Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
2295ec74d0fa283402bbadf889d996f1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2295ec74d0fa283402bbadf889d996f1_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
2295ec74d0fa283402bbadf889d996f1_JaffaCakes118.html
-
Size
53KB
-
MD5
2295ec74d0fa283402bbadf889d996f1
-
SHA1
444e520110826d9de7c7d91c8d0ec816007874eb
-
SHA256
c30084bc64e4ab3452e6a20a22bb363081d15c02816f9a7339aa9efb261096cb
-
SHA512
a3c65c8841495da85b61ece2ba47f1afefaf9c85c4904096dd030a909dfefc1a72beb4bdb36c96a688c20292523e4c3e681158a9ebf271bc31a02043f0d5f2b2
-
SSDEEP
1536:CkgUiIakTqGivi+PyUNrunlYk63Nj+q5VyvR0w2AzTICbbDo5/t9M/dNwIUEDmDM:CkgUiIakTqGivi+PyUNrunlYk63Nj+qY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{840A0541-3943-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4585afc50ce3c478f49b43471de779f0000000002000000000010660000000100002000000020e3d59b7dab2dbfecfa45fb6d818ab9cd058056a5caacc7049024827daaa5d5000000000e8000000002000020000000d5ccac41d2d245b18a3badff182417b1f64a0e048b266f37cc66b7c7a2537e1720000000e67a50a9f2096c7ca2560fd278127fb09c72a7bb4d0930f70070f3b28a2b11b540000000c04ede347e88db3b15ff78c8cc7f32fdfc8e719310472051ceb9bc6ec14d1e17577a8dd3c9c6d7a27d1a563373d55c8e06b5cf640103755aee09d95347cabce6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ffd45950cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426176629" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2295ec74d0fa283402bbadf889d996f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f7445e57d74bf70b6c606735301128
SHA1bfd92b72a6cb9c9240198a58f156fdb6f6f40bf2
SHA256977157fdf338218bf03db0b9d632acd09c21959dd219ad2cc7d4d33cb58cd532
SHA51210be811d72d84fbbe8c1ac04127bffe3c12b61d98827cebdb19e5ac4602efe1c00075839ae0f9bb2a37e82e0b65c31e331b06e3c68aa6609e22c3e5440195d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b271afb03f15cacbdcff4043f9915a5c
SHA1d0069453fe48c1823e8fb696e6807e33b870bc28
SHA256cd4f0c06690249d2942f24cfa21b7be594884665252c1d1855ff3ee63a7f407d
SHA512395d269c16b90f2d91868e8a13d7264fb01d1c31ef99cdf9819d168c6420f73e878c34b1f386efa8b6ea0605defc50e9a6dc64f2216fe558a9d7ac42143128cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da273d752e83f2cb43522c53814a9b4
SHA181b3341150e9b3405e54a90bdb572268c8a3f5fd
SHA2566ffbe97637a7273394e474b6310a0d9fe81ac152c273df7fdc9152bf885f4da8
SHA51223cbcaa9c68a4615e99d49d0e5ebb66c9c5a5c718e1a3c3f4b87f56aaa416cb5af68290a84a5b380271e8bd00d3f58b99111da0356f658c791c18e254cf88d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d2f50638b0562b8bac9ef9860330fd
SHA1a7173e0cffaa7b5de40adebdb8ef4829ef831599
SHA256d833c15bf2618fc55a5832096451ee63fadb5d9f3267d244f6c9e9ac733feaf4
SHA5123187ba84d45bc9ee95cf13f307f0d46ec157449188af7408db87d13390cf66d89d4ba1ea6312d5c22549cea5cdccad4c3b7c80e38b109febdd1a06b9b061c828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b3ab39cf13f9b4b252876ee9f364f2
SHA183047885eb2b039cdff0ffbc1ae344e225c9e0a7
SHA256588dde8ec615e1fbae8691321f7dc6a489def251dc915d5196402d6b2afabfc9
SHA512d2a23721d028d1fbc29597795ab63b9dc3a54a36cf25f71a2b1be9fd2ebe0b41b87c50b9995ad107b7faa8ef1bdeeffaacb2c6029b8e4b05926633ae0e13864a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f751e7da05bbf5254fe2c27a3ef92ef
SHA1f605dc4e92232331706c1a328bcbe54b6d94895d
SHA256c480c0cc8771ebba0ca249129375ba07824e89b998726bef21e32cb6ed323185
SHA512331b8ab6f4c589a385a4cc15e4d11e40bfad88e24108040eeb62ea45d86b9ad3e4fb013b2d8bc975a7a03a12523b6a48a1b6b932c1002b87fd242cd2d630cc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520036f87f177164523544750bf807e3e
SHA161e571465ff07e529e6c8428d462064f2415f465
SHA25680ea12bd7dae2c84903183ad972d0299a2a2ec6185c24b3d4aa756f1ab0071d5
SHA512af1ef1d6675714b828e6b69a6a209841e06180602da386cd610273a2afbb4d36780ad682fd42985cee2164651c1966a2e9de1a8fcb6afba01122dde9152c76b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef0bca4e8a80a2a7dda8401092f219e
SHA1e51146e0fec88d3fd557fc15715a9935392a9102
