Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
ffb6f5fdde6a26525326c82436e55593_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ffb6f5fdde6a26525326c82436e55593_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ffb6f5fdde6a26525326c82436e55593_JaffaCakes118.html
-
Size
90KB
-
MD5
ffb6f5fdde6a26525326c82436e55593
-
SHA1
06ab6fde3a4d01b7db9a1ba3f31f265ecb3bc51d
-
SHA256
00ec68fb900905d1ecd2b2064457daf33682916c7d3a77122545700765d8e97a
-
SHA512
0c69fb2f5493780807e104d1af8fd61ba5b8ebc737a94274f67a9c5a88ff39e6f117ef74bc50598a24096e73185a1d89aae9f725a88d1be71583ab6eb1aaf0bf
-
SSDEEP
1536:/60Op2NR8TY/DnSFb3RWCmZkSjL6uGOMuGre3LWwuj49GrehNMTnadfKKyrhClJd:62NR8TsDnSFzICWfc49uthinz3/r4uIW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507ae372db12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000000ec4531b65589403ce034d0fcfb9944f05c9d95b04c90a4ff21e538d3f2e8ff000000000e80000000020000200000000f14abf19ac4d54f422cebc779a807f82f627db7022c1eced279086d3dd57500200000006d6a2bc15f6c493b3c30e048365a27283f62f80722aaa580e349267bd47e846740000000e7e140eba623ebed5894db271d2711cb28eb6429f4312f4aef5396de10c571028c6f797f4b63abf24ccbf951f4e8be53b750e6adaa99739bcb01f0fbe5f58269 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B2A92A1-7ECE-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433823000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000db2834fdce8c0fada78e31d3b67dee41008794362bd7f4f6e76265d411cf833a000000000e800000000200002000000002927f0dcfed36b7da8f84ca25a4ebcbd7ffc5e2bfbada13e5c9e1c8ccae038390000000721cc945d4aa0dea77500ba9bade60506987c0babcc11299f58c937fa535d593b3b521ba981679f259c9f73b1d8a1acb776b762f545d6958697b34d6c8fda5b462e0e47549de5678526961fc7f2639045183c29b5c31dbd25d38e820177d745884bd81707c7f0349c78ebb621139d74460355336b3274fb57b659d5110652d113208e5087a7972c23feb94f16b3f58274000000032b239674c2af2617936dbcf7e92112a2f212db3087ea083013320eccf8b624e5f106eb64d96970ca086587dc7161bdada1be3836a1d2d76d30d9a7cc90a111b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffb6f5fdde6a26525326c82436e55593_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51eacf9ce9ea81e327a3d81fad1a235f3
SHA18bd5a121df7e1fdab7d409971bdd4d0605093f8b
SHA2565eace03a8f11c1aa6306b683f8f58d2f578f437c727fc60079381cf282e0a37c
SHA512972d108def299e2c836e5c5567c1c2c4f45f2dd9d7d4f2af887c78d25ae0188db0c09c6ad024630958026ace2640f5137b17da39d4448dbe74d9fb40ba014030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76faa8bbdad754cfc64eeea300bc5ba
SHA1301257559dfa293467e5cfcf89f4208ed48c7b9d
SHA256e46fb90de12f4351d266918033e325c8ac494464c304bdf324714bcabc279a22
SHA512ac3260eb3c9dfb8dd3b61b1bcdd86d585b8499298bbf09fffe372ae87737de1a6251d69f4c75cc67ccdad1afeb79b91763545083a49d5036e9becb93f04c07f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d4b070d33a23c165c3aaf5a2293f07
SHA1254616f3aa69506108b55d6fc5fd19c896430cc4
SHA256654e720fc9b739ec17d14a8e7486e2410da98e57ef9022f96f1a5f3462f0774b
SHA5127995ae1d3287c00514a19d5580566fb4c105b749d1c076bd7b86f3615b3c3a940a218157a45d165d9853cebb1bd7e105eb0bb4fd4e2fdf9ab06526bc1276b3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51489d074e0441ee99fd291d0b813abd6
SHA1d0028ce320260e8aaedd06628ddd829b3d6e198f
SHA2566b9e3e8a6e587755488903d445d7781b176d13e0b66df2f55eeabf1a6ce1649c
SHA512f38a7a65242eab6ccacbfaf4f5a2d4f86617272037a57b0685626b9724a9a30afd9d51aeee1ead6b3463a166994a545b4fd3865168e3ba68c79e97c7d9c1b889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9803d85936ae66d76468ea7445868f
SHA19ba75214359e300357dee708026ced650de5b1d2
SHA2562e21901231243bf016e838a2a8d54ebf07774adc5bd093f382d1d97c6daae801
SHA512d27331c638f84450345e122efd7b4a4fe0c865fde3e0cad26f86b4128eb993e58e6df214cd666f253b7d4df32e2343d137884ecfc1122e8e5f3dff68a96bdb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eacc6d858af03479d80f23ede8bf97f
SHA125bb7cef44d60414a5a15b25a221d13f1e8750b7
SHA256bedcfc71b9de2ddf34c73c3dc3f602852bfee252aa5b81b39419abb6d8ed4a5f
