Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
b07343a9a0e6a3213d2cf15041c62829_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b07343a9a0e6a3213d2cf15041c62829_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b07343a9a0e6a3213d2cf15041c62829_JaffaCakes118.html
-
Size
1KB
-
MD5
b07343a9a0e6a3213d2cf15041c62829
-
SHA1
83b316d9328a5e5c36bf3fdcec37f5378055b297
-
SHA256
130fd36fbcf676041ca51db56138f26050a71439037c2bc1b3a8289638c7dd25
-
SHA512
39f5b09cecb47c14382123d2dc706867437c137f887ae431083ce96ade6c71db080c437ec183cebf340b0df513bb8f4fe3b9f2b75393e4d589f01df13cb1955b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000007adbdf362db0cf1f566b19157c89c299ace1133c86010f7aeb91816c75d13aac000000000e80000000020000200000004f417c141763a33a8b2f18ee314b842ca752597e99d056486cc0ed98421c77939000000016f900e8ed1108067b9eb630f33b86867f7b120cb91657a92d7eca228a9a8ddb8f3a7cbfd8e2dc3aa9e1aabd08b3bd40d64f60be2aa24f616e0ea84f2c38c65d569529926096ee0a803326aadcb08353139e2c89df931ee108c89abe23c842cc714f0fbf4c37329171fd195e313b76721f10e08a0f7359e329985f8d954d28656f41ccf1716fb483a60b324d8cf99b3040000000b204c85528ecc717cd2636c53b5a02fc95edbff3df4adbfc97a1c486bf5b344a96aa527707713887260f7ae44b8151443f0b6dd9bdb5e86a10613d8f4bd65418 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424652799" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{916146C1-2B67-11EF-9E55-E6415F422194} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a68bbb7e7edf7f7e5e41d24a547e346064b5fd77d2dcbcbae327c5b4de4ccfb5000000000e80000000020000200000003a6b8b16cee85e278f83a115cea8972ea3e19aa201b270e93054f99c1143ba2120000000098e3d6f9a58ff093c005e4bb63bd9fc708dc50a568767f9504cfa7d3e6bb52d40000000d8150832a2d73781032f67362ed0558333d9f6070c1a0d7a879e67bad1112fcb956a2b9694f5763f5880a7ca1723c58046be56a7a1e5fcf2a25b5391ed0cf522 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04c4e6674bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2840 2176 iexplore.exe 28 PID 2176 wrote to memory of 2840 2176 iexplore.exe 28 PID 2176 wrote to memory of 2840 2176 iexplore.exe 28 PID 2176 wrote to memory of 2840 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b07343a9a0e6a3213d2cf15041c62829_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53112df6ad4a4a94e3e2eb9deb9456811
SHA13d6bf1e7b7319d5b5f671837feaad2e7bbe4afe2
SHA256d6e9139528d9623c6418759b9d6984bd27bd82d383c35b86e859bea134532060
SHA512c7f709d2a6dfff665dc8075e7828371fa81d11636272b925d5aa0d8c2abfab72c4cf176484f1f08d61557dee3c475f5900cc56ca05bf3086b99ffcb758a914bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898a055ae02e44c8b19a93bb77d527a1
SHA10ddbf5446476233a84427a70804788f34688b29a
SHA256a0d4fab9111d8eddc5d2a0d4ddaf914b331cc26d2806f7b3abec6559188bd15d
SHA512f508d9e94755286818e6e1849ed41743deafaf235bc75adbefdf8798461485b26255daf675f82891391818a6bac5057c25204e660e60cee3d587fd50bd23dea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c48f1a5a1a87458c13910f2cf58f4a
SHA1d4493409db223521012717ffa1a2a997e9153e6b
