Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
fea41c8fb405c37d6af953ab6e667fb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fea41c8fb405c37d6af953ab6e667fb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fea41c8fb405c37d6af953ab6e667fb7_JaffaCakes118.html
-
Size
13KB
-
MD5
fea41c8fb405c37d6af953ab6e667fb7
-
SHA1
a571ac65bf9f665bd80e2c5230f144d13e422464
-
SHA256
e7d4849bd0b09b6c95f2350c319bb1b57ec01da9ef8ea0de7c651c3affd92ad2
-
SHA512
69de4f9ee670ca3923d8d734f4ec21343f1c7e0c3069f4a9169fdc5357df5fc220e3f654e52f54dfb134b4fe25e240dcd0909bb5d25315a8de4b2d574b1ca706
-
SSDEEP
192:SWNBLTjBMCqwBMCmBVy/V/2/peWcz5HRmDgtjNtn6U:SW3bBMCBMy/V/2/pTa5xnnL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905016e67412db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003645b10b4e7274884bd323e81279a6340cb9ef4e8ec6d6bcdeed7520cfebb172000000000e8000000002000020000000103c2e702f366e86db539b0d8f557e51c85a06768d6ddde914ee1a51f960934d90000000abc4b5d532778b951a0daa742597be4633e84fb97cfe25bf6fdc98e909f85078156044fba6cdde348c5b2d615a83be598eebfbe12d95553488572cb594f5def32e96af449891decf4c1ab207129c4a6b88440280b7bba71fc8134e0f2da614e26e3747ff5f1899f627993cb39c94544d4c9628eb3a087ccae74d5b9c7312fb2bac1506582bbda1e45fb1244860bf094440000000a140ba8eb1a3fef56268b97890e242ab3284e48955e3cbe994fc0537976ddd6fe3a3798be7261bdf7ccf9992e212c3ef139ca6ef6d35d3d2fe14e4ddb117e59d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433778958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{108E3B31-7E68-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000105dd9a08347311c92ac7ba20351d42122544bc4d65436b4b78dce1bbdf52d66000000000e80000000020000200000005f0e97195a812b564e81bd1394aa0998d4c601c0433674c94c0ab41183923737200000002b4f5bfe461dc582b88217bb146a974d5e637389a87cb021afef7940611241bd40000000e3c75177b829c415112af86bfc81b7c7fbd186cfbdd611c627ffd220dedcff8cbbf0f3fcd0a414c87456d5d49bca74852b5ab950f392e9a05437b7782c34929b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2732 1972 iexplore.exe 29 PID 1972 wrote to memory of 2732 1972 iexplore.exe 29 PID 1972 wrote to memory of 2732 1972 iexplore.exe 29 PID 1972 wrote to memory of 2732 1972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fea41c8fb405c37d6af953ab6e667fb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4065adfd9edac3740b1b712d1038e55
SHA14681b4d1309e846da51865515833baee21f36166
SHA256b0125f406ff7d4305d2dfc254997ecbab47b189784c3b9e6f9cb6c3057ace52a
SHA512b09322b827e666a149c13c82da9bf287cd4cb1c19e11022967df6b492dfdde96eb7ca9b18fe4ab3bbced1f2f465cdd2f16d6877a6eae84add86d72dba74f28ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fd26e7169df010fe8f2854c0a1800a
SHA111ba81f20a32b6c79d203ee35cba111c4ff3daa8
SHA25677040969a1fe61c800db1af44a46c4ff38eeca9f57afb890de745a0f4fe2812d
