Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
3bd791b36bfc5bb378e2012b30af1feb_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3bd791b36bfc5bb378e2012b30af1feb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3bd791b36bfc5bb378e2012b30af1feb_JaffaCakes118.html
-
Size
214KB
-
MD5
3bd791b36bfc5bb378e2012b30af1feb
-
SHA1
79e79ae00fc122de975355228a7f68c2f94b6370
-
SHA256
a91d7e49d20c86313330db2a644bd97ec20233ad8235d17f7decf0f356117b17
-
SHA512
2b9a9a20d06a024ee084aeea02cf9e86c3d993f2dda39e296d76ea775af578e854916c3013703eba92bc00000db06b9b0a096fe8df39718439129e7a63b28ff0
-
SSDEEP
3072:QrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJwp:Iz9VxLY7iAVLTBQJlwp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d03e45e31cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434925768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000002627f988886ca506a76862a3f00d07fdc9816b2d2286c8fca73475a9b390ba21000000000e800000000200002000000059ed293e15ad62929c18d63daaeb515883d0f4ea03f3115a569fa9eabffdd7e6200000008e7e2d207455279306c21be992e17d43d31611240b2778773459dcd71b8fdcf340000000bdd8192b48f4c3e24877b5abffec1039047dc8a133ceedd959729c4c1cbde1ae187fcc0650278012935a914373d123ef10db8f8a97f65fae5103f90baf600dfb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31E93A51-88D6-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 528 iexplore.exe 528 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 528 wrote to memory of 2180 528 iexplore.exe 30 PID 528 wrote to memory of 2180 528 iexplore.exe 30 PID 528 wrote to memory of 2180 528 iexplore.exe 30 PID 528 wrote to memory of 2180 528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bd791b36bfc5bb378e2012b30af1feb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57297d1ecc2da0c638f0cc03b8365302c
SHA1ba05e31ea43659d6d6bc158cfc2987aeb5289074
SHA2565fd9b490e95cc8a00170cd0b93083e7ae8b3842cff52aefd68fc02a51e734292
SHA512e58d510eb5841294c1a656ea275287bef507fd385383c08f1ec4299aaeb4fd117518a4f0431bfd0d025eab99e8f08abacc789952575ad2894a9e09ada3e3217c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543eee587197f56e66f246958d9b8dfcb
SHA102258d1c8896d7dd0f2b548feb7db1407cc9e862
SHA2564409cf421308214ca280e843424ee10fd376b575eff72e44e85a720b5da4b38b
SHA51231a5c45b94964568773158e6a3d382d47659f4269eec9f72514a2ff6f74e978c09abd95b94844cc433d060bc191011bb9807651b265dc1a5d1e480638631cc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192733bae127c51b6a332d01deafa398
SHA17e8186c0209735d66d90da915953f12901e332ec
SHA25685d030f5aa367afb3970669f64ab001da2f40c5e067462b8cd8996a5f8a117c7
SHA512cdd105787721f12011ccb3081688bedfe630539b49d64d595129ebf2d3d16cb469f41a6e92fb453f855e8cdde0ce967bdafc2f2081d9327c8374dbeb2ba39b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c051651b0093640015655b11e06bbd5b
SHA140c8ecc87740178614523db6dc917984b26d2f6a
SHA256efe955e60fbb7c51911dd391a486d9c82e2c357f2e202402fca1c40ee40319a5
SHA512dee9521f1521812826898ffd51add61d3b4f3d3bbe44e75c01238e4c3bcdff56abdb1f77dc7d8df53e3fd453f1657b9c36c2b1f57263de442ff063c3cf0f9ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f749a21f8a2593cf570b622cfea5cb
SHA13cf1599209175a7fa523515e2e6c841550753404
SHA2561ce844843b2c48e7ce4eae92d5c0dc71b0f0efb2b8a0d268aa8e23bfc3484044
SHA5128aa12affe297d7d45552291640dff825bb70683d919506a8becda262bffeda42364de73e28ed915fae74182c9d9b681251fa688a435e3ded8faf6f30cc56f6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2ac8838939a8f27b0a5e3bbb698a19
SHA1e847db6ef800f28f0b1790d3895fefce0495897e
SHA2568720faa2e98d0e73c0c3c79a2012fbc650b0ffbab536de708256e749b38d1e36
SHA51246d2757b9f4d57bb4be4b4d8b26bf7fbf06a15e434b8cc4cb1e5f557140674ad132b4275a6c3ead2d73457e7ddab603cd1ac161e2c032acfded6ee513365fee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b18996dd593a7bb0c4d35ce7d57ba1
SHA1279aadd79d6ace3312e8d7df2fcccf40b70e8f11
SHA2560d4a5baad9a425130e2e347762f30764463465449970e1be0a9ac6be5dbad8d2
SHA512048eae33649e0e2b7ecf47f1ca01d4f23a92b49cc1809dbbfbfe59ac8aee1581f31e1ad518f492dce3acae10db55d80977c6f138654c73acdb153b4ce2db8727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faed141a8f35f8d5cdeeee7dad5b9fd6
