Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
935dc0422b203c5b6bdface640dee071_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
935dc0422b203c5b6bdface640dee071_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
935dc0422b203c5b6bdface640dee071_JaffaCakes118.html
-
Size
94KB
-
MD5
935dc0422b203c5b6bdface640dee071
-
SHA1
2ea10bebac86788e12de0237a93bd8265e4444bc
-
SHA256
3617d1b98afa4c696c8ceb99b2dad4193f2659210875e29b4a67991c1a0ab42d
-
SHA512
1a515d42558698534bc1fa2ada1d007715ee4c6e1d32e49b12680720023643eab99900484e59d22900ee0dfcb2cb13c9f66454f646896c540145e05af8a2077c
-
SSDEEP
1536:WMLiNVHZa8jqfjnzAx7L4BtV2eWyt9FtgZbQhy6BdkrY8mgHC+qpEyW:WAiUWeBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2688D5A1-2218-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3067f5fc24b6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423629127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e3caf54814ae44182b3010bfb319986000000000200000000001066000000010000200000005d12b9148c4d49e28a6545bed1eec237cf5c765b3b85c59097ef8b6532fae491000000000e800000000200002000000080a8293dae3c63c3fca86f2140ab3844cb49a2186787d52b9dcff27c4f8dd41020000000ed63b18862a162dc592031f221c1956c767f6efdf5f26ccd53cc4c9cc82397684000000052508a8a02032247ca34a335d1e093732944a1e131185eb96df9893e330b62078dd320d7a198037c902abdb8f87eb1ef6e69b2d34e0909f41c351b17b6b11d51 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2968 2480 iexplore.exe 28 PID 2480 wrote to memory of 2968 2480 iexplore.exe 28 PID 2480 wrote to memory of 2968 2480 iexplore.exe 28 PID 2480 wrote to memory of 2968 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\935dc0422b203c5b6bdface640dee071_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e7e2f584b58ce0b20b17cf98eed30e
SHA115bde87a103a7d0ef6210742e16e7716f06b1528
SHA25630d8dec1dd2a83cac7b60e7b64ac700658ee82dc8fb343344dd92b2010a0f642
SHA512c7ec9372304fb36b8814766b6750dece7430280e6fb9c867341cdca7658c1895cb1c646be83b4b57a7cf4d6aa8f3c276f3a4f4e8ca7dd207afac4ccaf1d0d09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf89c7021a9c050d5f0cfb5434b0c20
SHA1c0332f08e9a6b2eda048e0c74c8db88e31bba0e9
SHA2560290241ef3197a2b44e514ad940aad575ba6ed6bca18d6e3e30d910916489aea
SHA5126ca9637449b0d52e0fd556808a3f770d22b0e341377d62471e737533f0e2ed04a99b60fed080df1295969e04b2a792253be405bfe155871f2f67311bcfe9044e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51571008334ec545244061faaf577c39e
SHA1daecb7e8b04a30c3d302f82e549ba3ea071c3c1c
SHA25604671aa8023fd2df9f2b892f71f448a6a841cddcf6a25698d7e78c66a2e06e60
SHA51282f3d4ea515039fe3f577dfaedad48a4f3cece8e84fe3eb9db268b3d62a19b28d643d93f6c70a0abbcb28128b6731cc7818c2f8456a673825b9b040aa51b996e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768b446f2afc50e9f5ce3cbd17f1f1ca
SHA13a791dd074b259d97518ac2e7a851a5a1b1a3e47
SHA256aaee847560304344c36db732a1ebd6b7b63d5f34672b68e45bc1311b63069484
SHA512e0e7e21d4fcbf301e76d2cdb2c192ee5a132f5637f74fd63d7de0e446e69983e4930597735b8058c6ed31afdaf794f100f1b6c854cf20b49f2966268004f29ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2888a8e61f4642c09999c8dbd0f7fd
SHA156d4b9fd9f746aa2bf4d190c704adaf2fce950ca
SHA256555a03c2f0a72ab333f30f1b5ee9ac29d821ad73781d3e2370fd1993fbd1e38e
SHA5123b9dca1746b04c9291aed97d02f46517c4d82eff63b04213a84acba427f5e7a1ea730286eeee6f4dc664d2cf699095f40758621ec201a002fe23e11b53f33003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55874d44609976dc70f62acb2b2e4c32c
SHA1f59ee11f10804ad5a5612721b92635835bbb1485
SHA256c99fc1fa9caa23280206d21ea37677bfc63089a02dc9066c52def2fb832d6e2b
SHA5126698352b6ad5ab6e5835c502ca59a3c0730b1e81e90a1aeaa579745d7a6bc2c67edb8d1b59b4435110460aeb4032eae3d10ef17b63cbc29eb9ae4a806a63b6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d199c4b2b7f4e1fac335bce7978bdea4
SHA1ed305c778d9424e9e5ecdfff3add3944ce6fa201
SHA2561c1335628b34b6ab6c248a3dd7bb96a940c41f266a90a4c1f91fbeefa31db980
SHA51256ed479baad1751f8742f014aa9648f18fd0c94cb3366ca297ed10f27dc67fa58d41c7e931d00333b40dceae9944991c1efdfb342308b77122cdf9987fbcaca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d751c28d60a6ef20dfb00b59731aaa
