Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
0fb1a582f0837523a5936d25d536dac5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0fb1a582f0837523a5936d25d536dac5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0fb1a582f0837523a5936d25d536dac5_JaffaCakes118.html
-
Size
132KB
-
MD5
0fb1a582f0837523a5936d25d536dac5
-
SHA1
39269bb2086175b20f0d52107e79c565b1c00e1b
-
SHA256
66ff2e157db90ecb914306211297ff92de6f3a35dfd37255d14d2e86bb82645c
-
SHA512
7eb513b09049accd3134323656b4e7343fbc65234ae16cf9410f8523d625f867e1f61ac1c082a7ae6bf33cb8514e415775947ef44145fb427810c26da76585e9
-
SSDEEP
768:wMlAKyKQFXEEDhJx3lkYru0WuO/GIR3RgGeLeRaeaQCDRVDb55M3o/9cA80F7uqK:+XRb55MKNEbas
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000003703c52711f48f66ca11d58459585bb0a38f77e298a157f1b7d6afde105b426c000000000e8000000002000020000000ded3acccabd2524e9bbdc5d9741fd34f5e1fcb3d077f01e5a47122512d16218e20000000413f622c2c9ba89e17689da01bab170ea5fd70e6cef76233287f59f467b8f60240000000ae3c7e589e05233337f7bc7ff7817159649620f8205956357f410b99b5cb8e701c79b85f9d3e22d657b412b3c277c4f033020b40ee40fb9cbae41a73f0153820 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425514926" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD9B63C1-333E-11EF-B848-DEDD52EED8E0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400907b64bc7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 3008 2056 iexplore.exe 28 PID 2056 wrote to memory of 3008 2056 iexplore.exe 28 PID 2056 wrote to memory of 3008 2056 iexplore.exe 28 PID 2056 wrote to memory of 3008 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fb1a582f0837523a5936d25d536dac5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1c651eddce75aebe96755f498ec242
SHA1fc02b66415879ae5b3e5bf334c2113dd81366f63
SHA256c63293580c00a9211055d43bee58d1c12834f380f5cc8c5665ee1c68e2fa3566
SHA512000d4c2be1d82d593423059529930877830a0ba349af5434cf8f08652428170252098eb11a2d63fa43d881a8bfb46f0a8f5b3365f08d4afe658bd944fdb60eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c38e3b51b27353fd3751e7b2f3350f
SHA1877b1b3c74cac72259a0fc114e40bb770580d545
SHA2567b546519a105638d1ff589a0d48ea4b76b02d076bbd875be4e6502665b1ec500
SHA51256ee95f5d848b75da4036232e877a1e4d4d9cd1a1c3b9f2bf93dc0eff4f43c0d4f0b81ed7816d3ad3214ca494dfe0ca4c5b0c4a99b0a51efab33dc9a079be025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58780e5cc6c853316e70a3eb981e0d1
SHA11f226ec7bfffcdf95cc68ae2539cd57ec53cea27
SHA2567b46576831a1f7d5e9675692fbada884c53dd5cd38e59fc026d2e4bcb3e861f5
SHA512e38335e48fe38b1d12de955002b11be15f558d2e4f5839f3aeb25b6825be469c7b0baff0c0485739d711c4d3d1c4dbd64bcd061ee985fcb1d4eb710d884097b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309862e7b9f925d58bd92070c413755b
SHA1e3c8d35993967f7bc8f605818febb315be1f2c0d
SHA256854085cb5bce774319831362b0fb6386ae2c938d1d705d80f154eae4251e4b3a