SHA512fe3e942eccf76364cfb4cd4a8a27f17228d969561ac80fd0509db4d691d465b35403a232d1c6e48a102937c29c7a7589f8cdbf06eda0f5a15eab76d0250befca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe43f551d5379023a69cd105355344e
SHA1cdcfda43f3e2150728c3314fc18bc3382ff89a09
SHA256dddf73c57191533e2d5bab6308f31b8d2edfc768b836b2ac0d58bbd7363f353a
SHA512025ff116a230889cffa8a9ef245c4afb3125f74d69a36cec559b6e0cf8f223572ee187652938a3b9f35e0c06613cfe7583ca4cc509522bd4978ebfa5af81c377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538482605ca0ecae9ae0d987bf2551350
SHA1fa3590780421cf20b407bdcac6a2756fcd5031b3
SHA2563d2cc5e510fb297d490bc97dc372592274e7c75f0821f10e9c4499340d63cc0f
SHA5120ecef842f412c0c284b9fb23cfdd7bac612e1089bf0d7fe4df54914e0905dffe725616e26647f669650221de2eed3f9134158cb5957de73cbc54fe1199e71085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d0d8dbb40ce00e41d020df5b081020
SHA1f790a76324996fea54f36f10ae6a4f220f1118f8
SHA256e46c2099b9ce8f8ba5da5f9b559d0c73587061957c705a31b4a6454dbc7c59ff
SHA5121b6747d31258e0ff7aa0715b464a58e312ad19bc10c08fd09af5b973b21ec3f1278d574eb8c27f9c3d16dc386c261e2486f314d1cfef7169fa5131f813a25002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c780f0ad524488c0ca8122924f06faf
SHA184b12935d0bee342aa1f5deb3773255288e56514
SHA256969219902077b39b9b3756536ca1b4c55d87383b08ab7158fd37e3c13c986adc
SHA5128d40861793833127af2aaba465a087ece9e9b7d3c01edf0f2ea2dc8812bdb73238122b66adaa6953d0f3895b322c5642eed076aff3eeded79aa768950914540d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a527d96faff0050582105829b767b62c
SHA1aff2daae8b966bb50d1e8933d4f29132b0fc6c15
SHA25610e566a4d44a59c71f3029ed61707f86fec092806550463a175b551643db85af
SHA512c1f87399522ef742491d962a744e361c54976f161029ec1f7aa66ab4c92e0d85abcb5d68becc5f764df99ef3db76f5ab2f37eaf5d2c19d425e76043bd076e4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c92ebc9a600f616b7e1cbb4a266bd8
SHA18d5bc9630d071da66d865f3e8ce07ab8400961a8
SHA2567d92265e14b1ad36dda276c45fcb25c95a428d0b13774f89c2e95c7f73348bdd
SHA512615cb53bb758700edcd303eac5fa34dd31a14dbcc35a701b63531af70ef0a38bf55d16d4b532eb2f8408b8cdbf7459095e951be6e0be7ea3335775b57ca5ae2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730c69da8ebf366c7da23da6a8a6ca52
SHA139e0c432c38e301ecad140e3cac7d6aa3850af60
SHA256b0763298f8003f75b6cf6f16578e9e5a0aeeb127b9dd7395efb26e0ce1df03ba
SHA5124db5e70b642974a5ca4158513c0801a7c4dd49ecc21eb7f60de71e77bfca83e274f70ed3677ba8cd1c72b6f925e2c46ac0748c812fe70f052f953e4efe32f430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddae124356a70a3fabaeeaacd748532
SHA19b75512f1e2e89dcd79730c4a094562c50f496a2
SHA2560a4163cd118d1d14c04eacc347253bf301fd0d2b1211a1964fed75cd5cbd8cbe
SHA512b79d0d15591951afa533acfc1273194f33e6e7bd0c5c5b87f17256de94c98b2625629ea00aadaeea728d2235a46e4ba8478ac64d2726495f0a2fb2e94dd8018e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e2f2e7e7d434364021f9811b39c2ee
SHA1eaf055bc75e8d0510cefad4f2df43fe9182d218f
SHA256287e84ed3a80017e1a2fd337a8bec9b76ac8d87e7c18c8d167ea6ea1799124ed
SHA512ac04b2df9c21cf66f44588a445349256fc9d06a6d1d20369a1a182ce62eccd2ef983e984774f9cd1e0a8ddb8f874620c4682e0efafaf1dd47a451c8ace5359ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD589a4498b6e70340a1f52995ed42da7d6
SHA13f54e6f943582b8de1dad8ec0fd7fe8ea646e4bb
SHA2569f76460ec6bfbcd20174b8772a28c5ce6664d3a4c7965ca787d29d2e15ded46d
SHA512b95c9c1dd01bee925069525f214a05e4266d2df6b1dbecbf1d529da87d8d3e42d7c9695620a8d59999bd1793720a4de3303a2af71cd3cfe1e56414aad38e45f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52deb688d479d0ccd072fb1ab4689bb06
SHA1f5eb7c237f5e7b82593e9e1eda8dffe2af104511
SHA25646b99ca5ea3943d5aed100dc0da9989885079429ae0ec23a34ba44b86ccd386d
SHA512bf3e1a314ca4f00b69eeb09588a50c483028151e85df1e78d4d98de631f9e1283dc65e62b09b1f0e2554f030e1a68bdbfb730efe5d892ff76a7ba3f036b0c806
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b