Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
ff715840e3c3a9924dcac6378f9d782c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff715840e3c3a9924dcac6378f9d782c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff715840e3c3a9924dcac6378f9d782c_JaffaCakes118.html
-
Size
61KB
-
MD5
ff715840e3c3a9924dcac6378f9d782c
-
SHA1
ac36aa3202ffca4ecd41273e7c4709adef5ba6fc
-
SHA256
bdeba62c942f21dc5b7f65fc4d7264b70496618b4ec25a52ff6d47292986adc3
-
SHA512
c17d32ca3f3e42494a48fa1e85442a13d6a065ce18782c2e2f3599f9198c059fc85da811bde970d5e69145fac727cefeaacd20623dac3cda83f6023bc0241f5b
-
SSDEEP
768:RGoRQ3o7mAcCu13uO0oU53i343CqVUZ+W0lkq3FSesUWA3QS:RAgmLuO0oIMeBVUAW0lkEhl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c929c4c212db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000000210916ebb4eba251350f996bd933804af92f8ae709e0092da2f5ab719d944dc000000000e8000000002000020000000573926774fb5d97c63dfe55f4a1982f190aca3c2a8cfa547f27af41d204df7f820000000e93cfa8e1080e976e0bd090a4ce76451fb781d7e10826c4002bdf685d88438a7400000005efc1efad3705aa29e5b28aadac666fa3456b84b9841cb64fcbe0a8f0229873f853eb387cc4a29dfd6e8d04b866dc781e17de7c585a0346a003fac5780dff2a0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433812401" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF73A2C1-7EB5-11EF-889C-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2248 2084 iexplore.exe 31 PID 2084 wrote to memory of 2248 2084 iexplore.exe 31 PID 2084 wrote to memory of 2248 2084 iexplore.exe 31 PID 2084 wrote to memory of 2248 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff715840e3c3a9924dcac6378f9d782c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b99cf0275a92d5bac393b130e458df5
SHA146a497481b6a27b3b37fdafb56add7b7d90325b0
SHA2563db08af8f35ff126ff2661a7a3c0b6c9b1a739e924502cafb873777789508456
SHA512c2c96a4c7f8fa6cf3730eca26fca8f3740ac0020307d1243e9269c9cc8e9c43a4c91b3138781f38d7cbe5451c34d52dbe24537d5cbacde48e1d92d41e1e26e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501274751f003dbe6ea26af501a8494f
SHA1a8cfdc1f05c4b7de65c81c751dfa17e788395a95
SHA2564f5ff3e9f2cce65da02ec5ddf757bfeef232a2660fb499dab53b695f8d6631f8
SHA51239e51e31279f3023e27e6ea5885eb49745c2d41a29afaaa28a08e6977eab4ca416924cb306ad0607bb64915e6e8d63ff8a1d5302c2eff04e07367d3437dc23c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a82b488c0ae8c76c644e798ef50944
SHA1ede65ea1ee7d2bf519f5056b9591cc278a2f393f
SHA2564d6d96309acda2c9abba76b5159ea092edb48025170f0b073bec1c7c7ab1d9de
SHA51222726709383cfe7b2022c29b867993a4e2726badeff03715c24d1e7d4ff1f68af3927db0e7c927ddeca0b1ddebbc14c0f44cdae23e8460e3072c7fdb26698a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206f0fc8f0141847e5b7702441dd522e
SHA1f1e284515483a5df948384006572fc379c13b70d
SHA256f90e464e1ac36f45d4838587edc958f0fd5fe65332ba5ea4108440498b1afaf6
SHA512915988c850c6e1fb2b04ef675cf67d41584e2c09820fc6f442f584b4c8352b5cee5d63a6e909c43977c5cb6dd8db75b2dfe0158e849e5dd3b446b7f4b9933196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043b808a7d8dcdadb6e64447ffc0e1bb
SHA10ec6c330fabc9ac0d6683799e12fd895b9c6a660
SHA2560553ae25d059cd9fd4c26b977e9af95a5a1e6921cfc3fefe508fbf6591d7a74a
SHA5120de6c440153859a0a526f598d64064822545f9299a3cab64b933c2dd1afbc198dceae6f08b9dbfeb71b9de15a4fd46f92693f1d92e465d2211ab1587fae9a784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591659040fbc254d2b4595185a87c6b2f
SHA15e9d8f2ac9fc11c320053e29466204dfb1c702ba
SHA25682f7ed42ad2696f49e800fffd3001795ebc8d51c030f28e6d6a277b5b21b23e1
SHA5120b22c76e55011d81a8e1928aa98c4889fe281fc4ee22e079d5e022e67dbbb3e59ed921c441526155fa28f5461f83ce78962416de03a0ff23ac27d3bea62bb10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc5530ad1e9f0c65e248dbb35f3341e
SHA1f4a66b844700053ab040bddaa5d3ce844dff266c
SHA2567fcc1ff504896966ede18a6935a90abd1b97b227b24fb56218cc73bf5cc920b5
SHA512f67dba0f9fd389a425b1a6ed3b749de30725c283e8763c3f8679bd00b0bf451b58ef78460788254534d357da9e9d0d83465d6e16d625760fb8d0af5c47f8e27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506fd2137727fae3c77c5e862b2852c73
SHA1c3b02fb9412679c451afddf45d18f08712a5b4d8
SHA2560f7cb7433356f78616c6b1d8c65dfbdad395d0e2b4cf298e9cb25757f0a81c65
