Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
misc.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
misc.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rBot.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rBot.html
Resource
win10v2004-20241007-en
General
-
Target
rBot.html
-
Size
5KB
-
MD5
4ab1163fd4f833a48dc2f35af08307dd
-
SHA1
1fd7769a896cf66a94f8bc46d99f9478932f1e30
-
SHA256
844378f6b5b73c700683bf5bc03320731ba2b6977ec33a91b2da3a0abec577c0
-
SHA512
b09ecf342be2941fca578fd177902f1925beff26dbba79ae6f8b36352633769213c5e24e0e17184db234764b137d5cab69a510ec95c039bc282d3e8795ee3730
-
SSDEEP
96:vOdMb3eZpHDFNW1VvHCgYb9DW+gQmOITbp5Wg0:vz+53AvCX1kO+zWn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000a0e6ed091415abf70f76ce329029e26f58a5facb4408c452a7b55347b5e35b0000000000e8000000002000020000000c797d704b9887bc8db22f35f52be8efeb0c7295e280410ae657544616c5207372000000016c9a7601f34adde5d3a7da5969fae59d68433da9da2d1daf220feb7ec8bdaa6400000001d01d4a3855cbd56049ccc5c0fb023dce607b932acffb757042c91a6898f4bb981c153bfaf83beab2fe04eab272dee5a9866ca3d797241b1ed60ab1014091490 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000cb2779ecd1df1155e632fbd3157533e812649ac46771e7e763715c46c9f0ed22000000000e8000000002000020000000559b3ac2e112a5796ba2d7c0a93a2897a7bdb0addd256280cf9f4f537939a11a90000000ea28f852d99b493e1cdcbab11334d991426e868d541f416c6efaced701705dcaa21039e1ac09d3ca97667355e087770b28ed297ca46042ccb570ba081587d83593c5c4e1109d3344c6e042eeb7329df576a38c6e484a2e8d19ed21495e09144f0d5c8985686af4eeba261fe2f3e7d5055e5d156c2c61bd01bdbbd9e541405f7873dad1c93e63c527d3c2ebb097dbcdaa40000000a00503bf38c837f243ea01e8126b37953e484aface03ea2a2cead46863a5ad4b59e41773c729258d542ae6d9f7e30b3ed471983b6c72329826f6618419bd9a46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001ff417421adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{436BC661-8635-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434636747" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2968 2948 iexplore.exe 31 PID 2948 wrote to memory of 2968 2948 iexplore.exe 31 PID 2948 wrote to memory of 2968 2948 iexplore.exe 31 PID 2948 wrote to memory of 2968 2948 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\rBot.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addc5a49c01f4594f2f1e402a5acfc0a
SHA13d725bfbf8f3d463cd1d447937a51b9b89fc28b1
SHA25629103b81d8e31b87634fbd5d478f276302d0d883f96bd78b83438d2090173e2c
SHA5123752961120d70d472e56e3cc8855f5f7831883510dc92e97ac03fae9b25354b0b63b9a4a0743dd631af944680908f949e9a2c5fe60f450dcc9eb123d13cf0c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d2f207f6090f3feb4b50421ca4251f
SHA1e1da2346049664e0353196cd0d206647ae13f2b4
SHA2561dfa5d2cde995505ce4aec2b95d3a075516991436737792d88acfe807cf1330c
SHA512636c017dfb6e3fe9db35188ed86d49882e8f11501f4b7f495710be9ac1bbb28b06ecafca2d34a32dde205dedb4e3f2bf15a1b2052c4a285bfa69af64797e7163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd3a0677a6503df5e416e896092278b
SHA128475ab617bbb7777018d7009b48cbda3526b75b
SHA2563d281cd413d69a7c236b8ee85a47ae10131edaa4f12722c8317dc0e850500eb1
SHA512dd922e6b282663caa518e0173550bd5bae5d6532c91c41adb8fcd28b90f5000d336367d3a0a1b9941455afba3d394928fa4312cdf754408f1328bab3fb211a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c465bd3720571a9ec65896b01c02e363
SHA12bfd65f47f036ca0611221ce0c72799b964e2680
SHA256fdb187f7dcbf5248eadf7876d48e9f13fffa6d5709d973392f47e6d95a7ce6b2
SHA512e370e7de3f0e6be58717fd285d7a122f792b2e1db887e9bf9497b7d03689c8bf074bd6c23265faccffbb4887d733ecd3f73596575d3e1bbf5a25c5f9b1770e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1bcde6a487b1edcbfc4f0f31c3e63a
SHA1c2acd335804e8fbe5728172a1833029faddfcb87
SHA2566833edb99eebd4d312183c8454c989df77a3ba33693359f78575effc98fd5c68
SHA512ff74d3ce3f01b5a39e90521e04fdf6e30b8a1a43dc7dea9d11d91d28aa8e4f60ff91d05dbd3e37af06f9df47a17ce0d2b889d7a858a231e73e9a65989f06003a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe22682a29026afcd75a507cb74e928
SHA1ca7cda44bafe77dbb66c0dac0964ec44a873ad56
SHA256bb747a3bc247a7f5f13b24b61931a891b35903afe8a24aa166201cb81f5def2e
SHA51216a7b739e81ccddcd1082673c00b60558a0bec1187a87b4edd27f546aefbf94b6244183a6f43a04886aa46d6c272895c5f8414cb45aa3e044beb05b2414ca1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57745d666e43edaecbe66042f4e70c5
