Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
95eb7796dee0c32b6082d669700c3117_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
95eb7796dee0c32b6082d669700c3117_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
95eb7796dee0c32b6082d669700c3117_JaffaCakes118.html
-
Size
78KB
-
MD5
95eb7796dee0c32b6082d669700c3117
-
SHA1
93c57f360180bb093d510fc29ab0467653882fe5
-
SHA256
e2c11fe17981c521e6a60cc1f8b233da4dd322f2e2d8c3e4dfbe535a03c4c7a3
-
SHA512
8a1c8aaca2754d9c7e7bec204febc48d98ecf0933f7bf66e9a4d3c45cf83eb4de7c20b9b1676a1bdcb4cbb84d335ab4b533c48ec480641ee94390c09e222c06f
-
SSDEEP
1536:KoANUNPaSBdTcb5WkcFUvXNyhaSx/pgYE0UcV7:KLNUNPaSBdTckkcavQqYH7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e3d9eeee7dfaa147aa41bf034ff944d300000000020000000000106600000001000020000000af0b0e5b0fca9d0625f1d2109ab331dba5b2127ba8dc18f3cd01177617b02e02000000000e8000000002000020000000c1b4eb1f346470cc3a6e8d5f48bdef2f17a1eb2e9d10c8450c76baac96ae264920000000ccf66795919df614bcbe3ae9a12d3e7056b4b68165d30ad2b08f90ec0aa90bb340000000ba2d12abc56f516fc2547cf56cf2c86c011933fed2505a5e44a9eeb5d23b50c903368b7fba0e3ec57056ecab73e6a399b4248bbbb1b45731d9cf9711d5f968d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423689228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14574011-22A4-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70828debb0b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3068 2784 iexplore.exe 28 PID 2784 wrote to memory of 3068 2784 iexplore.exe 28 PID 2784 wrote to memory of 3068 2784 iexplore.exe 28 PID 2784 wrote to memory of 3068 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95eb7796dee0c32b6082d669700c3117_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d9f4b3d03a431b75ba22f8798095a5
SHA129937b4fdd2091b5742bce9a8122fd51209d846f
SHA25678637aa073fc2fc11f14b3d24d49d014632d05ab18eb4ea667b03fdb6178e0e4
SHA51221aff7a7ad9efd0a338b4d94e526a68d306fdff5ba6fa8cc7b2af7a6f93734f8f71fdac1cb81c2574ffe179b5af16f728bb8fd5a13a0608a6ecbdb6f4a4ad7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51227d609f953d31297f8b78b18ad2d42
SHA136978b8e4c09f629e2d179322cc1e42da77ad962
SHA2565c4a1038dcb516e93b4e44fb53a24813d9f444f4a0c5c04f85d868fd052e0829
SHA5122ea0c87156efa3fac1fcfd6ec7ca070c6b6db4bff4625a860051a1951ce1a55b3447add1ddf12b161420b6f66af59e42d54f350f9c29643c49361c61b416ff58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5a08f6dd4646b0b7302a0d1b488f9f
SHA1e1e1780e582759ef87b6eb37c27b41840f294a08
SHA256f1a99d412569883b7963a427356b7892c22826c98d1ecaa2578b49e1f3db99c6
SHA5127b7b280570bca8e8070e3b3f1f91d504f57e821ea2cfd30b45855823370a0dbe2c9f401a4b282aa83bfd9628d0fa63dc88cea9312bc4dbb4130fbde9b8a5e121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce9b9a19895ec6cbe114e8eeb3678f5
SHA1e04dbece15e0ba6a45d0480bb3875d45a6f3fefd
SHA25698877dbb8408eb1639817a5e407132427abb79b5d1959627f54143e6b676075b
SHA512b505606af9f29723b45e4792467eb906a1e58cb1476aedcc646fc9831ad3e29314d2bff7e8e0dd844880317dbe8b43741b2cdf8b15c304268fd0bd8896e00a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd37763365c3fb10486d8c5d2dfd238
SHA1baeafc55a7264b053ab263681e62ac575fc177ac
SHA256cf30d0fd45ec14a88a975f3b44e859f22c6cec5bfa31bb45026168286712dd85
SHA51289e71fad3189e896b30b93d43c38b4abafc8695bda6633aa44629e6eed1600d4635d619e07aec86ff3ed1db08408373b0a11d5f11c5365cfed94cbf9b99661cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b279417686e4c13ccb423e0da389822b
SHA1712d2fff998b462c346a5f56dacd99ab92784fba
SHA256c1eb17841c047957b74ba428a4a40a1142f400751ffb2a958106e30297695809
SHA512c0f7416354594f42f70dcaac5d861a4bfcd23ed95a18cccc7fa68adc76268863d920ba8e03ac8c911da78f28679ff388b8f5791e4e961b38402cb0150521be12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562af7975cbe5d61198092f369b52d07c
SHA1df0b487d146f53f65be1d05c1ee9c3a6e668af00
SHA256da73c3ef802bc555d2361260d80c44bfcf6459a03528ab00ba4ad2650e1153d1
SHA5128720c14aa0fe77fcd56d40db3387d00335e588a16da311325315f5c2e2b74837718f69efd9efb10b71a4df725d28f40cb85513c4e938e5e61cb35d1bae8fd8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38038c53125499dbdca75c1d79af54d
SHA110b22a6bf59a5b94ed88a6d1384690d3f1d50fa4
SHA256418b594f70b6d7371d4939ea9b0261ebfccf310fcaf2623ade7d54633e231f4e