SHA51294822d155eedc1525cfa406f0bb4e3dd33521b86a5c88636122afab4cec1eaeb7142a7e77857b21796f0a5c46da8289fc924b8460229d9c171d0897912abfbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52971341762a848ce4cfd5c882e9092ee
SHA14d6cb3bac66c8390f88e7bab7e97ea080a896f5c
SHA256c7c2211ff14526ec23ee26b1d40badb79d1440baae9ffd9ff364d949c810ee15
SHA512d1cb297e1968e21699135c20554dd1c590616d2f0cc43f81f59defe5888e456bf53de1bab6cabad64ae7f0c9ddbff3245a3d498d9192e5e53224f935086d62fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59750fadec9dcb404cb5a91b9e00bc138
SHA1cdc59c810356feb953762bec97953fdbabbada7c
SHA25605205968b15ad7e23d2583c78522dba08faeaca9862fc3cbfa78780d3a123286
SHA512414958018769852927cb96ea7631d3bbef011242b464503c775b8cdc8d729e740035fc95d48f70d1a062004c1f2ca252ca3d87c88a21acf2963e89d01529f93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877088ea8f86815168d4bda432e229fb
SHA174074a449d1fb082dda808c92a8b54e9f53660fc
SHA256c224862d35cba0421e3d7d94e137d67454bc8d09489ac6a08591ed6ed17a949e
SHA512f09fa691bb5b011535deedd6dfd8f83ba77cf78a0901959a33cd026d03004f4fb05a875df3b1bfb8a684838eb268a0383f0fd2d3e0c34115db5e0c9bdaf7dd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672c6b4ebc01a310eb4cceadd25388e3
SHA1d864eec7f7b36e1a7298c72108c8b7e79d4a1e5a
SHA256d58bdfe2928d644dc11814fd78fbf49d2fd22397b16257319581fbc6ab77bda5
SHA5126643a59d51b1dccaa44f9ee2e3c39d6d9ce543aa41ec592da6e8397aa38b15741fb9eb7866138e549a0a0d250dfed1b574dcc85d56c234fbc3e4089317730789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee02474a9d277b4a1a24adf2ee4cb365
SHA187cc0ac36ed814d08ccf63fb3a3094a3d0d1c074
SHA256518e061eb18832499635a06ce7fb8d16dd97fdcc6880d155a462cae3040f0de3
SHA512a6c6fc40af1fe1e519e442351663a3a567f4db278589b36e150134d822b9beb1701dd4e2d229ecc71882ddbf824a42887e589c040d73584d9f903da441bb6277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a3789e6e770a2de3924e08659f88ef
SHA10bedbff0487005ae25ac78dc9a851948aabb1201
SHA25634ecd2271652ead2923fe9a0219901ded1579ae1ad1fbb59be8b32f733fac990
SHA512dfaae7b676d4c5f80d5ad1ba1db7ea16e3ed98ee1746ebfc5c805b44e7756dd43acca74c01096716c56d09cba05ade6bd0294c156ee4b1ac09cf7bd2771be9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f5865c6bc61ab16b6e9596f2a0155e
SHA18f869b04e9c821d451d8eb5695cf2eb15974acdb
SHA2564c5c1775af5d3f7a40e74bc28ec51c939c3ab358378240dd859c2442095503c7
SHA5122c88b199c3ff17bf7e779773d0d5d062c2bf7aef0119bef5f806fb22dd00c108ee9283c33697d4e65ad89069e71e7effd048ff734449f3460dc73fb47fb62165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ee18a0acda62a0ddaa03f065233caa
SHA12a644e5f907c627e9b85191608ff39b6eabf2dec
SHA2560c1732cb5b7130220fa2d89b64691052c20be3f4b8179603371387f00785b2aa
SHA51233746804cadfa9f7dc92d7e686e6528149a16c9f1eda5dc33087f9b5124aabc62d01f274548563b60093832142dd8711c3af06ad6f66a00c98040e04b01cc3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52934d312d03c563a4e5baaf4747f6cbe
SHA11f8dbd2c530f7f7bba1d4f5a5bd5df1a11788f74
