Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
0cff86fb01ddc2387b47a5bf4c39303c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0cff86fb01ddc2387b47a5bf4c39303c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0cff86fb01ddc2387b47a5bf4c39303c_JaffaCakes118.html
-
Size
53KB
-
MD5
0cff86fb01ddc2387b47a5bf4c39303c
-
SHA1
350d209ba63168302c4971207b5ddeba50db5343
-
SHA256
692ae0202e4db2e2096db9d0f7afdc8219a6f972a84eb4556d907be68fbdf07c
-
SHA512
d09fcbd911a5172cb681fe66d0873b691dcd4742fea6a61005cdd8c5b67d84bcb426a62be62996600aef810743683e57de9017475748640f351946da028f3944
-
SSDEEP
1536:CkgUiIakTqGivi+PyUurunlYB63Nj+q5Vy0R0w2AzTICbbOoq/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyUurunlYB63Nj+qG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434075411" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D05B841-811A-11EF-916E-DECC44E0FF92} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000007b7712a5f9b33cf491f8d6d526a873710b31ce09bdb69f2f2831928edf8e326000000000e80000000020000200000008e5df91e7faba3abe197f3a6a158e4586496b6eb87a18c4d14022ccd8800dcaf20000000e8c13888ba0f7c0c4fb36f8c981772cb8fdc520b6d6f9701e4c9f4d0da75990840000000270be5f37a1f0e0a0d3042a969879631b4d697f2df59af11e8c2b8c2a06a5b3f11377b730039047626bb697c978c3f3a6d095fd05a66c49d52f9233ffdb9a467 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04ec4222715db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2844 2640 iexplore.exe 30 PID 2640 wrote to memory of 2844 2640 iexplore.exe 30 PID 2640 wrote to memory of 2844 2640 iexplore.exe 30 PID 2640 wrote to memory of 2844 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cff86fb01ddc2387b47a5bf4c39303c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04853e0afb9d6aebc5d2a1e29133f1f
SHA1c28f46c00cf4bb3226539e29e40366f936aeb890
SHA256dfa9e5fd4e0adc8a12eb4b09f12d77d333c086ff53ec99d3a7f92306f519c3db
SHA5125b4327de8493b37b7cfb666e80e943b01ef6945333bfc70d655c505b99bff0444821e6cd6becc4d68e1cc5c562b8d5bd6ac61c21a6899137676f4ed4981d7d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a0ecf83884f11171296cf8c53180aa
SHA1c1e494a9022133824da841b24354093763f10a4c
SHA256ddf880f58e79ef84712cd6da527db4c7e195355c7ce194c19d353941eb989e4b
SHA512df54cc8f1ce5bbb2a08a83e6bfc7c6f654e217caaf66fd196e7d7a9ec9a68fe19f1a17ff11dc68c0974d126cb0c2a90e7a27e016d0f50f8211b233fe1b29cfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d042e849fb9f36976f4fb5196fbf8ee
SHA1529825bb05edf275d31bfba4fa56d83e13cfcee9
SHA2563c0ad26a91e00e0da2ae98557638a5bec8c9173ab1565342d468b951c5d46ca7
SHA51265f1f6f83d661d1abc6dc7a7f1e4612f6f2eeec7d4deb393f99f49ca2f71c4c7a56b0c3c3b4fdf0e2f22c08432d1f1b12326cf0ec25a967cde682fad38ce06e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d4aee6ea84d07314e0d344ee18237e4
SHA1db17de42543b66169fc94eed9a5f1d00fde3298d
SHA256a736d7a0f5b9e14f00ce26c05ecdf8839c8c818e4f854c338996caa115a75e72
SHA512f599c934a315c0071d52924d1ba51730f1d4eb7714b943be9ca0ce7d7f5edcfa3e694ca9930e427e8ff9f41fb0801af8081cb6aac90a2c5382b32a0b0246901a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587af2728ddbb932866402a99bd13554
SHA114fa56562088aae0781e6778c09dae18518c28f9
SHA256b40a7c6a01c12af97cb1e704ecf0c2fcce8f978504e599eef68ae3ff45d28457
SHA5126d758425ad2fd76b06954698c2d87c71deca6c84d1e052b37870df49705aa695cab49cdd18476e5c22a328c157a34390405c183df1f30d4badf108e561c5ba1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3269225aff6900f84c1ba022f7b5d74
SHA128068d30e0515c343f18f7393298ef4e62957c4b
SHA2562c2ef2a9bd5fffdb4c33be022caa6ba6eefb2affdb4a3004e41358daf54303e4
SHA51255ba53e0752ff1e65cc95507fd5e25749a8553370c37792fa0c2e77e7fda069bab6feb18ce79014e2de15575e267ffd3d585c594f8d946da9c3d887c22926e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51873a1be846f55295805328e8f231ef0
SHA1ec1ed4668c68ec224a08d2a500bb79023b2aa291
SHA2566b9da120f3428aa5aee053f620bcae1e3117216d62018fb1b20352b9f595c5ba
SHA512a3910ef1ab90b8735ca48dd35020c167e9af23f5472c9bf759d85644bb41f34e778f20ae6c562cd51307016ea9fd5e1be43c4c7221297e5e5e9d81a1189b3cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52810de40d9d9a8bff13e4fccb6ba0c71
