Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
0560777218d14401dd45ada6dd163142_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0560777218d14401dd45ada6dd163142_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0560777218d14401dd45ada6dd163142_JaffaCakes118.html
-
Size
3KB
-
MD5
0560777218d14401dd45ada6dd163142
-
SHA1
de47b46c138a2a4b1947e093325f6e656ee1b94b
-
SHA256
1c3677a7f55a3498f77a4dd355f7711b18e87ccc638dc5350f20be77472e0e17
-
SHA512
747dce71dfb9b002066419ac9cb46c3608055623ce5aacc6cf9ce9541da6b46e4efa4478cfb6693f1a539267c40ab5cc1f0bd1e186490d99468210d066545b64
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44393B11-2EF4-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425043080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a5756b537d518fb89e35a35d8a0fa0ed8d65feaecbf2358ea17c91e0884b6a5e000000000e80000000020000200000001b83baed03673481bb8320b456fbeb08143d16884dff09ec232fed160d34ac4720000000a8e5b4929feeb026f79b2171776d61dff84687a231799bcb431b4da6f6dba7e8400000008a074b469e4f1ac7da2fc83c23c673aef1a004f72a59395d277908b2a179444e52791eb67d09e26496565b32e879f53b1de8b1d94afe7d6563ac485bef57584b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1013bf1801c3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000078cfc06de05b2afaa92ace03b8d13c8752d123e9e9d16994caa704139981f7ca000000000e800000000200002000000029e46c0eca636e573acf518fe1b97af79e7fe161c4fd17d039df89a95cd6909790000000f880fc37d16c3c745715f45d3a97f606f52935a2921f72f5d6df833ca2782cd69e7615dea532a9718677b0dd2b912de8bb42cb910377575cb61b4d2b61bc418e2b7dc8fa9b9dbc4fe6554fa5b397b4c1e5fb15b383c44b95acdae5f0dc864650a3d96239d5dc26e03ab08e7f5be151b0620e64070d7fa2030e4a8549e7d7d7a948c6552d991169b32b373f98ae5ef816400000007d8daf7515447deb7566cf1e42aa767e73623bac85490b9d8a4e724b7a4dc9fba065de42b104319b0cbdc94ea000c6595233911b859c47c8dcf97764ac1a9e3a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2312 1724 iexplore.exe 28 PID 1724 wrote to memory of 2312 1724 iexplore.exe 28 PID 1724 wrote to memory of 2312 1724 iexplore.exe 28 PID 1724 wrote to memory of 2312 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0560777218d14401dd45ada6dd163142_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4469b2745d463ded8277e295654d628
SHA1c6fecec806980679d1a2a8ead8c4b84cdfb01f65
SHA256c9753aaa467ba4094ee4db0686a95811e158cbacba04d53a9b747347516acce2
SHA512cef70be39aa4d494384aa5aca89a58cd4eb26d7ff57743b26dbd6a89d87ff855ff5934d487d8ff91e0565cab26dea58bf79c08b2ce8bfea1aae8fbc3eb8a0cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510044487ddce35cafcd687610705f14
SHA10bd97499d199b92c4ba293611620a145177bf00b
SHA256904789f71518a1c3b59305e027bc320b7c8259fce43aeec5d468d2b311ad6183
SHA5120274e6eb23c469d0cc92d5bb4e2fab36d9986cf195570b584c3333ecbeb1c37d556385a125e405826510935e1e91efdb54ec52b3f26ce0a031615f7cc56080e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bb21a17188132f30211724954b49ec
SHA1331477ec18ef6b606a53f466bd7a07fb3e550d16
SHA25668059ada6160da07f135ba7cb26542cb738e60c463a83933b617ca2f6df8efc2
SHA5126a4a8ac81c398258523cfabe1c2542a6641abdceb54b521eeecec204abf46a21503be9cd018ebd954675a171f6981e2fba72da76edc3987ca2effbe72d839bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422b14ecd8b09e579901f47b6cf11469
SHA120e5ffe596e8e85b871ecdb13f48c6f3b8f616a7
SHA256ac4a44fab3599c8825cba00ae7dab6e2e25031e2a12d185c1bbf49f85bc8ae48
SHA51291147f380196bb964b4a531fda79e3c693c3f826fdb92c9e73efe26f67effbac016299ff0f67f759ad17a612788a8fb74c30f9d8fd05a9f9091d3809334bb2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1e3549853172b3b66c09831fedc9de
SHA14632dae73627af057c21b93c69cc634e6bc464a4
SHA256a8aded406e8dc836d0d3c206211fea6d9800b283e0f1ffcd9dccd605e72c0f9c
SHA5129cb15188624c1ad225f8369634b29f4e2cf35c007fdca20a6ac820c9a85ab271a026a21e26cd4be12d2d5e81a650d1539a345d7f46ef19428b5c95bcb7c5ffcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba9be2d8a7a8df9726e93485de81d8f
SHA1e5b92f646fb1f8f17cb10c291cd6a0093b5e8a21
SHA256799ea3797031ee4695776a308bab24e1cdbec4950b4db40d646c484b4fe6cab1
SHA5125b9c264c6ae73b41b0d325e535600e0bab48e79d73487d41c77715cc457eb5643fe52258d26e2463659bfc4bd479d4fef51943cb4dd90ff92df2f84cfa9f7665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56287047cfb050f4406340497224b6e78
SHA1a76a2405c9df4858325b35504e3848ee7941529d
