Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
29bf033d8eae3425cf0e58909c8ed944_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29bf033d8eae3425cf0e58909c8ed944_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29bf033d8eae3425cf0e58909c8ed944_JaffaCakes118.html
-
Size
4KB
-
MD5
29bf033d8eae3425cf0e58909c8ed944
-
SHA1
8b65cc66335f4a9d6bb9badbf4e0c684c0b134f4
-
SHA256
a0e8ad70cea2fd1014f6303471df622e76977e2db3284325d52e0ab5cd6806cb
-
SHA512
80bcfbf4992fca13b62c3a1fc3b761aa29b314977ef9980405cc48a54fc1a3209807f835b6bfe4b73cd82dc7f38483416a1573513c7cdc330c89acc9b6ca129b
-
SSDEEP
96:y0HzlRuGO22O2TEjhauHubReyzXOgMizuyTF3ipK:y0j6chacu97xMizTTBipK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20418d942ad0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC727AC1-3C1D-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000000b30ea25072a09f2ec9a3ea49ea1edc3da9dffad092fc237eca3bea79260ab56000000000e800000000200002000000050099695b16659e0e99c196fe0bc1e0d5d46ecbc19cfdc8a84f92c900af00e8c2000000015b2be32256db6d5d3877ca75c9eef17f70e7dbc0f7dd6b6885ed68ca05f949e400000009e701b50a0f89373b8f3a7bb50952d2c825466a6dd05ae657f9e063193d844340b3e446eebb2446222a3762eb9bd36701ec76dd7a7c7793b691ecc813ec5196f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426490259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2576 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2576 iexplore.exe 2576 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2576 wrote to memory of 1648 2576 iexplore.exe 30 PID 2576 wrote to memory of 1648 2576 iexplore.exe 30 PID 2576 wrote to memory of 1648 2576 iexplore.exe 30 PID 2576 wrote to memory of 1648 2576 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29bf033d8eae3425cf0e58909c8ed944_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557eaa9fd710c88fef18fe2c43b23e4f0
SHA1bfe9b6fed30fc76f448ca6e2542479989cbbb919
SHA25650083451266f6ef96db35da1d5157c88c1c2d27de6e466eb3dccfbdabc336d84
SHA51235189fd2c2a714ff6180167014ee9b7af977538f1e01c37d4da24b956458538851659bfb84c88e649c3fcb97ea195fce0c407c2129bbd42e6e97c92c74802197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb7c629d3d2ea4f0e8d0cd8e916067d
SHA1b70ef6e8cc108dea98dd62c015b0de72a7acf4c3
SHA2562b610ef4b340b1420edcc6d6ad20e01278a2af9aff32df3086b3cb19294e6a92
SHA5128e585ef30afc2b31448384ddc919f1e488279776cae34e12bdd8456187f7510e65bb2c568dfb8050411f703ff14b3b70b58e0d5ab11283b3cce871b1d6d31aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56119a78561b7fd7dcb1898eb595203de
SHA18b35ce9af04dfc0cb34aeebc97c5bc898205857b
SHA256fcae96396dcda66d06491f38ce834602c055c9a45de568e7aa39a39233598369
SHA51211ad3f1753cb86930aa32e2d53f26e925976f87210847752881e08d11551290fc408e9a754606de9d5bbe40e503e3d9a74e09a1df4c9faaa3ff8654b3e90c33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731b607cfeae76a4684d2c07c00d5415
SHA1ae91b09bb0f5080512c3cc2bd0edcbb958bb0113
SHA25678262b0214bfe4adc605c8eca85652e20169f58e40966962373e8b01d7c1a477
SHA512c02eb2c3081be4115104565f0955d4a02df194a89e1bc4f6aef448d7f3a75ac9804f3b7a05fa190c6caf6de2f4c23cb5eee6c046cda023270a727c8c484ad901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67158509b9092ed76b88a3ef6d93958
