Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
181f016e605aab6f85710396c399d936_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
181f016e605aab6f85710396c399d936_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
181f016e605aab6f85710396c399d936_JaffaCakes118.html
-
Size
33KB
-
MD5
181f016e605aab6f85710396c399d936
-
SHA1
e6d2aec1ec1afeb361b8fa3386a885e8885a555c
-
SHA256
3791976f6b65edb47b7b73474aebaf9e82b0acf5fc890b7faf44b974238665d7
-
SHA512
df594b9ad648a32fdd4d0911cd29cfe389a491d2dd387ca6672d20745d19a2081d6c5adefb2d6225b4d141d5e60c27ef0396ef84fccf702cc6cd7b6b366e7dd0
-
SSDEEP
768:AIJet0unxggxZ70UDC2j09UWougs8EqZIwW6DC0IcbrUSZc2v8aGdhdI:AIWqF/I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43B253C1-83E0-11EF-AE95-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6042101bed17db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434380338" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000049c5bc2f9629a2fe15820424113269b467b6c02a9f36445b6dbb7f28add83dd9000000000e800000000200002000000075fe22d25fc5a0428edce6e6d330f04f3087b59041d294e26ed69fddb72d964920000000ad81c7b59c5fcceba4e8a2dff2c071529f61093063a34ee47937d2f61b80b80840000000f51459a97a0dc35977a84ae52b2cc82f596918c79daa84eb5af0d29f3718156eac3af741134ddd1f5f1e003a59547b8cee085a784bdfd01c66b533e8cba0c646 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000de911d76721a1d7e1da424f4817514c861aff1f286a748afb5f2b1f92318daa000000000e8000000002000020000000b2374403ddaa81caa64392e0fbc78ebd5a0b6e76d462617123bf1ee1d0de3e8390000000e21fbf8aeeb79cb17b18241991c92f63ee7d6338bc45f974c4b255f8e60b2284589364df39d689f5365bb9ff98cc5a68a6f8201575d4a0bb50336cd02bd1de2e1e5733cf8713e20acdd64b3831ab2eba2499ac9f3a59d18627c8e52f8d0d4d7d734b97cae3e0f7d1bd31e61570299af61c6bd34a9ff24f10da6c3eed5c5ee5de5cd09af550576b10594314ead4ecd64c40000000049c3c3447074200177e9fd0fc1b5aea9bf4a7a389f750206e4ece336db926673648f1f3d4768596b5cbdf5b2d21a6ac118265a4a3babb39e1c6c99c6d4c7925 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2784 2196 iexplore.exe 30 PID 2196 wrote to memory of 2784 2196 iexplore.exe 30 PID 2196 wrote to memory of 2784 2196 iexplore.exe 30 PID 2196 wrote to memory of 2784 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\181f016e605aab6f85710396c399d936_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ea7655cb5a7b169f92463b454ce9ac
SHA14e89589de0978881776022eec9c0fdc0da1a170e
SHA2566168f461eb1d9a1324fcbe9ac0e4142772e4339e3660f1b7d5e94f557b22eb27
SHA512a4c74fd1326e0b462e47d2b89241457ef8967319ef5670562af873d650b3b1d802e418d27dacdc903095bfe2b508890a055dd632e47e003094a2742e911b75da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e85efb6740c3152f92b7b42c1852137
SHA1c81bd2aed0ba75096197d1aecf623f74d4419afc
SHA256f71678d14058ff207ee8f503cecabac6cb21296d3c7a4d79f91d2c25d004f642