SHA51294c07610950f4f8f56200bf0ceb547960ac8be3a38f77fdf447325d2f705a4dcaf68c27e3950704dfe36793c9dbc1fe0b333c083ba1c539d3af12f324953c2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139ae36152c4163b4cd032248255e88d
SHA15d3a82ef26a1d19c0d5e81eb8f37c63a35c251d8
SHA256fd32e9f74daba94e82ea71c7969b97ea2d4ae48a23a7388580aaa9a16beafd5b
SHA512786ba6a96b679a43da558d4b42ffe88e77ba32132e71a1f1c7953dabb75b0ea25cb8eca6ab9837680fd90c7d8d364c6ef490b7d51be90b1e2446a522392808cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ef751b9855d024421deb0a3df30ad9
SHA1fd62f5ee7663408ff2d1818a87d9698331163462
SHA256159443d6c7ed525480fa1935a4d573080102550f7aa667087d032b3e8cfc9bfd
SHA512128ed6d6dee2d8158d8bffe505241b28505e4edeaf545e210adefdd13e15796e89b60f850aadb4b8ac1d37e39e72e0ae0b8035188c5d79da0e848d252e4ee67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf15468ac6dd8b06bcd677ddfb1d4740
SHA1e413a6a74dfdb207d6723285f2b111a47690570b
SHA256957785fb083f260d1a46668d6c23d7d10d5f507959f800aa8b7e97ec8336e019
SHA512002a396568ff5f984783f4bef993b13064fa4e00ba7a71f8f606913baed28323b7f9fa47b5e531a55df85e0f50ddbec72a8874eb6ad64045542c768675429693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58478fe4d40ec9e5b1458fc6151a06dc7
SHA176b9df8abac0ed57b5ebd2a1cb4170e1505d9ebf
SHA2569c4ca24b42b7a71243ddeed1bf4c3b86ace29bf01353caf3eafc58b6732643df
SHA512c700f7cd91e65b8898f8552292577e7d4ac2dccea930add1bde495b8eb0f2bf58aed08c11f32e42ee86dedfbca6e60811153f2793eb9cb34fcf6e780f0bd2f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590745cd90308935b3736eb6170049c3d
SHA1b17eaceab08ce8f4ae27aee3b19f1daf2fd6924c
SHA2569cdc8223d5eba56eb8e5e73a49e559bfd2521b5c4fd987fcfcd9c815cb15fca9
SHA5121f8d268883570babf8b29d2bc46443ab8f684dafc60641ed5137ef51eed38215848ebdbf10b5d14a671e52225a9a6e1216fc7e12445f518593ce57eedf7ddfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e56624248de37b17e3c75b9134ff771
SHA177cc07160fd28a77dedfca48f1f632fa7f1ed29a
SHA25603635bb00c1980cc841cdb4ee92dd227c183e5ed8983491359dce7517c598b6a
SHA51234a5a06e6cd817f3df87815305c9abb9d5ff33adcd9b7aa8d39a7f7d92846dd3f64ad4a5956dd9a0261c632ae051becd2381e5c694b2bcb59c454101530bb8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21203c6f09ef5a9916a07206beb3c42
SHA1abf862072b378e1d3e0877ddd93a6c5126f29f61
SHA256fcbd5d4009204c68281322799be1e1493877428d1542b86587a9e56d25fc09ba
SHA5126cb049ca6057aba634eb7de1104f8b560ab27a1ca90e597e5238b3d95127f88e48ac7320e2d0283810102cb3443a11bc55b0c08791cbdd4bec2921daf54e6a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a25f17300ab4a3d9f2d5006670d6d7
SHA175db347c9398bed9db2f9bd687dddff392cd2865
SHA256231dce128427b13ab8fa39263dd5f287565c3de4212eddae9bbafc8d84511f53
SHA512522afec8620467dfa3849fd392ee7f0fc8809e7a721a5a668c9bfab811c2444029a2500709632e2542963a7bbdbd13c31012cfffce07e227629a3c018f4d6585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc00415cf1d5dd3b5a5da796dc059171
SHA19c8a2c5e7acf3f9b22e25679930bf295bb5d5aa9
SHA256018ecdb79986d08d6ae20657a937364256df8ac9f2987299cf9def72325f21da
