Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
21920f21753e61f136d9bd8a0877f35d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21920f21753e61f136d9bd8a0877f35d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
21920f21753e61f136d9bd8a0877f35d_JaffaCakes118.html
-
Size
53KB
-
MD5
21920f21753e61f136d9bd8a0877f35d
-
SHA1
7a75238e79274e6de27f6d75988a453e5d8a47b7
-
SHA256
96ebeefc179cb40c3e1d86d0d213084725abcd9da25cb44144beb9571d810f43
-
SHA512
37457898b37838c443fe86d7eebcea0b7c27524f18ac271a97125b2977f8a312a952c0bde3422bbbc8f5455c72bf2444446a304a90a91bc7faa0c80159704e03
-
SSDEEP
1536:CkgUiIakTqGivi+PyUprunlYQ63Nj+q5Vy0R0w2AzTICbb/ol/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyUprunlYQ63Nj+q1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426154355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20746e7d1ccdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000058d82229443cb51352b6b8a7b2dca9693072eb63fcd594b9399e05319c203ebc000000000e80000000020000200000006a2f3f8a6038e88561bbe6f9403b87dbfa200e387ce8a709a92b2b74fa4fcb002000000080250a62072e3dc0498e890a059f655c9fe749f575e05d0712883f6db3df0c464000000027462ca02c27305e0e951b560e8f4351cd03e71e9c5ab7ab3235582ee1ead7de0332f65752011601c9b1fc540103ba5405df0a8f73c5f88bba794abdf53a8891 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7BA5551-390F-11EF-A490-4A2B752F9250} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000669c7723b22f298a06aa6be08d3cdd35f6eb78e733b7ac08f4f1500943c72913000000000e8000000002000020000000cb7acbb7cad19cf0fd8e82dea014b9b21385eea05a7b27286b1e40df158a8fc6900000003ff58bc747616d91618cc512a5cbbf94c43f3bdf3350c8d3c2c92c89772d76ca9e89c041c01a74747a4d7a1e3d71506e576125e6b5f3dadb3e826ae782776132b15f58cd512aff4f229aaf07d75d43bb6df554079de3dcc2374a044d5212f564e435f31bbc08dcce0403a3696e340ee32648ac20415ae30e4ba4c3176f112e6fcfffc2e40055c125e8d72ecc46c270ed40000000fa75ca0c55ff53bef80524d6d2d75fffcbde917e534c0246ee588df4ce8454dd4097bb6812479877e1cd95c37a984be8b30654a29009835747f26c7ba034548a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1720 2804 iexplore.exe 28 PID 2804 wrote to memory of 1720 2804 iexplore.exe 28 PID 2804 wrote to memory of 1720 2804 iexplore.exe 28 PID 2804 wrote to memory of 1720 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21920f21753e61f136d9bd8a0877f35d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718607fa93de03a57320e75f12101443
SHA1f73db5013114fbaee50e57c490842f4617af3339
SHA256c4390f80eb50fddb1bfacf8148f1f8e6a988615fdd46da693fec83eea43f96b2
SHA512d1d83b22d1e7d4d2fd4afb49a93eee2b2086bdec3488b73abd4f1826cd54d4d401e02f636941b71aec2801aa4c4770bcb70089079e9aa2e1cdb485ac1e7e817c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fc7831a075f244849d8a2e99d2343b
SHA11fe9a05b34363f7505db24af33025f7f57eb3c2e
SHA256fcd1ebcbdaca87d2c6dcecdc2219304c249758a8a5f586b458ca79b9052325a8
SHA512d8c310ffddf308bc2bef0cbdfc822c4ca285bdf322104adc1c30e29ec9a3d7a6078209f758d2fd5076180a415a5e4925e7efa0cd4f440297b044ad8bbb9c4faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99402cb94a331b045c113d300337c14
SHA1745aabfdade6a0569c635cc8c789bc8ceaa18f81
SHA256448b7d822f2ae7eed0b51654642fb836a748ccc1ab3f9168cd446e786f818c31
SHA512402e4b3933b6e28be9af7aa7568517cd1f5f0e9aefc5e8d8f7f22eaa85a439d058626957063c10a68f1ea10458528e25d1ea682e8dcc0ea93f9bf355c10fecf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2f729bf22abbf0c3e059da934a9b43
SHA10bffc8fe84f076bc84418f792070181bbc5e89a7
SHA2561e22f853ceb7809d1e094754b6ef6ca7678baf67e8d943a9906fa37762191d5b
SHA512820f844659cfdc4d7289138c67e645d4a14a6d29349dd1fdd7dd49cb6fa26571de8c6cc51e9a1dbbc44f8ffd45f4034cc23c48e4f8934645cddc68c0a2b60272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7d61490e87c4902eea20d28996cf20
SHA15c3f01ecd3f7f7b06b5b1b6b5ecc03f8d6ee49af
SHA256e4a2915ec3f2643bd66c8d58869df0f98a46ec7993c4c91fa7234f22ee823ca1
SHA512ac2b4c33001fb96f97e84682c92daf3aa07fc98d25a0b896feee3a3e6607b69fe1b0f5e9bfa24d1549d1cb9c0b9bd033e61df6c90bcf0b13f25a68b25f1fdfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2117d41d4616046f5124d8828bfb67
SHA10d9f67a4b51ce824c6ad3cdf988281d545b2a974
SHA256b80e0fc7b370ec5e463ec51da9f60fc9432fabced41da66a43adff1a9837e3c6