SHA2564cf3731db92dbd7d513735644a09589bb61a68320ea633964ca0bb92ed5472e6
SHA512349abf2f285eec90be40c616594045aedbeb855a6dfe9999bc2f54ff99f23f653e05d288ac4f567aa31e8f959f549abbdc57e8cb98981586a0f0624bc9274b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294dcbae25225caae861b3c2d58aa2db
SHA12e5b2e014857bd2f6b7328cee28ec7b9788b02d2
SHA2568a753222640316b911347c5b0941d5404b3ca71861c136236f293f5187eb5c0e
SHA51284fde75f660580a8e2f10e82be44044350652e84ebcd8a24403e870aa88d8b490416c79b798be37587910e16d72d07c4fbd5ea58d0c923c997411ce65c4b2fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765db88eb22c64457469866d3a7c50f0
SHA110c4f95d7cde4c41cd479ed1cd5f7d86af849cbc
SHA2560d731f85e8ba017ffd01dcfcf0af3caa7513cb3f137bbdada375c7aae2e26bf8
SHA512cd87be4d63e9c031c2151a180146701791b20e7240d3930a4d5b1753d168558d5116d30d1572e1755f51d46836df834473685f40b1891dc458c65886a00bb3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84190f5e36e635301b1919a7770636f
SHA1f2f221a1cf86d83ca01bd07619d1806ce6e63c69
SHA256891008a55f6fd7cbbea175ad1a6f83c60153da982b853fc7e85012b2941539c7
SHA512c56fbf5e384cc0d5aded89478bde03f1f4a8220d03436c4ef6fe0b11728b080181701cc52b04e49e735748d1ee18b8cb770901babff19733936b4a4ba65494ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2147d77d1280d368dc6873ab2132bb
SHA16fa5cb46039de73a483871a2935df27311b650f3
SHA25655eb02d0ac20dad6b14241d43eef39bcab916501f56aa2412e0c619923c0febb
SHA5126e15467d2fc012e305421cf6cbd0c50b5a2c1532bbe8858b35cfe44d85eecbd7a9dc0c2c7fd0fc4e96503f23728c2350f5e49ecfa34ebc6abd779f2159c32f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a136120d19b4c1910b65652fe823db
SHA1cda73afb9ec956539017d2129b8ba1bff72fdd1e
SHA256c20d12dc91deb7757fb677f978ee9e7f7f74a25727c31aa3c75f5272bd827062
SHA512763bf6fbd984f4085d1be4b9558aad093c77f9bc877017e3f7e1739ca9d2381b5ec8ee7eb6c0782192e0c360bcdbc755374fbad810d22f52dd156840ff44afaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58b057709c11c7326d99895dab499b3
SHA1b3884296c160b82d1f2fa346b38214d1c3fea20b
SHA25679140bfde5d93f80497fa6770b199a99fc37dbeefd47b3fbc97d5ac8714c32db
SHA512366d5788b1defa0ac3b70d9f75d633e2f5db00123db018bcd203a29597c1c1957ffae41f59880bf83a616bb3ea9436502ae02879a299c7ae57de134f9601f45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d0620ad887a501683e6a0081a34847
SHA17f31ae7832d3d339ba1536c468a28e6e6a6deca3
SHA256a7ae045f5e1dd75c7aa4a9c25f81e00a976d1cb772fc03575248f1fd0dbd30d4
SHA512e6d6a5875b08674d9c633872657993127bc93955b4001b664c02aa184dc6aec2c70b6fea593826944d99e8750fac0b496d088d0b916b8537006a9fd88013096c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6577a0fd4046b2de76611ed2cc65aeb
SHA1ba5cbf6ae6c9c8da27d853db238c677d73d434ab
SHA25630108c660dc5483728d88705703bc4585032d827d12e933390c37b8b1c8ebc2f
SHA512200d8ac038743cffbc06a8844ca34e68afe0ee30d90beaddd04ad664282cdc66c7d4f3d38cd2a6e07d2b585956727eba1a303cb29299cfca912e26059f2095a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf9cbd87707e498a71195354b23c582
SHA1a4a6e6e9b241c2170a751ddfacebe201eb8c2f9a
SHA2561a9530b021fe5b3269c4f58b2706d9cbb2efcb3d49a04b727767d40715c488ac
SHA5127c52bec6f6093c140844415964c282598df3eaa213c01fa0956fadf18ca03654ecf1324ed2677718a53dea13db98eb92a00f7e8cef31f44a69c313e0b92b7ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abd63ac462e47c111223aab8a9b0a21
SHA1b2a8ee8cd1b1bf8cfe2519315c9121e902d184bf
SHA25605732cc0f7e67a0f0bb09cac05e82a1be6c273bd1fd0e2b7f78a37d00330b428
SHA5126206ba8334fd776a5579c0029dc326eb4f8d1970f7e362283be3b15efe0b8f02d1e602f0a29753d06ffb4a4da0013f595808ec4a2e88ce20fee877c6ee261136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277604cc492b79e354bececaa6902805
SHA1f8f9065a322da60111e57683f137ab02b331ddeb
SHA2568a34cfb573a15675832f8a6c3605632a168929abf72b846e4576e9c61f761250
SHA5120163f03760e91cca87d512e9525c0389367dc80bbc766e59e685dff044cd9fc34f762e4948f1b5b78434f80ecd40f4bf930042c016ba865e6b9651df2a47e38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a1e30da51f6d75b43b8ad6e99025cf
SHA1e344d9264df2659c04643383cbac2d888fd96da6
SHA2563a0cc6ead5a7d6fb9810b1c0c0f88785af1cba0def27ab99f3aadd3b4c4aa0ab
SHA512faf6c2de2d0bc611a8728dcedd99fe0d024d7d6fc97308684f0633b29da6a66a9679fe86e9da967b46590d1eecfdd22d31b6c3a44be9a5b698f9209665c2fac6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b