Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
fa61633878a2b47f3d6c64099bbf30eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa61633878a2b47f3d6c64099bbf30eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa61633878a2b47f3d6c64099bbf30eb_JaffaCakes118.html
-
Size
61KB
-
MD5
fa61633878a2b47f3d6c64099bbf30eb
-
SHA1
8bf85eff20cfc10121777a731efd68b1fe627ced
-
SHA256
2daa12c14f2471db341f0e49dbba5a8756ca7bf80ce8432860ba17b72e8e23bc
-
SHA512
fcfd2b29014ded66236077319c1dc1cfeee5da6cae046ae258a2bb6531643062819db5c31b7317a2397f247270051b7a1e1735bb0bf63473316236fe103e6929
-
SSDEEP
768:JiSgcMYUcXGeCSXuhniHKnoTyZCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/Ijkk5nt:Jk2RlTbec0tbrgamchNnWC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40440238d610db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433600851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000bfc641b8f77b80bee2073e80767416ba10ffe69a4b69839d7d15baebb1cba119000000000e80000000020000200000006999fc043d1389be441abc78267ddab57b6cfed544d1fe3052bc4c441a1017d320000000c14090c8f6b5d87ff322183bc5144a1f1280769fe2e2f794006ae5baa902df1640000000d2dcfd9744d5bcfdd98166628628dd1b96cff53e98f03d6dbc9a9dfd5f5697f7ead1d86b2d08a0eaad6d8e38fcd7fda2ebf701704753cab4daa5c072e6bf2f75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61C94DA1-7CC9-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000899f83f95a288a6d63d54cc245f39d7294aa0d07e2e35df2b3e77a26b69cae28000000000e8000000002000020000000bef4821cfbffdd0fe98db506d3091cda6a9adea747dfe645ecc4e61554911c6990000000a6f45a1d7a1f5b1f73604de91de9c5ebe849f1a29bed99e983940d34e917a632cb2270862e25151212fd929643ea4813b2de9c833f40967316a5c22b8f8c3c01790ac417bfe8c95a6a4104655aa5b78ff038ba3edaf7d795873bf079c81ca6a5473c2a4330d2f91b8bd94deeb097d4a5f7c26420c6998b48fe07bc3ca55c15f7932e7889a64e896ef9fba1840d0ec53940000000fdb586e953420e456fbfb03c96290db0e40f3f5b8f9c0b24078235afeb89e61ae5109118444f775104a57a182de1b7d6193303c8f9a99a60dfa4d68b0d453c75 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2340 2160 iexplore.exe 30 PID 2160 wrote to memory of 2340 2160 iexplore.exe 30 PID 2160 wrote to memory of 2340 2160 iexplore.exe 30 PID 2160 wrote to memory of 2340 2160 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa61633878a2b47f3d6c64099bbf30eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51322d0cf602dc69d860e8d02aea4ea82
SHA108e809af2c9fb723ecf8b497c61a85d32b8878b6
SHA2560e583c46cdc950a73eda703e4fe4b581ef307396a512367d9c6e7545505a64a9
SHA512cc33f7da215add49e5706a6b47408c2e4a9e0c4a3469ca9fde76f579fb96c34777cb80b9c3c7a3d0a8ae8af6ba59a8d48c2266ae730e6e61dc856fb98c971ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b195a979b59c97dbda82aa1c0774e3ca
SHA123423b827f02e2a9fdf6340b675d74643fa32a8c
SHA25659ebf1ec7528abe7964c2ca78f7d6390f35ce214f952a946aa83a08dbe38cd40