SHA512fc3890f6dd85b62947e52693d580d9c1c964ac306bfa22ff49c0b61d2c83303a9f6d252bb95de6dca074a0551f6dec186491dff8cf2e8c238ada07059ed56d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a811619b9f4d67013f1a5765e97e456
SHA153336023aac49157683ddfc509bda23ef9d248e1
SHA2563b95a2b4ca16eee2bfdb47d48dd66da2a3998b060ce7687c9c75f1ac737738d5
SHA5126995b8d90a65c97a54e8a3dfd0e2c65ae2d5fc41a378c45c5c3fc530094811cad540c36a6d6121a8ffd28aa8c65498ae2a2b110d89a3b23e0bbb8d964a11d6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5057dab1a2988e3811ddeabde18cf5d
SHA178a4091f3e4e3d0ffdd2df8ec1d8d10721658f34
SHA2564d5a7001402f95f3a8a4f8dd97fc0539b965dd0a93ac5d07f763ded527b14831
SHA512ad431588664482d550ef59613cc721a394ee67e95a02832ba158a9705d965308e68eac80577bc2273a5d4fd90bf97579a0de350cfa8f72d257f788f34058a85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f966aec52bc149a388dbdc5e2122e60c
SHA139e778c39cd24e0db85cbc3bcbe0c461ecfb4c3b
SHA2565b731c2ea2aba5372abd16b4723f4aaa3fe2e17c09cfc8bf1e26a49c1ab80447
SHA512d17a6524675c17177226630ff02fb2073f5b96429f4f53b82ead2504b85cda82bdcc059b721b0225ede9b4a392c144b19b751dccba75e2d740008a68f8efae42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe519e57e1267f5c69a414556f0c1476
SHA1f5caa6465d49d99c05d6f6bd4c7089ce98da9181
SHA2564abb5746f5334090d76555b87b9c51a417729b7df3229c8d860af30d3e4bde98
SHA5124965ef6a14ca7b6261d8468c50183381489343f1078211533d8066dad3c59542f940798ec51075f81373bfef18dd1ccfbf4e0a4598c92e1941a0b92a45be7ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2561a1d9afa97a0d7aeb1678bef85eb
SHA1f92f0b72480351ac91f821708e64acf4fde4b3c8
SHA2563c9bee6237350f2435d835e7fe8758867fd96db91ee85e8e7b7f69dae32d1bd1
SHA512dc1b96f36647adcb3f1d2a4f273278ad0cce6e629ed312199a56ca0dad3be8ba3700666fcc5a3fb4d879c325126689e71e2858c386636ec9dd83362697295a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54288ba108d12fd73698b37e06186fdec
SHA1d2275b1a731aa61941820bdef36b263dcd598d31
SHA2563fc35db5d2f6473caea49f4ab2604ed605c10c0583b26f27b4a2ef9277a75f45
SHA5124269b44d0f8d6351a1b8691be1878bdbaa7deb1f95a4f5f79a0d53bc5f7c9e577d2924d1527579f7cc52a3964e83e11a50b714a8aed555d836907100d5fa5266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd018378f93aa0a90340e3f62bc889d0
SHA1456152870b78932ce8ea4b38c861f143cfb3d726
SHA2567d1d8f39208f91c50850746276790a2036ea1563f790fa56647e20dc8572ab7c
SHA512ec4fd371f77d477f13e888ff37dfe230f4e7287ee642bf804960c9fb1da220c0d3bececdf0777c70a8a5b5307b7217e123da32559b20a18e68e9b393b989ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceba902cb813458c9b7f3b1cbdbaf28b
SHA1f9b5c06c20f22c73ee9a9ee9d4975fcb7c3acd43
SHA256c19dc5f377e1d2e9229a1cade1ea8d5495a28b8a98ae8f4f0e59eb816a166a36
SHA512a7b2169920d96058ad12d56417574942beccea042a76e54771e0512c1a6725d3ab50d1137435643c71ec0b05f013f7d71fc1793df1d0b74333d97143689e18ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1aca8951d39279cf23ef04b65c879c
SHA1827f3c6ea0ec022f6dc94a71bc68f3f36854af4e
SHA2564ff19f106c7056bba2ced9b1b3205ced879d16fc51e0bff1f7f3cc1c03cd8e4e
SHA5126643ced0d66be6ccc63054610afe017eab3656ecfb8647f8215ee2da29322a5a71598d901e69694bf4d8d95717797a4164d42a3675e61dad38556f9fcfb85b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc049af3f71d68f025bbb7cfd3d2b2dd
SHA128b34d9bdb9ef5b4200befd7fdd2b8e5f96ba182
SHA25610f7a7bd7ea178e597ee92398d0366832567bc15a596759698fd9deb836335b5
SHA5125b57dd05e98319a8d6a36d558bb1851ab4bc1b37ac70fb6771e37e5273e7f43b425f9129ca873588649839914b16e3e37325eef3715859eaa8ad4b1fc191ef8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a2a49a1cf7ac91b785dd94bac5ee51
SHA115cbab3c9d101aef290fb6b677cd68c22e2f7389
SHA2560515451ea182e7eb61f50be3e046bc9f90662039f3b3dfadea1ce4219cf6263c
SHA51225164c88f57ec4b0d83c77477c4a452ec0ca7c05a352ba2efe583a8c757993423121bd0c80f346fd122d0715eaa89358ee6b3d36ecbba0e8a3f12306dd9f590b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dd75df6518c123680c4ba1d0ce332f
SHA1144bb81d42cbcbd5fe9692a97cc002988a769ca0
SHA256cbc4d58f0c0467b0a2b2676953ada0cf8248319291fc533afc307da78768f773
SHA512e0d9d0d02412b12553f1dc4fc7ffc38f18d1ff9220ab914635653717fbe38be13f0f9376ac9f475a05c15f182d8083c3b69b11837939ab5a0bef3b330a539d17
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b