Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
fa4f5c140ad165df828ff1c74d86b524_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa4f5c140ad165df828ff1c74d86b524_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa4f5c140ad165df828ff1c74d86b524_JaffaCakes118.html
-
Size
45KB
-
MD5
fa4f5c140ad165df828ff1c74d86b524
-
SHA1
1150f85fd5a49f37b3d115e2ba1f5874dc9650b9
-
SHA256
ba203ad890783a29a576d77c6fee900c1d977240a1a99cacc4a31face8139300
-
SHA512
4288f1378aebdfbb048a58cd12ad6602b3e4a8274eeb31bd1cf9ee735bca12cbe9bbd4f4cf0883b72ceec7968a74cfc2d2fe7f050af4667b5f23e0a87cd3584d
-
SSDEEP
768:LiS1Epp0ZKfGuNBlRb/yzlJ8pfdlVAVm8nwIUaKLvid+R9C2SER:dj8pfdlV05nwZR9x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fdaf00cf10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BC3C851-7CC2-11EF-9F10-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000c27bd7c24adfa271ecde0018e8a03234727d4c117f05c013368be26f0405d776000000000e8000000002000020000000f1194e8ae2eb4c14932c7d483555c08114fba92056340141de06757d01e5a1a22000000031a516dd7f97c0a8210bcd2f3326d685417eb6926d7310ccc1d987ad0017b45840000000816f8c09d099ae482119858b3aae56505e3c4a210365a9e9be7a46a79d0a8d7d586fba20e1741fe1f28e88e34504259a1b33f0a87b889f30ea6bd269859207f7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433597727" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1708 1032 iexplore.exe 28 PID 1032 wrote to memory of 1708 1032 iexplore.exe 28 PID 1032 wrote to memory of 1708 1032 iexplore.exe 28 PID 1032 wrote to memory of 1708 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa4f5c140ad165df828ff1c74d86b524_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5eae440762ecf450a45146480a35e646a
SHA1212b5097e218fac66aaa068baef0fd4b0e7ae71c
SHA25629638d0d956da0ba12c8340c4e2e3e2ddb2e0727b0afc3c5c6736536362d75e6
SHA5122580e8c245f05c043c7788b91b8c861064a0cf7ee454c1c9974e034f3c2a72eff00eb01ea6a97356e6bf09ec902bb7ddbf195978530c7ab12c33109808d7b850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af91f1357d1cb890e1afa925b8e68f95
SHA17ec7550d3d04ee55a27a184a2cb4639244dbbda9
SHA256bf1f73a66087fcc76a730eabcc35d7f14853a527ab93d8592ec1242c9da143d8
SHA5126fdad5570651819f5d7372b8ebdc7d8e75302a71c3fd4f02b9ab690c8684afd570ac5efe73ba32ce5530aa42f5dcf969d403b23c73134490acd45defae170597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012bf3f1d8f491d02ee46405202525de
SHA14a7384ead0cd923040da07062669dce2ba45f67a
SHA2563b70785fbac21450141a0efe7fd419dafe805efb5adeae346df097f51e4a4993
SHA5127348eda0afa1b4af7cfedfe661f7d6cf8ec0e13ff0c0e2f415835a96fdf9aa2bdaeab615298499dae875ec3ed407f39a3ca8537eb4426886ba9d198018d4dd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17e4465ec24ddf5b5f4e9f6745e105f
SHA1ff6fbc0504ee828c0fc8ed5336b8a59f5b3c7ed9
SHA2564961d912535eb5ae55929ab8582660ae63492c0bd88c0e88c610877649c0da3b
SHA5123af0dbd18a7e694bc5b313d2ccb6522aecfc5cb24c2df690cd5edeb95973047b51b64871b1a493cd11cd60f11d0443f7def010325d3476875f4738c01160afd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fda7be73c6ba24ededfb42abc28b9bf
SHA1d518af0d0b1789db139be1790939ba239cb5be13
SHA256053d21b4c8a6f54fc65c1a35168e664fd5d2d389ca4fcf7c2253eeb08077d3b9
SHA512827427c626b325b3cc5aa309c76a1cd30e8080d85111c9861f3860dff3aa72f6ce7274097de9200e6b88f6a531d00cda3e932d25834626a95aa0d6d90df8235f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2972a26b760a553ba99eb20594e3a9
SHA1373a835940fc7c6ab513056d8a965ad5b63dfffc
SHA2567ec88f0c8a0b7728a61d3167e78732c840325a3f6d290c4f004941cd139cedd1
SHA512c091eb2c43fb8f0d04726737f098adf47e0b70e8e74b1dc789db1534c7c06dbf5a80941477b609f830655910383a5567d87b94c7e609778eae081062118efd79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1393f5f6d6fb7b66d484f8549001fa5
SHA1a70daaa61c32fae14d6b48986de13f6a3d5fe9a9
SHA25699e0abcdca159f993239773aab52d46dd76a88f3793859adecfaeb6733304a78
SHA5129726f15def7fcdbcbeb8347f7e801825b5881d704998aba33a0ece5a9c6d368a241fb9378e0f752c62f32fe3d0c0403a526bfe95aa7bd7951b9049cdb032def0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f4c4e20b0ab822837a3dcff4f78fe8
SHA175add85cfeb742390cab5a7459afe2edf2e9465c
SHA2564042936c6ae0e5261a9a6fb9c6a46109c49ec46a2a1926be1f74fb1d582dce1c