SHA16421e2f5abf2a5e73e925d2abe3094a177f0fe78
SHA25650abe3004a25d7e4ac7f2921a26caa34996c357dd51a172d76e01d9e34cb3a91
SHA5123b11613a16c2d5d1b4703d096c1c151cb1a0d938c79ba15b2626b9e33244d58458bec79ef730b3765b53e7c3f4a8cfd70062b4ac590d2cc0d97cc430e635084b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d56340e874ca17086f39ce4bbfe138c
SHA1dd9c6f1b98dfd64bd7234e81764eb9b1788d981f
SHA25653109fd61caed4aa687d54fcae123fc76c9637227a8aab7c16352dfa1e522565
SHA512615b9d2733df994bd8341cfbe3668182c0b734902e193e22ca6b450e5fa78548c1607cb7b62773c0e66ee3fe5d88595ec889d3eca1d47313ec5a4d3166590143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca630376ae384bc1824fba67db8381c
SHA192c22d50d9ea5ca74d588773f0b261b8bb4df282
SHA256c1a120d8e652f5eba5af3fa6fc59415c3ce5f112df0c402d5c677544ef28e1f6
SHA512a601b513a8dc85df8dacc76e379a5f4b47489f16f6430df0f1e088f636f2fc614d3973a5f648e3cb8241be95f199f14e52808f1bb3e122c6b9acaf2867b9b0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f5897e82ec5d72afee34adb883ba39
SHA189cacf86dc9712215eda56eea8fccf4dbe5b2686
SHA2563fdd52b8cd5271d9a90285f41d9579582826935ea2301e4fc84316cb844a5062
SHA512fcfb2cea27637fd004c10d771ac95082c0c8abdf5d700d03e0dd86a907d2aecec40f7643a38aee94758ad67262ef78b279fd4764c7a61cd62d844f0528cf4b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b49c2d920afa85b0d4992e287adf5f7
SHA1e66d1d4808ccd087c8ec27c015bff24f949f81ff
SHA256c38f6d687a0b7763af718ad6dd7ac0c3d94eb4b859d065fa2604dc9b4a24b877
SHA5123f8b1669aa6ca635f80e7df09d3bfed4a7aac714be8c24fdc67ebb6d6a01f1ed40e3bdc6a10618d205e000871c715640d7db88795d8e6788bb8e97fe743f2d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b9f5e478550e44f7dea74bd1ffd438
SHA10ee2dfccc0a6332c5fe25e7496af8f24d0a52863
SHA25653adc01e1d4d86ae0c99d82f810a645f23a893c96070f05f4e7eff692f5c4056
SHA512741b00e88ef65ab8539eb54d30834c988b882230aabc14f9d8c0aadbf46be464ffc4489604174d903130f2d15f0eb0bb4f6779bea5b4f8e9cfdde8e9d0fdd844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e217ad52cad661060ba7d42b1dbce56
SHA1c05a3388303201184ceb0fde5450fd8306a0b8ab
SHA256e44364031e2793489bded5661232b71f3dc1abb02352ee07db979d3b26d36a5a
SHA51249828abf644105eec20b3d94ed013c87317fbdce9d6bbc3365ccda84f516cc8ec6cf1ce58491f66d84b6cbd467228f53f3b3addf972ab9c47b107013706a47a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6f055f174d17a6ee98ea13100bf08e
SHA12de96d24632a8e1aa726220c9f77879f74a29cfd
SHA2566891fb73ad6b1506dce05c988208373c369615cfb52502a677b606d82d6dfe8f
SHA51291862914489c42b5cb9ee988a06f1aa2af21efcf8820fd1333e0231c81afef249876d62ebb60131cdac4f44022bbd58383fbf33190e937bf499f1172e7eee767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef64072e73eb19b57246241ccdc2353b
SHA1bd54e0d4216edbd62254f42530c982128490ba31
SHA256844ccc0250890a4692d2d0a1fedef0a0c6eee1d175c376cc2b843997b594350a
SHA512263d1b9366e4ae538b6d0898a9ff73f3de12e4f2b2a9ef059b6b999cff92e4b20e332aebe484407477d952f69a50b339ace1aead9f25f1b8d453b73118013b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ec48b1af4d3cad031c774341552362
SHA1fc251330c363f77fa25fd6cb3e1d0be84fac0ebb
SHA256e444ce2693d440a2c546c51a078333d78034ba598311f0f96059016dcbb6ee47
SHA5129363f835749549b1f3c42d5b3dd3d09e8e303c8135ea2f4c3f0afbcc5603af9ad4dae0411858db267e99c2a3e84447b48d3bd384782976c637c508cf7d51a057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0593e6b7f7958a91c60f6a52416ffb
SHA103c183f0d410a9675a5c425729a279366c761851
SHA256aedec14393c4686acb64099bea0385793d510fe83e9f01e6a1e86188f0b481ef
SHA5129d0e91af3b8c0acf22e7bcf0cd0822ab668d924c683ab49a4b2c2378fb017d6aef3ab3bc792254e1076d526e48e9b94097517571b7fb8bccf8bee38d6e9f1490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addfdf4ab2364ed1fba9fde55dc956a1
SHA1d306bb1391a7539ea4426fee499b8eed87a53452
SHA2568d59c846e68942a193eaff2ec04c29a06b0727f79a4b530eb98c2f7b3277e129
SHA5129d8c18b65874735f0e19add8f47fcccc6e3c15f0c917bba5c0661447db30a94f38b99ddff5c5c0e4807f292ea3200fe2e2220c1799af5c6596388b93f9fbcc3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\font-awesome[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b