7
SHA5120fc0fa610c4115973470a5d15ee233f3f325d0b7dfe9a7b4d5307bbb0825b28a36c5c8aed79a5145fc7f260e519fb223d308a27aaf24c4966c0627fef5fd1795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634684a3c800d5ee078ba0961cb30662
SHA12318b07567443dd392334a5a8a615872948c975b
SHA2562e71be378e80baafc17008f22c5c6a386483185269d9b141ee9f53764e29b529
SHA5122cb57a81b75fe099270287c896fcce94b76ff9e70246ecd5d2b0786c68a4f95c5836636cd7eae3e8c7a5fa0b62129902423b2a297b30e384630e52135caa27f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08b14a90c852ab70b5c31332f4f9c08
SHA1806165e6b894c8da540fa6b7b8e65b1dc63dbfc5
SHA256cba465f0b7a0cc928b04fe3ed22b9c9cccc56e41a8fea4f946517199e49899c2
SHA512a229d2b86946bf0f70b98e3e93c5f9c0fd98c693d1948fc9779b02fbc326ceb2d7812a776f79099d8ba154ff025766d53923f4578f7c9829cb36a99999fb121c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257d70b53e22abb983e9a149176b1c2d
SHA1ab09ccd4ed17255f48cd0b88bf901a526ed0adbe
SHA256fbbac95d28af88b2c784e1cd434e6e8e2d6ce87ae68cf74e9c03b388a9d54e09
SHA512e1c62edaad3e14f9c5492a6e565c519d172096029ad728b432e66412cd36f88b4190f73aa99d944aaa96dfa516d2970741c568c8a7b8d8d2f44be6326bf600b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e5fa258030600864c71094648a625f
SHA1b8113d337ce2692cda1d38d0cc87f1fbe27fc7d8
SHA256ba196e96fc3b8aa2e6292729b791393e70584f7a316b618aa603cb4a82d78a67
SHA5121bb58e6f01bfe0761d64eeb4cfe79d21360c5c3c492d6b194cb63cfb8d1e720f5bd52f6e8b12bf461f075d3c4e9dd0d81e8c34abdd4be38eed7ee8fc2818544a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18231cb5f4b091b70a6edee3da530c5
SHA191d53c09c5477dd49f4c4f3ab7ab25b669762ef0
SHA2560e4616cf0abe3f61070e464a83b5dc441434c8d15b5cd3c7060324f33fbf44b3
SHA5123882906092a30e080489cf54d7c70a0006ff22087d82a43dc599f2825388fbf0dde0042e1ed49079ebf5063655e2eb519a4aeb1c7a61386392eaa9915c7bfd55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf19662b19311659549ec42197186bd3
SHA1066958b3e3882ee31b5e7c1c633eadd980274df0
SHA25627bca83823dc67e67f29231548b734749c68996d839c57605c3ec7ba7421e662
SHA51202e894f99e8694f149dcb3a864761adc039e6e55205f202f2b4e8bed3fd92030795d6494b83b18b2e5bcba92b2a3d98ddd1f6ea7df9c9de46f88ea102422fb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493bcf8f2cee066b61001fc35a89eac9
SHA1f8fd009ba8a296eabf44da9e8c0dd4692c81a4ac
SHA25679dee93cf891eec2634a5920a937c3012e791883ffdc8ee66a98a860df665350
SHA51206633fadc7150d16a138b147a7621dd14a291a8d495af19558ac5822bb339302fad1b9c9ee84c310af76eb7240c831d9dbe46d4f923b0efe5665086ea20e9e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef72f372374676a2c79599798447710
SHA19950a1a7a84f895e754de7eac608a4030bac5b1b
SHA2561c54a20846d080d8cb1ef4aec2943380b6ad8e1b72e55843e93f6c24cac6dcd5
SHA512d81039cf430b0c20f50bb3898359e1d22ad1347c8e5d4392686ad6cd35d991639c9e988f3a06f4dacc80af2cb2374782a4083d5834ed7f81d7ae1b87cf93b3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d19db3227203debcb9e1c212196ca0
SHA14f7a45116b683b79c7d064aff1f009b46a23afe0
SHA256fc8953c329557246c586b8e692c7e17ae92dd67b1886a009595c673bbcb947c4
SHA512ce4bd9b880a218de41ec9b2c6edb7011a5fd37e2fa2c751ab75d2f9f7c29a773fab56a0072d0087f0578062d33c1220573347da929297004a8837def86f20f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f4f27003e1c6060a18701dcdc89142
SHA1c841cd4be3f5b469d353faa89717c11b5d05a42f
SHA25689625040db7214b72188059c8931ff4f194f0014972a1c3c0d8a3869bce6ad4c
SHA5122301d494d02faef87ea6c81bdb971fe745bf16ad91867e947bc8fd9a112dbddca84e2305c1e3dd59e57300492ef9d25cd33720ea0d50c1fcd9b01d0624fe4379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8900ee8b51c6d7f46f4fd0ecff4246
SHA12e56fb0ea84441bf497591d57e41b214ef5a4567
SHA256cc4a0842b79c58210f605d1894a0e6afa4bdd9df2596e8a8c3703dcf11e47d91
SHA512bbd0f55797fd059eca57b4bc393fe764ba5129aea8350c4b2aee3fe6bac1e330d0eca53cc057415c2617936498d870bbf8bcc36e8cdbf38a6d4e0d435b9e2c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559142cd39d039a2b191a8b38aa2df62b
SHA1f7a56727c30d09cf96d997ba3bcec03ae8116ae4
SHA256e30153a89930f88a3ef23dd2a7914de2e32274efad09daa0e8998f6b71308ab6
SHA512ac3dc139a394643a03673af3e7e405ff134f876e2839be4f0c2d952f9deae56422c3869dcee76b1da94a1de4e80d420e775708813caee48462369f365a2ea265
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b