SHA51294f77dc4e73f87474715c82993be5a7858e2ebf085b75806b7ba871b67fe2900228e130bae8c4dbf076cf15520ad92f88a74e1d5b28dd5c7900af3f377d19488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585540ef9e713bba19d7622c0d5fdd4a7
SHA19e8c3946e89715bbb00d784475984fc6364180c9
SHA256e2aec3826b7eba1d3c6c12ef518341a55428de8bc068419a8e01723fdfc738a1
SHA5126170751d50a73d29a27e6acfa0e11c60ebd123b8d22f1202513e7b13561650eb81642f1ef1f3e2a902da93431963ddfc89e1be4cfe7d02b92b7304b148b0d5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730efe4ea4d7a124b722485705d7fb40
SHA1c6096d618199c4fe0346578d55b4e5d0ba6dcec2
SHA2563971c9a2a80a0652fb6f56d5dc727914155821f137e81dd959c48c011f9ab08f
SHA51225aa8761c8b4dfea55965f836b10c36ee6a4d39622c4e76a3179c721fcf65ce4acae7f8f9afa9799b5f4d55e663ff69f2cad4df8fbc8c87d728b5e967406432d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e33a65469db96cda8b6ff0e6722d3e
SHA13f809833a9f0854cd791905581dce04e63fd8e1c
SHA2565ee56e8588d1274d21631846190c6cd333251fd501e7b031222c7bf680d75ee3
SHA512505830e2f2532a05c443dc5a926e590277d49eb22b7e1a37d0c611d354f1413932e9ea556924d60954d63066b83bc136652aba127aa5fd67a37d5ae0ad4130f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d39f541404a6827312d2589b4b1e82
SHA18fce08f2087c2933a181451c208b00b03b0c8f21
SHA2563b6ffeb647673aa842292c9de3bb9ff1b63b2bb484ba72a4be771a9c057e91c2
SHA512244333ab8facc1d5a2bbdac4764e2fd7a70c490fcae95c6d32cf77cfb2574c5fb411895cdea154918cb6cd5cf6ee567e8beb80a1f747fc2289df7e902500c62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526dd74ea2e5cf2630817b9fc8078aa45
SHA1a5790b0a069d68e2a33faac396400e90552b81cd
SHA256904d316c36c3bba5b3bbd3c7854f24676158f977e7a020acdb689d89214c0536
SHA5120815406a891a03dc0de7dcc5d8031a37a2893f64d5e39e5cc136565d82077345bf8c6e12d23553566566854929d0654ace52e49e78942156982413e8bb9e3fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58109fd26486f6e9ce1eaffdc8ca793b9
SHA1532b7ef57a720c50de118b5fb293b3f7f936e9fd
SHA2560bdc0b2de800e05df3a83f68d8a2c61d3cd2f3af1c6244a1b773feb9cc508393
SHA512982f746362f897f368a4551557453b82f1c96181c405f99b23a888c6cba88fbef31b8f7d8bd020f81eb8f91277d1eb798e6882e17519a50ef37680e23a481689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166867ba1c9dc9be098643976135feed
SHA1f3020afa198bfbc7feb7df7d58ab59a03723a42f
SHA2560a480a8187dcf83b60aed7b98d97beaacd5d36e6517e30f650ac047ad81c9f41
SHA512a3c835b709270ced54150cf70043932cdebcc3b94ef579b0b2fd98ae9b6bfabf6922920a498daefa2cdf34daae68900117db63da3810262be13cd59076843cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab17937565c5de957cb837bded54a43
SHA1614c79584814e33d80165ec5d050b89f5157c58a
SHA256ab666aafa00562c97fe756c147e46e92a31a0a80e731072833a378c3b2c485cb
SHA512fad601d712d090ec7dde12a0dc7b173a1c06948be5897b29e6f19208a325952906f752781af8986aac08f42d94c5746a1901a658a58c2ba24101901d126c7b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa755b71452bac6ecf82e0cff5a33d8
SHA1d1c9406e08cce51ef27c3b0499147a85a9ff73f3