SHA1bff785c000376862fcac63dad1da5ecc2218b121
SHA2563357edbd7f2cbb42c433aeb716fbdd7ebdf9900294994b23bea692fbc8cc91c6
SHA512606e98e630a5718ac8e409a0a39e37a81e70e2a5d15fcbe662f19ec139a09d8727a228337e89cdc53985af00d7ff7b0578d3cdbb8a9bcbe50556c73f799f6cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cef0be3aeac925c877c8f6f87fe40f59
SHA14922b6e4e5792eec68cb88ecb1c8473270acff8b
SHA2562982a13b22872e4fcfb56d271f031f13b788f2e3750838b012b6c1536a89a39d
SHA5120bce0a2103c728be00ecb59047e6b93723ab21352a51faa9806596fe7d88d8f0158b46e08cc24fd853069996a28d1a7264214a6dd769c7fb601c84d68b7a2583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a060014f53af65248159d73c5cf7dd4a
SHA124885138d3f537150a095bad5bd84fe313b48390
SHA256af731712d8843ed7061c05229a322b20d3a0a72affd60228b344576905c00f3b
SHA512ac49b05f5baf066b4a6aab04d9331b52dbaeec6babee210f50516a433327af218f39911b1f1450a4a68fe55af36c86dccd7eefb95afcf5516451d73dd0eb4ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e6c6ebc28b47bef67c2789f4d821e3
SHA1061eda0c913811d76318b4308eab5df6f99fc3bf
SHA2561caf85dd2c6f7e5df11b4c90545cac40a57f1dc6682c12a6595d004b94911683
SHA5124bc28c125254432602edf484626f28ad35bf558a9b65db22954417d80359a96c1d47a69bc125c0583b04b3bcfb48af56f2989d4511671c3ad539048c383ade3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cff378bbf7e4814e661fceb2c30d72a
SHA131310929f6363bc3f6dfd91feb0e76c96b905169
SHA256d27b4f4bfd6f403084cceb12aa430fb856ffb9267235a49aecdf1de28e2b9453
SHA512ef452bfc2f1cdb2701eae3a6bf9958bb9f55e0fbb5ea8c3caa0435fffc42a6c7364427595ee97b31dd604196c5946f8c043529757e4b09d4552bdaddb74bde3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606c6ace9cab1f0db12931c195613a3d
SHA14809ec24f4806faa1ac45e2ab74c1e2e5a362a5d
SHA256832e9caf86b7316475d0af19db4015c7dc2b8db94d21cb66f253e8b056e56276
SHA512217adccc58d4ed701097fab3fde7d72d6ad790d7eb8916833f0770cec2f1bd5b9e77ba07b33d6156ee194f6d4de9974f1d581342d78ad675075e1609c5de72a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eab56968d2a6b5801dce685d2dc0829
SHA14c60562784d482560f6cc61e5d3078f297c147b5
SHA256ae4efa1006efbe5846d819580bd0b86228aae6e8a83b6fcc6f44507dee5ce922
SHA5129951292ad3c781cfec7a8023dcbac85a65bf89b3c1c9d2817dafa02d50fb3e5f65c627395553b4746cc63b5ac2c02cf137487a21f02596964c07d181dad26b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7bec6a14a4ec81a56c77512caa4b0a
SHA10371a848ca25835940ec3686151d952d0c2f7a18
SHA25694dd1322bdf8405b6eb0afed8f8a4e6bc840f691d2cc3eed758a791e070bf29d
SHA512275d3da42ae50b493e6f5880cd8ad8043570f07745fba5dd164d15dce69935571215204ce3e0e28f1df8d7f21f22ce3c2aeddfb9e2db3d57a09bd97a91e40ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6181927c7fdef8aa65b22fc0d57ddd
SHA1bdded50df8a09a84e5a1c095631e9413a93e3806
SHA2569ef2273aae6fd6f9bf9e67c0c4fe6a2b6a913fa9df4830b70026edd2fb77644f
SHA512691790bbb177cee37ff51b34c71acc052375cb4e313d6366afb2b64c1f1fbb02c52fd95f78f2f98f48535200edcf071ce2d0ca05e82331f1af248187fbe62860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff29eb19efe0d75622e13a2a3700519
SHA19be4864736b04100906f75f16bf2c9b20f668a9b
SHA2560742f03dc4e2fc1b11616c5d54c5e26591533d783148c42876443f1324a9cf53
SHA512bd2905e4c78191cafb4950270648d168ebc7b3810f1f6b326d0c898ae89371510c5cdd94ff1d489a8bf82c2dce8e1600e3dbe1542baa9112f21f4245328acb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546773db986b97b82a930514d52462fc2
SHA189ad3e75f06a2540410b4451fd644ae794737abf
SHA256661e6ee2344746d47c36b442f475a287c6a7e0236aedd6eeb2fdea9fd652be8e
SHA512f6df865f6df0b44b25db3fa9dac459b02eff78401f8a1c2349ee7bfad451055f38086168400ad80be009a9be443ceb0647e2c50565b1267728c50e4e3a3c6031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ddcc7c9b73e14f5a1b716920d9069e
SHA199423ce2f9dd1dea5d81c4e1484a3c319c29d466
SHA256fe492b2fa7c46f40b78d81d3158f43e410606d25466b4afd409bcf930294bbea
SHA512da7dfef013158b5b09d2859a31c6b780aa295c729e6793129b5b0b332cc765371df6e7b9c1c30048a3b4a7b9aa9aabbfe6a6295d9324ba07c880add9a42ac537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98cedeef9f2a4a3a8e4efdf27740aeb
SHA17cf12e5ee83e9a3bc82715b0ddb15a51348965f5
SHA25697e55d1d7c9682e396e4385da27b8e0df8d805f404977fe25bfcabd017f8316c
SHA512653278e40a035b69e33b3bea62180a94b1460543778c68b59b069c65ec8688ab67691de99d1eb4fb07b7bb151021816ed7a6fded91c025e5f7ec1d0fd4b9da22
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b