SHA256d52d0d4a04a22fc4771d7a9e5006d280227d00a4093a491c796e8b7c869d2dc9
SHA512eed99f0849a08717983a3554afc6b118b9f7a2eb57b9792c0c709a73e3f0fcb07be25856d3043ec8700121143f9408eda91317985c11052426fc971c876aec37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479d6d2b62655ae75d2eb240e967b986
SHA12cef377503e82d8030b24153e1056ccccd7b30c3
SHA2560678238df823fa45823780971e7bc6b796e5e483cf56ea75cc3e2c34c34eaa99
SHA51245511b5ce3a9c301a37defd1a00f1b9dff385c5116ae4ecbac16a97f390b9b4e75bec323922c4abd4cc7da9ae5455b41786d81bf338378e352b17609a0fcd148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dde329913226d87df69ee7f3246d772
SHA1ec0cff863bbbbfe28c6021ad654711c7ee8820f0
SHA2565c0bd9fcf60c0674ea59c3e9ec3826c6c02d006040afa4a6a06b66f0ce7fead4
SHA5122796a691d8e39186f76062f94c99c18e7d2b05926389265e677a67c2da8ded781787c4396402b4aa7d8b88a0e318f294332963cfeefe1347793ee1ef5880cf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d043fd7cad7ba7c34b6b2736463fcb21
SHA1710a008ca8f8ba2242f25926fb58a3cac7eba201
SHA2562582dfad1f8db021c0ccade60e02f91fb341610594e796946d3b95c518776661
SHA51200eb9231f33d1cd35ddff5002afd4003a735a802153d62f9493327aa178bd1047fd95b8500df813385f9dd362d33497b9dc7b0165811ae3dea38b8893175da15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9bcac2c8313c4a74e10ed495eb1d5c1
SHA1ad47be8bfe1417ecb88b773a46c3c0547134a794
SHA2567645f0f725a40196690fc7b29adf0569710a4927223bb14f88a18c1495880c60
SHA5123f308dae3383e4a59576a091550313a85ae439143710e29021d5428ce935161049b61fbe896a7a37bc5b578aa51dfad3915b3dfcf51302ae47f02a767d8e4646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59739e1dda7632f9165dbe6e93d50de19
SHA1b9c7e5236dec495dfff1ee0a63de688e75e590c8
SHA25635b6bbf353377ed1122f46f93699cbf198d2bcf2423957317428e43806b7ad1b
SHA512b444fedf709014cec768c96b6cb8c09234ba973f05f793bcf6ba13f2e395a5aec60f67a6c3989d5c9a735328416f5d139bf67fa7524305a10f529a54ba8c5dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb2c9db551d5b3f8574e01873918337
SHA1ff239f5368b426ebfbdab27805253d177216b108
SHA2562d6a82b9b01faf00fee5e94a555c4c694ce8b062cc08ae65c785180399bef48f
SHA512c1fbd24b0d8440e005fa964ce00245df3746df0d32c4ea528a222b8262b4a7e13afe529d7c2f60b8161c0e95729ff6f048deb084ba39edf7dd5bebfd0df2df7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146275e4efd94952e47278b3cae7517b
SHA19647f656c0eb0ac183e4ade5c7fe40d8d314e745
SHA2565c4079d36f82ff33c6fff71b9519b8bbbc31446d6c3faec9ea52df2b6093a63e
SHA5124ca32d76e445bfd4c5b92d1acb2c8df80e8b648ced664f6d5b1323352f283e52aa92c3e092f6cb4f2c4a1992451e49729b17a54048b4f4a2ebc126432ae4a5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53537c242e4e46779dbb4f058ad226ca6
SHA12e963457dd2bf7d147b043619f6a6e832b2adce1
SHA2560241fda49b98f24a6a48f1b85f22294cab48158533d866a883b1a9f6fd93fc50
SHA512f5ebece33849e916f4c13519f36d78603edf15731f161b1487dd15b829da98636c68229fb66ec85ffa0681559f80cfffc61eda92374e118b8ddd1a121c0606e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e987f6562ba1b6eae6244421fa604c1