SHA512925ba130714dc2fe7d3e1ef361c45eb7ad5b8ac1a659823f4a80ad93a0ee7bd94eb4bc1e9b6d5179797b561a9e20649cbef2584de87c851273c136196512dceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3d8b45d2df6bf30efa982275cc8789
SHA1e3036544d454812a58e214520b756c0b391b65c9
SHA256c1a886a6af0cf8776e2034c34d5b5a3146775fde8abaae841d3d5f8d550a5ae0
SHA512fc86e6fb8f7b79340dac97c5e9bdfc98aa3d1b4e3c74d6de435339a69aaa665dc59f8e8bb7eb023820af1f18a4ccdd349979c01f458b0ca93047f41dcfb05bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8d78fd2fd57ae2294a8a5ec6eb345d
SHA1ea2af7f686c67c86eec27fab57716a063213ea50
SHA256546175f70e4c0e010f3ec7cada93c91670939abfac32254149052b784c162369
SHA512eb35c16a60a646da33cc83ad7f1eae062a723f63e7cdfb587aa7f075e42baf36bdd234b6261c3295f277f60018e55fa6aef707ca011cb8189ac4075e7eb55cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95eab3123be731b5a5c7667b5b53c60
SHA193788c5056c2b4add65cd84373b0b31439650058
SHA256ddaa5f3e2553bc1f03700aabca80a0de7c74bc42686cfa10a03d53b2ce2ffbdf
SHA5121bb7f48db7b956538af004b0831de646644c8dfdc0523f4afb7c47ece169daadd788a44e2e9d7842aa1b6622ffabbbf6321165b65f681e20a4676240440b9aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307ffc88c41eb9dcaef4a79beec0537b
SHA1395b062b731372a2e18bbddee728e35d7ed9fdf3
SHA2568d00bdad43406901c17c12198b09062ac71002a1e121aa2d96f8f3130b52264a
SHA512621ed4c01cfc1b40979fe8e6d4de03247b45f18067a4298b59e10bbfd84a7dbe45ad0a0ed20d90708a265b5f39ef178e94fefb5c2898a64e1410e70d29f7be22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c3a7eff52da1838ad95ccec6cfb51c
SHA169488d47f0a14287fd930601e72a451aab317968
SHA25643bd193c286d8d642be74849d8a1f06422ae56a53d7b057d9bd2d329577cf363
SHA51267533706e7cc0236196a617b3a1a765eb9e4047277ba24aaf679cda1f2a662e4131fafb532a105348eb21e3dde3ed2b15300c14c1613876fee5eaf3028b4859a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2497136a14265e9460798434e2faed4
SHA1122e3b57425211b8a48f97aa5c44efbe7b4c56f7
SHA2564fd354015aa0a780b40044f170aabfbf44099d344bcc1a582129d09f2033f262
SHA512697894b86e937d14f0ffcb3cf6b47c6aba157dfbca407e9cda1df1349ccb75a97f4eba57ed8b18dde1d8e5cc717f657efdffd1e60b66b01a8dbf2d69b4b3f919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038357022bb9d7a01b3fcc3546ce129b
SHA1007ef3bd0a97d05425b345bcfeafa84e4e34d1ad
SHA256a66a25a1df552b346566a694ae67c874e80d2aee509abcbd629c1fc818d00834
SHA5125b0635c45aa57f77643ae803266640e9c5b09d97319bbd049b4add34984c1cb5fe42429bb4596cb903acde16b3d767304c923e1d1fa8aa5566b0564788469343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792222a58101357e186fcd8773f5f0f2
SHA1e38aae295ac1fecc311725aefd139cde356d04bf
SHA25633a07e0854cf105db87ac90d799ee99b7c34c674a26650ee9f6224b7604fa4f5
SHA51256167c8feef657c9e3452d33da523f120ad40c383adc77575c1ea7bdb31072c559646d9e3e3bfbd94896500b87210775c35a3d13b208e8d46cd98be39b07fb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5db5ced9eef7482cbf30dc1e730fd6
SHA1e260e98a79ded80d2580445e6c22d76ea2501416
SHA2565230599453d49e063a5d645f76c1575592c075ed6f4ce972634136b0012f179d
SHA51249c58f592a490d34a5c4143f00c1ef092f1d1829e1f5dd13a93d8de1cd19d6390e506139dbbbd694c78652876d71955d035eb97f0487a09f307a2871ec23ab02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb2d19ef7e243cef62d53f3df358f2e
SHA1fd850a70004c69b2f6b5d29635ddd853312f2acc
SHA25657caba0b7074bdce6018b743ae4116fe3a4a6b2c7147b7cef95f5459b424e232
SHA512c619f42295d5e3134c98853c1c92e5b1d4b30e07ea0a6db5efa646400f865d4c829c0e611d27ffcc030d43d6e0c39170f614d6d07b2a9d2cb8d54a82e6bb4ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace5ba8d3baa86061a0905ff0304f7ac
SHA1ce49fbd8e27fed016f6b1591e31f857b315f3345
SHA256d1b81cfc25e400281efcbc6d73dc1d328c44b8b0c700006f4395b2d5c6d8ced3
SHA512d1a39f00dfabf1a478a094db0c5237b0b10f25f62408e105bb21999f219d5fe146612e82c07d98f48ce538908ab68fe53470d6e1ef1a800042c5d9482af73245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e96d3c813db02f343d42a8bdbe36adb
SHA11884d81f804d6ef8dd186a3c6f86c6c278b3900e
SHA256636bbba782802c5813aafd176e462dac242f389a18b4c24bb38d29d7bc3fb8cf
SHA512b71dae933bbab39dc4e99060ac45a6aca4fbb519a9a7f8b495bb4c314d85d06698e0c0bfd67cab97fbea107ab8639df3107aa6da2c130c3e8872a4aa4c077f7e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b