SHA1f7b1fabc798e0b0b8595f7b4402f54dfcfde7ac2
SHA25654ef927e675238056dcaa6cd7736bfdcdbea2e170131943eec905f6a5ab33aeb
SHA512c0288d5b899041146696a9f227ab9b27fc99728ee9a2814df883fda340b0ee022b225d7f4d98f1f05f33d48f4c949fd3192382a2374203acf0a5c784c334cd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d443f13d97a0ada613cfbc898e5661dd
SHA1c31632626e4c4d7bc080ba1042b82e17e76783f7
SHA256aa2aeb920c2d8eaeb2f36c38d9604bfffab2e29bd84440f9456aa61541f231b4
SHA512ce0b16a55e0c06acb196b97078442b484f947821dffc8ca36ea7bb4799230eac7a885c6c6792c2e52de9f74b9df2884e98a5436e70d29c6b71549494425f7720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffaa8c355745cacabab62949616b3b0
SHA1abff5d2720bc86ad816f810f5c4def72e867a892
SHA25603113e9dc3e4455414a369d76a33c10a0409cb24a60ac7e818e15b6d8592ed9c
SHA512889bc24bb196adf02d97c755044043ec079467f8febe5c620ff1beac7d810e90a6c30ff5ed845227f065bd7bc4bfd791fceeef5a7266a37196c2cc78b6db517c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853868befd49ee0d756475b1f1c9173d
SHA108d3361796019914360e2786938bab2db13a14dc
SHA256f441d0e04bfe0380e7012ade4766eb246e374a0be2db90ac75b93e6b53c2563e
SHA5122f35b9a422ae1ea8ab48e657f071d94d4c89263bd60fb21938717a508a172a5bec96b35c17d3d891f2d229ae8d35a35d4cd030c8c78666a1eded7a10db472b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c0d687166cb5977e9fd7fd8b1eb3be
SHA11d32f15005b863f08da562fbcb44fec77bd3bc42
SHA256287c45f5c0eb11fc5fa80675c47e8cdd97bc4570d268ad07f7e7abfe1e988097
SHA512462d2b49c25103d648fadd85270bec783b6601c8590f4f6e0031cd92ee6b4816d6187e4d160389887c3f839e99adacc6a8a2c853d40d636044e03b558b441efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf120857df7eb63af61e80ba801313f
SHA185dc53a831c97499eb885372c0ef11f0c3734a89
SHA256dbe76fd92ff642dee25b724ce2cc2c32d837b396618e6d41e3691fbc3af335e1
SHA512272d6150db63847a82585e207dad9a819807b03e9139748b858db1c845473817adc70a3d563f2e25e73f42065a3c484746b8a3c00d8cff6a49954125c8ac0ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447e4e14f6697c40d0d16c721713e355
SHA1f3c974e587d16b7b73a73d5bef2416395e8e464d
SHA2565e4d9105af9637e63f62960ca9928ff6d1e201d418e5dcd84657a8c8aa44f112
SHA512d1cefee7299db432d23f6faa561107d94610270f43dc33c5b8875e8e29578e3ecac8520e04bcc6fedc705d628e24752166f4375542cf808e6baf773de660af15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf2e34949a4d226e3d0c321bdec710d
SHA143e3509986f3d99fdc9a7fb9b72133a6a3c92207
SHA2562e57d9bc7e67c77c42c07af713adaa8958c0efa58042114839263afce4969e2f
SHA5123d302f1807c8bf7d81d524847a58bd7db4857ce2557fd45797db8e6aff8273e600da77af0d63ca16e0cac951e432c0903e28b8ca3370498c476d20cc292e26f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf7ee401e599039be7edaf7728cec9e
SHA127c538ef12a688dfa15621eec2c744cfc0893dd0
SHA2569508e0baa1a9c393a1685e0206fa5d8c9f33351aec83620abfd64362b0d580a2
SHA51288ff25270094b0106e50a5c10ba107cb14277a59ac1cdd229b6f0a08cbc67c7ab946aae687678a3256b5b4bdc207ad912b78a81644ebafa21310eac75ab91222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dfac9e6998bf4b0224007bb9553f29
SHA1d696441774ea7e45869c630ac60cc5b2ad75a6d1
SHA256a9d9a90a7e2518cf7401978731d6762c2399cdb64d3f2a2c792acd2727ce7119
SHA512ccfa2f1eac29ea41f18843e715588369366d6a5bf1cb7e4dc48cfc56f2f7cc0961882cb9cbbb6be47e12ab7671efe66b4d6c83f91aeffcd369bf21d40f5d2bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42ad0a4238155b0721a92d5c0c2b8cd
SHA1740f7939cc27a3cf594702fa187528718d1f8a21
SHA256114c5e08bd4d4000ab5ec7147692707bf6d600be47ab8bfa459fc9e61bd3d1aa
SHA512216a86a05e1c369b38abc325c0353e65e1acea3e5747ca92de4b10c79100ecbf9bfdcb88fa8939171fd1c95b4ad9aceee4fbc9cf451b7b731e37562388f0050f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd4a13781c5d064c30fe19ff5c354a7
SHA1a54fcb45c2b2ac2c31a5112bafa1d27f793633ed
SHA256df3504a906aa564f62afc6503c506649f9f82844f601f026c9148621f3f0fc2a
SHA512f56d59c2bf40844f01c70e238ed3110777047366a03a1f8e8894c31727f85d6e5f7cfc4c90ae28a20e64a3aaa86b70fdceca80640d1ffb0d0822792b4cba8fb3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b