SHA13b8bd3ecea7b745689b5d3bbcd13b8304e743bba
SHA25631abddabad8669778e294607c6e738f5e7259e3a4b75ace9e27837cb3d0a278b
SHA512351628a585ed97bc0860f24a133a93f0661c3567e1cdffd1e02146c50ed226db6fefb46004b70aa278a36a2e80e7e36b758cfe9ec5c0418aab8ab9be310b9281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dcb0f74875db82c992fa636bb710171
SHA130c2174d807e13e14579b67bb422ad4dcc556c2b
SHA256f8de2709529135dda22cc3e7da28e1d50d2e3dfd34ba5f0a82e5ef321094668e
SHA5129e7f1d6d6ec112aafa50357d6eacb56eb606cbe7997609abed6223aaa563dd6274a41b961b9b85264b595c9b9aa402387f826805cdb1a71a7549e34361fd2a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd57ea06cf740d66d87b95edf06f5e5
SHA1429ade6cb4319638a724a47b1f31f5abc0328840
SHA256bce90f08576fa0641127aa35b770eee1d17e50a1f87af5e8c2d133e2842eb72a
SHA512d0cc2baa739af9daa06696e9eec9fa9eb2760478d92e6e1339dacde34ac5413fb0bb8d3a0383734f498f0f821fd175920c7e0344bf3403d438051c81af9ee14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0e52ad0dec797fcc1d3194b22e0e0e
SHA1af951d2a6e126a5c2933a2c134440e541a1f77b0
SHA256491ae2e725dd6aba0db8fff4c12d3dc000e7b162f39c611d97d34fdf8accd919
SHA512eb252ca84cab6c4e55d0427e9c71773ba4c2d29b17cbb30c52d83e6cba0623c3e43249900175134137760c2ad27b3834e6bf424dd02c96f8432e13603fe6a7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af264ca3c4179ebc9fc8be2d39c26984
SHA1348ef6413a77c3884fdab1aef53ef66540192645
SHA25657a527204ca88ca6f529ce5f0e54645c23c3fef69a035c0c8bdb0e6ccc414487
SHA5121212c82410e9b90ea64f354b0221b3c5059b91255a5571f22a14015f19fffdbb1b90ed42605582de230d35d574dace4c40d1387581aa034ee694e2f629158c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3ea8b672941b4f214e2107e6446f09
SHA1401b13c00f3d954b78853c863cbf61540c719180
SHA2562e2d0fba1a018105a71bdd2e55d57b5251e1aaf698f37e3df79fc5698d0797d1
SHA512843df7dfd8aa5663aaddb7e957c69db96ea530be26d5bd21a7119505b4847ec1148154472fcbf0eaf26594f88d6b9e75789f088bd21abc83fda883edb27d8e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24843169a9ef224ab8a5fdf1cf6f0e5
SHA1dee3250701fdf25ea7d83dc04d32dd381dbd1483
SHA256cf9b39e6fe258865e5c0a6653dc209f6abd91993eaa9796b7da9e32f3fd0027c
SHA5129a1d92fc706e02328b39e75d6701cc9513e6b56b637713b103ec8e5969cafc4b001d5d42fb122f56cdc45a01cd3ba9a0ae56226ba7a183ba2922f22049e29e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935f89079e5cd9281b736788256d041b
SHA18efbbbbb90c6e93204a1ec2f53979ddd7967779a
SHA2567f1e400d1ce45353465ee54060d8662dc598bde9c8ba6f3d83779bf86818d5c1
SHA5122e68c9291bdee016da63f7409011caca00493a4c3924dd85e1f849675b7e67533c6d22baa0a872893d2ef5c966637ba1201008bc52a1ff59ede0de3452e3a9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ce785f44d7fd57889ee03f815d5216
SHA1a13910fb2b4d14ad6c439bc391edcc68cf9e1996
SHA2562290fce77460e0dd0fbc38f2ceec87b990150525e6eb3dd8a85a47dff8581080
SHA512ea3fa5e7daaaef05433e27a678976535b3fc22d41411f30309869189f42d9a3613ae8b8e0e26a8c04cf146ab115756e92d6ae257ecbdb311d695be4349ef4906
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b