SHA256086f041754fe7d59325a308849773ecc476f22d321063187497f113c0bf1c6c3
SHA512045ce233996e25b77005c230eb54a5004a3fd45c8eded52190cae9629fc63fbc6ab74fc91c0fe1778e616adcc87d9879944bdc9ede2683c5eb3dad20313731db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2be771d813448f17d364066b451c69
SHA158492cff0d1c3e5e269b785428c7cb896bbc7c13
SHA25668883693b8105ea54500320b664c93423e48b1cd3665f2a2aff3d1c5f1227a14
SHA512cfddb6b65bbcd47b1168a8d76f8154a5df77ce1a53ece0e48dd4b89f8a7853ce577b55154c34f779e3a0684094ee5f882093c07264ab25e41b26b472eb1798e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579193f1e07549d0c3c684d454795be94
SHA14565be9db5367e3d7dae55a8107c7ff2fe201423
SHA256de5067e0da2544e692c3e5f017f77105226db15e8f6882bd8506aa80ba42e186
SHA51260072f7f5438fedace848187da6195b28afbbaa01cebc8ad4e57b3d684b28ef406da74cc4f2c977c2d5e2e01b13a3ab2024cd706fa98769ff3941f28d115336b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399492f8d999613f60c67db4ef86440e
SHA13ad8a967ee4b01f07f1439b0ae6b1e786617f499
SHA256212c27bfebd91000be57c78bbe02d571c0a99c8539d17880402f4d7985001780
SHA512966716f6934942915484e58b287cf541950d999c68be50f63f794376a9e7b342db6ba0e328f87ef24f9db1a9898393baf8120f7f152e328f0d691495f919532e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23abb317a729b7fcee2801bfd43fb60
SHA1c9726782bcddd93bfab1521f516057f34d8bfc42
SHA2561ed1645e197ca4a362703c8224b93175de77862ae63ede157d4f54fb2d2cead1
SHA5127eb9319ce1b6cbe0282f0bd075b5ae4987637b09d1325cdde2e02267dac4f05c26f6e73c93cdf288e4043081a2f699d6553164b1369300e5d64544abedf9bd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7f6c0ea117dc7e5cb58fcc17ff634d
SHA178a3c7ce104dd87a1bc38caf8e6309c8e153f3fc
SHA25696c09699eeacdb37516e7968e916e9543313c3341e4a6633ce46a548b501094a
SHA512715068ca5f87b42da21528b8408b2dbada999fcc58eb1a770e5c30036020c7e7175f35c6f2b1bc5b689c24d3a6049526b7ae0fb8ef16a85d55f9024cbbf0cbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa77ed4120cbfaf5cdb7844eaa43bde5
SHA1128084a823755e45d251b4daa12347e78b133298
SHA25674aa101875a30f6ce034d7f92519e5e82f38612a745469e577e15e7395fa464b
SHA512b322f2e94d9805e2b664b1e3d4b0e0dce515ab1f51c93e68d764cd98b11c210a605d460bccc420951e856daa07ef4d2f0bd4b3ac5a86f4c6e07104e3f8a1d17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa4913570ea08c713397bdbf045896b
SHA1424fc583fa09ba98d88ea2166a17bd1cacacfaef
SHA2560b6a66346ee4599a7038a3507ac2e29a466fb76a01dfcfb88b61db0e0de292a9
SHA512558c36765a2fce3fb6ce5b5e8ecd536fd1394252422d3e12a467e7709f59ef06fbc659f4e07aecc76cc64498aa1f28aaaf9b083945f946a2626f6e39ff559bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3cd4511fa6a3c5aded892171b29cbc4
SHA1d6a81fdb6d2543093f78e943445764565b011898
SHA25655aad079e818d54ec1de9cc6d11a9851b5d8e3f27629d88afbadf0dae809d55d
SHA512f0d41aaf743573e819e216d30fa8ede79f44a4fa2e59b8931fff5fad946bd82e56cc727c5b6f14aefdf5b919f27397b89ef776cbc47464ef3e7ce47113e64f77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b