SHA2560fea527c455e4f804ba2f0fc7834431cb87c7dbfa8b9fa20524b98bbb24feec8
SHA512af9e4d2378d12b6be7c4da909fe8ca9388692ae4b7f2d45a1c205a0d7466623ab8ef3e1fe56622dc7ab2cb402bd576d0fa54f44b76946fee40f2d1f83aaf4ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbdbea007df1101efc05c930b8bd651
SHA1e9542f2e31921bd920f3c727180b2a582d10f5a7
SHA256e3b92284cbc5e64189d0d80563ef453a8a2324db75d2ef6cdc5b5c2650ac1539
SHA5124da04090fe020fb573e5a7a7e4b0c9512ded9d14ac27fcad937674372fb40c68332721a9b24b4d42930fe6bf071c3faac677336d9d0c076c7e741d57323730fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572300b5c2a7e57b7b5664fba9c9a206d
SHA1daede6067beef664ff4b19cbdd7726395c15fc9d
SHA256ff7dc80a478973fb0503b17b38a4fae6d54ca8c309fc335b97a0a90f74c07eb5
SHA51281ba9b5f536cf867374fe492cfb8e8c3b4ff7d1000dd99729f9cd1386b32e6972896cb1f9f6c6abbd9d2620e088600346040953849e9a3cdc92147a91bc8dad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51061da33cf836a7bde08975e524794b8
SHA1692b4c502811027de07a0714e9bbf8067eee134c
SHA256d8cf8a77fb794ac74e8647aa48143d395a0a8006afe39229c5098612e5709ab8
SHA5128c6cb590456511a1c174914d413ff49c978cdffbc53cbb8081e0776c0f2ba8fc3d256e4d31c7828a8ce585229f3f9cd39c1017b71bfffc8e3c78d59a0b70458a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56656dbbc8f9dc8735c1cf4f8bfad07c1
SHA129ac96872daf47ba62aaf6226f8d109bf444cd07
SHA256f6ca84df37b3b3a6d86c4db5afbef3dce1c348f9b6d7ee76c80e6273f4873243
SHA5126c7e2de328d0b1cecb474b8909362d96a7a7caa2d15696cc6a6df43fefcb685bc6a81c0c2a61566d7c930342c5fce9b06deea9364fbd63266fbbda67bf518aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109fbeae89699284f0f81284e7596f53
SHA1148a4e966e853f016c1d3d42182040a1c0176a73
SHA2562f0ccce4684347ab7b648438fde727d1078a256cfb73046467d27d7186ccad58
SHA512cef0729117bde93683297cc5a61d78da31ae022a7644de057f1a6dcb47ad2274cf9835d2b7871df2189f29f2f3572044fccf239b5536d0ac0bf778d81a241b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58660ffb82cf03421f87c2c2a13e5e1b3
SHA1f06c7cfabb8a6a4ec78c0c3e5f1d94c363a33cee
SHA25664d0d7f415d883633b4c46f7ef6bafae0a3bd2a97fbf5af135e588f4e17ce8cd
SHA512726efdf2e27adc926d7548d6c84fdcc315c0129100a7ad2e80651ff18c7db0dce781aa5d037f4c0deed176a2e336e7db5537fb589122933a7b583df8eef5bd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58469673cccbf05422f23439ee900a096
SHA1911ca049d564551c585ec8785fb1bf2290cd8c43
SHA2566070b9209730c8a037e1b013d61d5734fb67598c0188b8f6f6fd34c294d03f69
SHA51221cff011a9ef5e02cffbefff967ab118a8b2c9cb646842765a58bdbb1c1526e7b12eb5e7ee7f6f66e25931e5ee642ac20f5748e4a0c34d6ec25c8d50531ab7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f3a11c8f9d489d6ba95ea57c9d55e6
SHA120cd1b7f210b2f5c32cac7631664d60816fa59da
SHA2568947885163f872841a54393158eebd9dc867c81ec02f21bc54a90247169cda79
SHA512ecea481c54b0927ee537adf255a4262ff514ba588e99dc751a0f956fb5ca4b417d6ad6b6c387062bb1d780bfaca0553caa4f255f955722a5accd61d994e4e001
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b