SHA5121fc717304c852734048e849351cce158373f794646c52a992f586dc3de534b0e6fc57ebb569a304eb092210f3793cba87366005dcf62a0ee032a46273fbeb8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc9b157917e03b104d1de280c26cee9a
SHA1f69e004fd19f003755feae89001d96f35024f504
SHA25621c2d1f3c26b697cad6176f4bdaaa2620b70109c82fc31e932312c47155971a2
SHA51279a981ccc928b6fef2b7409926080ad732a5baed328044d4f2602778925fe8601c1bdac01fbee76cf36dac0471466e8797522b801958e6327a8cd5a469203ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d523907bfa06d936faf23897998fe32
SHA18e46061128a1964c3cf556867dc9a0692cb84c5e
SHA25668b8a3d91e6faf1a21e4709328967d1f9734f62753326aababe503f336944f2c
SHA5124685eaf8bd3344de59164f4cc4dafd5856b3448cb38ccb5a1a8f9a03a029efd3fbbe258e1feaf6c71788602dbbc40d38621f6a342dcbdd6ddecaee31d0577a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8514be109fafa13f9bb2e612d34638
SHA103de7c22d3db61aa1548b308e3d2e84b97933ea8
SHA25690bacf1a4504f0289e8b258c773a40d587f070f4150f1ff63829cfa6d9b65d84
SHA512d0f8f8341106ae1d688dd79d480c700703ef9117b0be1dcd915ed1900af07bf56ac9bbf24129790c9e06e9c483d5638a8f4035d4c5cb30adde6d51167dbaf413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebff1b9bb07d12d1f6a9404592bed5c
SHA1255ac7f74be463c274ab8c460b0a3829ecca8662
SHA2563be74937dad619af0c08257dfee6e80f67bbda39696aa791f2d8e559d1e9b6a3
SHA5124245ddeafc6dc2005f3ac4a520922a1f5bbe4305883e93c2594ce309bdbb61ad4dabc9793bba04f980da91ba9f3835af850ef4e8e55d93acfcb3f7ee671e006a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559fd7611a7396a6599e06589d7f95e87
SHA15ed6c96a0c69a9a45ba8deef702c3a33e6b1c6ed
SHA2561eb961b0d1b24612920fd752bd0a583164185c2960a2566a0b7aa55d3e47391e
SHA512d4f7a0fddccf54543ea0d576d49bd9a108fa41f98eb7966cb546f9cb23d4fc7a66ba6f4a6ca2aadb57c9ad457710a908140c0a31b6c02ab7eaa22511245b42b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e925e91eb9b7f0ab2b7d97086c7edf6f
SHA1a2a1c01e165cd12384ab36384f00f5d2dae0d56e
SHA2569fd4717ef9ce4d384790d6d14764e8487ad1194be414feae00853a07f1a7f076
SHA51255304b9c51709b39f47795515e4d2dec1a195569d38375262909fcdb5316cb52cf2194ab4a9b6114939516bbf8020126584160cc2840d00baee36d9784ed1db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddc438bba6c65df11a139ecad990bf0
SHA1dc57945742fb73a617109fb529c607034ce6ef9a
SHA256b00cec846c72879c57869ac314b7a219d9e5165e7769e92392debf2dcc209cb1
SHA51203222db225cb4eff7e9f814d84a29d17429f9a6510d382b60bb28c21298dfa6f8219b13b885484d066f960059136e609a643c194848dee01ca6508f8db1530c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539115e84415f403ec236df677aa62568
SHA197d9f7a636be374d2446b628a17bc5301a6477ed
SHA2560468d3eed3a912b8d272792c00f3dd753c8749acf902ba92c5d1277ae7c464c6
SHA5120b23eb74dbbb4aa0f5147ff6dcd08c7aca10858227980cecffb01ced8752aa65409677cb5368d9e01ebb38003ee9a6185363945216fd25bfef4403a94f4ec748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523181bf9177c6b448a0fa5a17cffc615
SHA19a1176d829c58e22e8dfc38b5ae49e3e13c59735
SHA256f5ff1658534f10776611f67ed5a7d53361d19d5a8a7b281c76112ee51d5fb67e