SHA19a32a1bdd817f5367a35107c090449a37d038129
SHA256bd6bd9669e3e3d84566b7a8514c7b8ebd31002ed98210fe10217b4dc368b5bd9
SHA512d62732abbe732d9625542ad4d3acad71f9d2ce7bf85aad90ea13c1c54e93b858d51dfe4d57c40e9deee84571c252b093274833eeb70d0435fc7142eec8088554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521256769646db270b343f0d28248f3de
SHA151f448afc73e59498e528dc30fd0c4af29d27169
SHA25683c22eefa764b89c6d65f089011137e8e4ca7ca1d3887eaad5cd876440ce7b5e
SHA512d5e62112231583d0868cb2e8ddf598c76786442b4c50cf3d899eb2de38681a4dcc5a11f8c7d037ef283f12eb5cb5d6a14c00b3e3cc0ef8235f271c1909252b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb220fc77cdc4efecba3aee5a910225
SHA1676751b5d68997eb8592c7f07c7552c349acdcb7
SHA256f737c0ac51e18d4efdce3bbb1016a2c7df67f618045302e5cbeb496802d7e6cb
SHA512606138ff229ad2eb127fb04ae6ba2f20f43d8fb0946c8442727c6ec915501cc993659d52ea12a7729ed0f57c9a3abea34f251f54a13be9d72d09095293b0ec0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575366fd3c18cc7c9bcbeafb4468d0915
SHA194dbe132f8d720128b78f44907a1ed862ed8d65b
SHA256c85ac5d60e49b7a942dcdef2aff57049502bfefe7c702955b77c77df0b35e70f
SHA5123ec05bdb3d3163dea34b94accf16a7926420eefa8ec061d0070e31aedbbe124bf18bc3b6f4b8676864ca3889a1d09faa0a7c3882426df23755a2bb3452c5aa7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82bf3bda4f7a183a3f34cc0c0d68f87
SHA17b26bcee668c6e77f93e41f625216b5bef917f4e
SHA256ede898396e2be1ba10114e47f42b449e8fb5a9f6dc7ab2ed21523d046c790b41
SHA51219d7f301af1c046f5cd0f4fb40444db8dfe7fea86cf330e2e336b98ef27b327a19b5f889755a596164f459f9853a6a957c9000f3e21747014cd982ea60f3113e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410946f65930cc3ae22eb3ba36e384e6
SHA19651bdc34f43406728085ea21ffcc16103171c12
SHA25625693bbaca4217e72b5381a9ec766a4bf3826635267653faab855f5947b5cc97
SHA5120188beba4d14e4b3e0c81cb21ff5e77a62c5b0cc72337b463bf0429e65fb8c7a6e6f5641f85cf76e94218e2da33c9c1029eeeb499ecefc05edd30be1bda283d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04e78fab83166eae4ce91411ef8bd1b
SHA1ee9a5595bc8ac01ae25d9beca535398bfd12c2da
SHA256956f7f20ece6c850e529c1ae15aebb18d9ec8b22f74f88663c529283fa7445b6
SHA512bf3f46828aa0e0fd59554572d9272516757122127ef6ec4889a7de6fc75fcdcf23d0c7c7fe8c7393bc79d4354e04bb048f13f7ab8de285eab70fdcc2c478e0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e493bffb9c56f36735bd6666285fd9b7
SHA112c89a63eefa2505a74d452cbcbde1c52efeafa3
SHA256b94b8d5d3082c3bd1bcf2e9585174da56ee586f5e93baa6b93ffd44d4541022f
SHA5124acb9a1f7d33fdf8f47fcf5e9254fb0acd58629656df6732205c344155cef91e9cef736bb5a42d7ede87ed8dc9d9583f263e2bfca0bdbc207d4c1c4692e4344a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551422652b610a842895d6c73b2c9cde9
SHA1f204741e136ccfd874145c29f0cd5d5d94bc58bf
SHA256e912e42226b8e83a0ef1baa29db926f0ae41e0270dc00756c6f18a9cb49a7423
SHA5128558cb387a26fca3e32b3626c99c4e60c706df03970734026182cb2d82293d2ba6983950cd21ee426fdeca0c325c988c64796711ec5e1b9ed35771e6d08fea79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f1133fcdd3e541612d32bb88598fda
SHA1f93ffdb0bf0ae57e3f24beefccd0c5dc67a8ede4
SHA256803e9ad1e361b5d6034784af1aa29ec246351fcfc103e5f498d5e24bc49e9304
SHA512fd0319f10cc73aa68b92d51bf3180186eb9aab01cb98ec1217837977c24c2ae147f625c65e379d25d6a5c9a2313e6606701c69561f39068dc0065d0ec0924074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d621a956e770ecc4616cafc08f8253
SHA14de95798ccb9fe3cae20bb6033e3982932cc6fd6
SHA25679a15d7abd3555974814bd0eaa61c264b8f2dc137b072cf20c180f45d06dbb12
SHA512a73d40edb27f48f199a1c8dded802cf46d7328cbb9897cb9766911df323d8deb606b3c68faa5916a670179ad95876a01f0374c2a76b8348cefd0a771343656d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce8e19addf5e80cdc5fc37971aaea6d
SHA185c4d54d507a396376e473822d434e3db9ecb25b
SHA2564e0dc6f02164d817a11e476f8271247e54d8c93eef597905c75fc65539322cac
SHA5122bf15141e94ef94d23a4523c04b734c5205aa2c63c851385e211d6709de15554e83cfad3320cc47b5d1f46a72a77132f957521ecf3065d7f8fd778aac7ed4ff0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b