SHA51298abf6332e22982fc643fd1021eae76c44b35935ec103f72e7ef8151cf02606133079183c17ded1acbced2e2bf24b1978a2d0e4b59d3034d12780b3412d8927c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f07c22e9e373e90fd3c2387838eeb8f
SHA162b4489481287adc3beb61399b649c80bfa1008a
SHA256ac9dcc52580894892498c1c25a9f7e471b95ab11109b29d024b73cf50c737548
SHA512a0e05baa67c16c9f06967db4c4214b89f7d07aa6be44da414068e34bc73380e1d7306a066ab89d85131538f0c19bf664663636b20ba3e2e86957e4ddb7004f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597efc36eda556e1ccb06fb502f981e93
SHA110fce76e5748722ee692cecc52758a87040dbcbd
SHA25670ef4b61eaceb1f117eb9f8ea4d89b4ff28aaa8ace2bd3209ce133d3813af078
SHA512565834091cc585b66c1b06247b889bdb5e6e7acca50545512b4c4df6729d98ee65284d931c7a230baa34d0b048c5bae1e0e77884d587e22abdb8ca20cd9e3dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e568584e2d38c04bd6073a34a36233
SHA12c9370e51193eadd461ef6d50c3dcdb4585fb4d1
SHA25676f3bf0e3c7a942a1d7b51644100e4dbed8f710cd279591daec94d49a193dc84
SHA512c8a23854df81a69d918d5051039a2c347ae2172c5a128acfac7822d06aa859eb336234b30fc66f7c572cffd1157e888287e80ffc2d2239381dc226d5499d15b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578388d0374032e0fb9a1a564a37f2433
SHA137015d1e54f5e62cf44cefd4458a7b3e6f11c314
SHA256a7f9318a5adc9de56215afbdf33a948f611d7387701006970b463866ad387437
SHA5122c0beb86fea738663f5925ed85a0fd33b47155e7a16805c66dbbca2c3f079f7d8ac3693242f0a569ef68b762e4be49638acc42bb0607ff790199ec2599a63140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecb23d8f80ee06f3cfd557dbcdbc161
SHA16201645bdd6b14bac3c95ab304b68002df1f34f2
SHA2560b10ede027ed99b6d92cc79df47c0a0ebc557fc961d2ae37c359eb202c0bef8b
SHA5124a2c4ffc2a6ca445539d74119c9ad694facca932f1ee97d40439080d046841e620772327f43103302d008c2477517f4224d17b94bd435d3254554342c43a0445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de69465555df73285bab74df9c087c35
SHA1b6363a55822505f961bdcd7f19f91ab0b139db41
SHA2569f89e92745635c9ebdd734ffd77b6560688b4ea677864a1a5afc3947cdd90e41
SHA512cddf3cf25b9e3cb920861d9cb70335aeec5c994a156173917b6d638d5255e5a50d401c33e58743f614320878b7923c8f8fc2532657da8d76b1e2e3636dd6eed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b276e147c7f07a51e8968c3f37c3060
SHA1d606aa903bcc39bb7288c7d359ff417863d2f9fd
SHA256ced798fc91241b74e33f68afd6768bc3b361a939a4b92bcffc04855cd48a35f5
SHA512378b294f246dae8ad474449279f1b4115338ca16929bfc6360768f005f2eca608fd3ffcbb5cd53a197e1f240f0c4ac8bdfc27b640bcf2afe2f72da98bbdd94f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a179dfdb840537ada0b53ff0dd37e871
SHA141539223933ef70c0b4409208208efa5e294074c
SHA256bc9fbc7bb13ab76c676a041e282a36f86fba26d98099b7685dd0c1d0963f9849
SHA512dc0693bcc29005a9bcdd71e8ec54ed58860554d937e03bca695d080b295409e8995fee9e91925449510e369af2272fb93ec8792f3c7f8a580c2ede327dce0497
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b