SHA512d11a7d5d3d875f334fa7db3305ddb363d1ff359ffa97ca282aa117c64449f3af21cd050b79b522ec0228915ea5cfce36d9c83df35ecb0adbb1ad9a4c7d7105f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59748d5cc93478066a531330717b98078
SHA1a55a1e642b92bad8b29eb0ed4d86048cb9611cfc
SHA256233ebc6a1cad3f6fa2c0c4f06fc54f5cd29a085f00d8873587db59488dc3db6c
SHA512265fdfb180586536800d69671ffb8589a1dbb4187bc43408a8fe7ea8ef62a917bb87e54910124bf6b795e4bc34f7c5a5d4b40e63a02084de240f4cdab9a5da6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfafc76ae8c60f4e406812ac841f4f5
SHA10a8e4464d0b3f22b64a24f27f3afa0ef839c237e
SHA25670bc230350b99521653668bb51f00afa9ce5545d42993a7f1be00e34ec5f4db5
SHA51291bcf99005b93650dc2d239b4c5e4fa4c06a07df77b380e993e463be1aacfa6e559154a6d1a5618896f554f7479ce93586d091c04210f2a255c17a44011ff11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e4a1610e6fbbee2c9e1f1e32f203ff
SHA162602ddbb9b43d8b599e480dc2d9d5bbb5e9d5ee
SHA256e3f04e1f5f0c2d6019bd8d8c3c84f8e1eee6d57608ba117244dd14140cf5b037
SHA5126df032ebec50aa188eb44ae003e6b52b2c4349b7f2449d98a9d646aa03a762acf96b91d5b9e823998a3d8fa82d5ed067da3a287a62b01d49de39449c05226ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb1b25000a078a5fc3b6737a9bdb37c
SHA19cb8f8cd9d45bb7775a081d45de33127c8ee0be9
SHA2566bf97a57a1dd839765629b283862dd0b54346e59aca31da2cea7f01268217fe9
SHA512059dfac670a52d8b116016a008623e0bcde31d908a59a3ff5a1dd01dc0b6f13ddd4e9283f335ab2bd513220207da0c834cbdb83f337f1785462c773d739f298e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576db73de34afcb2f0e04a2312080e6c9
SHA15c475798387476f8920d9a27938bbf63a2fec3c1
SHA2563bb1094265583302c7db6c63651ebf277cb6e5c95f9d175aac956a5e5b697462
SHA51244a558ecbe7e5467c4209ac7ce050d6de39a701b20a7b649c9cb2ca9fd674235e56b8cdbcf5ad3573ec416c7115e4cf07762dc501b603f9d584a2b47a098241d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e0fcf2099746340b2f13fd3930e3e4
SHA14e2ad89035c79976e426f54587c156142ca9052b
SHA25608885e857a4a968227b70674d703f6916b9754399ce1ba33fe26dd4547d6910f
SHA512be46ac29e9157b1d1ace78fb91970f3dc0399b23f63767110b6f298e4a315c2518af8b623e78462fbdd11b5265e67812b334df97b55519f1bdb38baa57eb2307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ef9f7627a65a56d78ef08a749e065d
SHA11a886f75978ad7c1683eb158a54a33585c813a10
SHA256e3b922e2971296c9dbcf712052c59c869333da19caf355618bb0a0afc1048312
SHA512de3fb99ef07de0c8fc2c88d31eff8f3faf8d58b907cf303b43950979171a32ed72184f652aea957f8b24ec315f9f125192790208712d6867cf08b6b065e3ed20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00c19fa11afef17b765c9717355c881
SHA1b0de1fe1929d953b0d9701c6a833342382e18cec
SHA2564e2ba9ba9aad62a5f5b8e951f9765eb7dbf127d56213434a351127e52927d515
SHA51241de5247f71a746d0f23016c3c9a142586824ae938b3660c15df4770215b7c57064e3ffe7590bc65c7a461e2d4ccf3a418424b89c8966a7f7827bf58477195b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b