SHA512d2b1ad1b2a9fbfbd7f8bc068333459c9dedf5df6ff22ce2b6ce16f839d18cfa014c8e0424e85e8b9ead3ab2078082667994de0b60c87b2ecf52a16313e5f8653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cd1b6eb2752f5248c0fb04bae2885a
SHA1adc96b3cd91ec6b39f0fe88b337425450447cc4d
SHA25635c30f51973ca421c5e8bd76613afa9fb06be3d2cfe9c041ae5b2ebd447bf311
SHA512254e65de54e80af4f6b66b43ebaeed1badb62ce381f1fff2169dfaa72c1cf32886b5805b14a3e035fef5ce95a63debeb55af1675617619835f9a9f19d0780b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfcc9878fc78327c1847a7ab3ec0146f
SHA115731cb7fc8128179ba69f6e2985f46138e1782c
SHA256697e853f20ca2502c8bc03e299fd268fecfc7a8fd3133e1f9808e512ab680989
SHA5129a7511a671ad89b1810a5fcaa9580a62dc4ca704554b6c088ba97423629bc5fc1b5a88eabc9fdafe818b36b40a2f22749500a443cd2d4eefd7c3e33ac5a07257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c993f8d46f46f32e80524af7a5c5d13a
SHA18bf43e4c43902b70fa67a36d91c1ab4d76da162f
SHA2563a5194d6d444caa6b1467792ec71b71bdd9fb5bee04c38f19d781300f1ee72d1
SHA5127294b453ef6f70e38444f831987b0aa5ebfc76eefdacfe0e381dbae09991bb0c0b384a400c823d8a7054e24ea4cd07559c73f175c208fe3340f613bdfef24a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588483f2018b2e56be924271258b966b2
SHA136a324d013b91cb1874706db79a3cce596727fb3
SHA2564328b0ee23601aa35d1e9ada899dad97a9fad3401417fdb5007f4fa9e3ba3ca6
SHA5120915258ab1f9c827812132195a87edd414735ead6a002848f72fafbec1df48535c7048e49869d1509ed03b931c3130d727ac66a57d2bf7ed63d39b6ac32ca6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529dfc0c44d05fed3082d6b5acdc596ae
SHA174486f13cf0a6c51fcfe7c07b84ad4e365e79888
SHA256364fa8d208ba088c54c8002175e78f1192d7050c5df6c510a1729e1c7c06bad1
SHA5127a4208999084f4f9434b349d0365c31296d9516c0411cb60f0bf30c66e20960caa643283b8b18f4eeb99ef3a7ca9873a9a14d39cc29c9d02eeade33f7e01db58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53342ee7579cbbb7f3b9da2d27758ef6b
SHA1f84c966b3abeef11423ab23836e42e3c557b1e2c
SHA2563cb2b40844d92b17ec694b014a9ff170714ae3d03fb38a82b4bee90a59949f06
SHA512d7476fe2989fa6947d9a5533243debd96e31918908b58a827841944f6a823ec902f1559771d0b8e7b5568a9cde055a98f77e09455c4d69da79db86e1aba5600e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191dae2562b0f6fc42a074c71f878d78
SHA1d620b9ddbaa13e31ff1b7cb52faaf4ff1cafa14a
SHA256d2440bd2d8678c0605b979fa79681a6e007a98a47cea7a3beea0a91248363ab6
SHA51255a100fcdd050b831b1c65928318707af0b1de9c3a7e11fbd265cd4c2d30ae1746be0e62065b9460c6adbdb8c99fe4316602932d9fe26113653c0c30b4cf684f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9bbaf24e55374f4c9f891aa22e9842
SHA1dfb619466cbb5d1c7f0802a493e7f3aec81bfaf2
SHA256f77f8d1fe8b7e7063cb2ddf4893c7db0e1bbf1b5cdf6b2a2a7658552efa0ed7c
SHA512e1e4f86fdd7f09a59e3d735e7a37861d8dbe6386f8d06bfc789db0ff3f8b30e324b39daeeb9158ff05914ebc6cc43dc4a62cc5a9c468cb8400ab8bab7d69b804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761e5037312faef99d23060986da876e
SHA1e89aaf70b3f64052b6c4f1dc38c46c0dccf7d59b
SHA256e4f5db300521db53bf3723126260a898fc5bd1a6bb1e82bd118d95cab3ea7a91
SHA512cb5f4dee54a201b03fceeae54942175a816f540891a59c0a6bdba9894f9552ea9706daf212d3a47abec4a00e38876624a6b35582a6a5432a01c8f64b053f2997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242aed0ee8249c70984730704db42c7f
SHA15e81cb503334f9b0eacc4fe34526ef6d38ea5957
SHA25655c9c6a1b64989937f3f391b28c57a8e6defed1fd55313e434058f8fe3b9e82e
SHA512a20951dabd120d666f800349b073dd75893cb5e341b5f61d72a4f62158a721467053a4334f6a8e8bf85ec8e1946fe1f6fe5ce57aa51239f376b99e1628f3e4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb1e740f3569df130be9faa80c25933
SHA19f609f2f051e6670c1275807d1bfe31f87f359ba
SHA2562f8dc4fd6ee2d5bd3a065970bc420832ba0de1f8fe6b25f888bb5485e54fbadf
SHA512f0f06cf14f142f8e2476ec3715b6344c95abe5c43321141730faadcba7474d74ca9c44e08edfa71c8285f9a6bf99327eb36a77f432e8cf05b50988ab1b24e1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd15c97107d7ef1973b5b9a5debcf440
SHA15b90489be15f506a0f80cbf829ec4411a8891098
SHA2561660f245fbd3406afed1e5b7aa2976c661e684184a0b48ff50a48c034227e22b
SHA512a46e7002886319e6d89c61c0546b48c13599ee18dd75d4d11dc36d5e4f21fa39d74c6e4e635a1b6735c3b25101ab93dddb30a1662e1cdff56e53d722630aa251
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b