SHA25668922ffcf3b49a51b75c30601a4249b74124a844f1023184db1f575a736d4b3a
SHA512af5602a891a359f11a38d6e15b16a4bc8f3a3c318da0dcf234412e054089b881fb0cabe524225ce9a7afe715c1b53fcc565c6da7934a8795c3fc32a0e11b74f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570e5a634cbc21a5a791c4576bfaddf0
SHA1d62a3ef97349bfe05211b1cb805908cc6463dceb
SHA256e69e968cbf34cd2112765d97c19bc5a28de1a6e4b8fd061abc1d8215a18d1158
SHA5123948f1660f3f0872eef8d78fb1bf7117afbbdb88ed6120c707e533b2f2c658f94b906f2c71e1f6cc5327df5587e88d3ceb3da967b780db2c1399e994997bab74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469a775173b55badafcb9e21db926047
SHA156bd9e49fb6db23bc049378a1a3ae6b4c0c4017d
SHA2560e74c7c2ec43fe423084c126ff0ccd240a30a275db334984016cfce1b8e4bdea
SHA512a9f60750f6bae044ec0bc388e7bfd43cbdbe892d1b8e53851760881607a9d56c9430c0d95295a262b3b0a7076c277f0b270051c5a100aec99a9c640d92597c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b4ee501caba8dd75f740e263740612
SHA11a13fbefc3a061c6d6f62c432fcfc17839f535da
SHA2564e4bd1558a58ad95a60944a89be0a72b5baa90adffd194c0653110604fc1baf0
SHA512358f1370f3da4cd20d41edb367678d4282c28ba87b39442a89437abb57d452e1f503dd0859b32dcd91356a04a20de574829262fcc8c582edf94f656c2566c9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e454648d53d50c90d2e7db781d87ad
SHA1f61cebd62bf1b17453c0c16b9de42541a3e6c225
SHA256b0183a43a4f5e12ffdf22fb00e87f6f4e62186684b4651e969709a360bd017e7
SHA5123bd37a2a7cc43286c044b10bd9432f454f87a64e9d3f23ece81b0ebac71e096fded4ca19a4b5fbdcc8e84e7df3cfa29b883b74bcfb632d9f6ecaeda6c124fffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fdd00516972e7d18f5882d64be18fb6
SHA17e27bb45668f13ac8c2efd52aad46fd011be9d77
SHA256db917e076b4009d9ca5f42cb7d79b224fd7cf8f962f117c702fcdb24b3d81f28
SHA512af99d1736ebbd8966ac86c831e4a773c753026aeb1dd9d1580a7918e42e971294742f68ddce281a4d89a3339b87c9f9702e2b8d6458f499a9d5819960465845d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e627fe185f9e873408c6f4ccc4ffb9
SHA1f9d3a44cab1117533325416865c0cf9d45076950
SHA2563deaf02d4ea7a73096ac03ceb485da4feee02c7839d3294c57fa2aeae5cbbe14
SHA5129ed5a3011a0094332a7cbe252ade0c5fa50c4d5f44f47ebeb4e71f0264f55a4ca9b4e20b11de4768263b175ae392aba959dac7e9eaa29d5d18c98d9d175c61fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276d0cd0819906906b06b6943592e7ba
SHA1ae9a58d89a0058a9d6697a8ffabc26eebfafa17c
SHA256a2e0b3f8edf7868d7b923df1569d1a6c359f49e74497290a78e1f792e115d3bd
SHA5128b27fcc8e34cc92cd734c30e4e1f7dd3de840481d6d9d90df01873513f87dc2945c4a996c90e7d77e53512b74288d67b6356533a5fbc2349d90da9810b16a608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538955961502abda396aa8b2908b690fb
SHA16c6cb06d8651aacdcd864dbae8fd26a357cdeb35
SHA256769f921556aba5a851526940cc23f0d280bd51ba51af762d3b7a81c1ac0090b3
SHA5122756cf3d18b582aa647267ff58497acdc08eb3bbc3126f2fb726eb24a3018a1737d3b5a555868ae87106129069524d3db7d322c25a71c6244127c270a703fed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d815eb409f3c41a0a3592e3950e1590e
SHA1ce4b143b980c5a0fb19a7967951f311eab34b8ac
SHA256f3ca7a63e9248b4d5efad6cb26a6123bc244ddd60cf1b49486764fe4a029188a
SHA512eeb327ad4b81b1a7644d06ca8762f159df63d8681b927316730957292940b6c22ca3d96a5c3925a7b5a2c49be481f526f439e12a8a73f3d4e5e4bc960dc7a5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43bfcba599288877a3e29dfc53bd0a4
SHA1e41be421e63408fe8d0890d1150bfb3aaae6c057
SHA25637ce14b27237686b81ee21e3ddc8d18261e83bb52da2ed589c9f236b5a831171
SHA512a1066bd91b488208d2ccf045495be892b18242b52b79974b9903df1d832a88831fd49b1fd0b8d8de822150e61ff69df3c0491fc034a7cfd425119724cf1bf22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9832daa9b38618b33a752ce6078bbd
SHA1272c1f524295b51bd5d92624004f9ce152907f7d
SHA2562c453004828e2d3f048f1f0939f167e772464cf4f10d94817d02768fa8994d1a
SHA5122c065c59f611f7e2a883251883ac3c9b871a10f051c1811878bb7006434c3b242d0538fc840fa69fb1f78423b405b6fe76187db9da0721f88f21b2c3d760cb64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b