SHA51290c4fdb3d04ff6f6015b29469b3a1960dd2f48f695225e5e3a34f04e88d073ea1df3ff86dc0d2392a5a29d9a7808e399cf8b60c0f62661ddca4040e8d49ecedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4be034e702e73163a81814db704afe
SHA1ccbcde960430c07a75c4d9c5b32846ae38a36f75
SHA256777e2cba8c211c7a2037dec6d77464e376486e4498f4e585dc078857d376598e
SHA5123f5036a5014fc05a8341369cae667c0afde76e1c541e07757532ea98e82506fe40a3e88b1163c871d6e905fde052f3cc18c028cb180abb9da38c1c0476c49476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400d7c648c4bdfbb400c90f72132d580
SHA176e4436bbd4aaf146c364512a2f37bbf47ef730a
SHA256eb3f19447e5b7fee5fc9e02fc8c03794b5f9f1d87bfd399c4e4604fbaa8ee6e5
SHA512fd5d6b2ffe769b3ac97698f9f46207249b2b8be99f4ac6061af4ed43c006163f54baccff94918e49f54e3ed842334b77512f160c5a8aae0d29c0491f38767995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e7327028b1abfd7999e105000d1381
SHA118df8982b82d706ccc57f024c60924ab35952ebc
SHA256257750d1f5e54266dd3e76355243149962311e7bd8164121f6bb18ffd1921ec2
SHA512a32dd2391175c0abd537ddacb4efa3eccadd314c8f46c77a573889686275018eb48860ff5f852cec36134d793fe8533b7d9571af1ab87c728b8fbaf11c587da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c20a53e643b24fe56212e621525d23
SHA1ce40ec5f270ac83739178c930f8508fa3109d18a
SHA25621be78b72747859043e457b9f78c90c153da7e225c9dc6c85dade203b4cc8264
SHA512480db295d8653d395a3b89dddcc6b0fe05b7246f4e00de7ecfb2bfd1e6b2ab9654129e7f219ffa4bf7c71bdaffabe9360856260f4f18e5c1875426dcbd5b971e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6fc3f372c56b71bdd165179fcbc5dc
SHA12f0bcefbfc4cbff25ec5b60a867db6dbfcda1b73
SHA256fb807ff4d6219b20aa34ceec32f426fd95a6693b55f62d3ac6517e7d68fce031
SHA5129c605a48b5ad95bef69137d1b49c41c4d57a6bccec2c6ce0e5032e86bde0478f83603df14f677d39e6c33bd9d16b60fc7e91751d9e84f0849dc303eb91fa3260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7223ab3cd426a46b57c2f2c39dffc3
SHA13b59652031b143996cfccd9a5b540bd20051d3a7
SHA256f580439e50e52e6fe9c728384878d20745ccaef2bc5eacb95fef16022f943778
SHA5124c9c53a41f4aca19eea7da2ee8fbc55bce151ff122843c208ac39c70bf0c4234e7570e876a988ed9c2934b464ab357152b0f5eaf73b445bf5b9af7e60671d0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6057df801787a5e7cafb114e6b83ae1
SHA122a85f59bf3116038e282dbc72c3fff0fe8fd6b1
SHA25625b79d41029169bf5828e6c6b6241157d38df4113316dfd3f275486e2b434604
SHA512fa9bcd5d7b781a560761235bcf6a9b5b4cfca1e0f3450f4dd0a2f2b88ef84bc22fbef39611fcfe746bf13c3ae4ded9ca6cb14d74ee08d54eea50190893225540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b358f43158ad0d962897449191d7822
SHA17d8618e07a05b6470d42626320d2a8fd2ad1b258
SHA2564c5cadb459083724a25669990514a2575e271885907a5c7eed94b0555091ac5b
SHA512c2f05a272cc5fb6b72e7afa62cd4399f7f52ccce0d683fcecd0bb345cd7bf40b7a32045e78c403bf4c2d171471967f7664e40506cbc00184302338bc67190704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a83835bcb96affa1fac07b3fd565018
SHA126830dbb40bf3d32278bd54a54736bf264c6ee18
SHA256fee64557e086718f108e6273a87859fd79bc855878c914253a4cb440a8c25ec5
SHA512eae0b3db77556a971b6c2004f0659726a6b182feb3bbaeca1ad620afb23adbd00cf6c33c4611f471e6e7ad4bfcbb7e9ff9fb21eedc369829250a7bbef55b7498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5ac10c91fc5c889d16854be8b1ba20
SHA1d28287bd6a7a99016c3fae496e3988bdc4f0db96
SHA2564a1d799c13ce2f4783b050a487c7667871e3116e8a86e027a9f36bac1faaaee9
SHA51223d1bbe2ec4d55661b2db6091423ed8867abc55d63e9d01522380824768724f8a8bb38618bf3f1836e5d30c8ceeda41f57fc8e72882f9792e3efb2f23c6c5c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1783cfe43c237e187256a8f568426e
SHA11721643d828a5dcdee6230647b6f57e65c9b30ae
SHA2563f86a55b61eb3ba8b04760d4f22c612da82d0b8e48661956082964695508a744
SHA512f8df158225c224ff0a9dd9f007eb1e4ea596ee2353b09e74f5291dbcf0ed34608056de01cc4c2756a8137f0e4c409b6ea67222a4e7fd2ea7c8f578d8ae4ae1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a91fc35e8a3fa72bd42814668f4583
SHA114e401f7be672a3f0141f31624eed08e0ee69b05
SHA2566b57d563663618fdc610cdb6633aa02ae870e9cbf0f3ddbb0bf91f2c290c65b5
SHA512263d0b7cd7d4388a93fa302902661445ce955044ae49eedd4aaa434e8ab55fb1df3122aa511da2ac38db73de8a9daa47398bfbea961639d7acd92ed3dbb93089
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b