SHA11fd29cebd180627731d9181d794d875452c6fe76
SHA256dde70fa9f1636391e9d961349e83c530e61291f3e3ae8edc4b823b0de2603a15
SHA5129c12e813baea3b69013dd06a8b9b4da33cc56aaa0d8f1c588a1d1b1ba7df07f8f81d715bcce6120096f225616d72ebb6e961eca70917deadb3f10a0441c3c92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ac4172f513a47b65d513f01eb6ed33
SHA1e0d412912066982178d627133f138c785daa0d37
SHA2566c4607afcaeb9814594622c4fa7472192f358206b91307d7ead8999250b3addb
SHA51276cc30f77253a3081e52d928475b99f9e509cf9167c35140c7c2c3dfbd0db6ccddffdfa3e5fd671c19801c30f79121205c7fc40ae76a03444f384271f04fae2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def7c4c4c6f224487945bc00039218c2
SHA11a722b79e8f7b6b5119e0dc67576caa57c1d729e
SHA256a509aa7d82d93a6637b63720683782eb9cb121b02256bef8bf9179a4b248d389
SHA512c30f7af3ce440ad8a75909bb6ee3a3b7c4579ae3443f60248c46487cbde85f33892cf4b4ffac363b805d5599c20ca975e3db980a5f0a85c10c5e37c44b839fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509184a07f938131b750d2bfe3a33af2f
SHA10127ffb880dc7465f0769504447a22786e27d280
SHA256fe4b02a94e9abf1b1908ecd5ffe1d8704f16560dc23a51a48af4663c4d1af3ce
SHA512eabe2df29d38f5efcab1f799bcce45635b89987012b72afe6fdd4a4e17f441869283f0c6f821241eb5406e51bf74e2f4a1dd6634904c2bceb11784d60ce0a638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5491e76b4c76444a776506f49a278b
SHA17e1ac2aa1da5d43076fea2dc57a0d9a9d111a7ca
SHA25645d276f3f37379c199baafb00a3be26eb5a2a250c514e5a78bcbcae420ea4b69
SHA5123c495a99b916506cd1372ae8571c3631c785f06f19ce629c3f40813d9aa102d650d7731a3fabbba337e17b5c0070013bb891c07f6c428946597045dace74c08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b540f87385ca89c89c4e6160d8c2c93
SHA1cf996d9de45f88f2c866733a2f59b8cf01fc1289
SHA2564a81f72519a81b4b7c8019c966cb199d8143266fb2aae8b4b27e255babdd83f0
SHA5129763227ba7c74125366498c5d5a3d2719fb3edec91301b45cafffe5f52daf98bf3f7d064878522506450a3ad15357988a9d5245879491ffbcdb080f4e6d3d05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674a12c110ee85a999e5eefa9ea6af58
SHA1388e43e86b9b325419dfe206ea9b5e42f8764375
SHA2567745b57225353707556994330511bfa464194eb8e6b238f84fce54a7cba34189
SHA51239da41a2786430f8b9f210c2f820c051b6678b37973fd51162e3e9b6234e1dfe6459d7c06bebd142efdae2cfd0a3fdcb7f864821ab9ed1279968ddff1f944cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d9eef4297c8521ea03d0b50168d111
SHA121962075d375b0f66b4fe35fea0ba77d0ac50dd9
SHA25696b99d86e5f4e37318aa9dc81f7be1871e6afc300c28b40557ba86245b6fddc3
SHA512173b1b9004019ee8f0dfa0c0e12ba5b279d65be34529b84a970642781510ce0ae09cfe872c8ea61275127621aa44d4bfc031c99da5b909e10db876ebd2e9080c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4295b2d08179acd6c06f4c3b4e2df1a
SHA17147b461b0e521116e223a1e53a889edff970af9
SHA2567b777704898133f224b5f848fa42454347a31aa7e6ecd792e4fd89442529d8c3
SHA512c81aa091046a0bcc9162db2555bf6596be80933c6fc16d4facf72aed35b72057d4484ccad7f31955d7a2c736fd522790c0cc47c23785268968a9a621aa469c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540a8a7cebfce062a6c46723f1652f72
SHA1a92e57fc2ffa591a1eea9557e32c6e86a6fabac7
SHA2565a382eb0ec265ab0591a3f5b78be342f62169eb876bcd84f0ff815aa7a8dd1a8
SHA5125da422c1d73db414f4c26ab9feeb89ca5847194dc4d181f64b1f1afdddfb6a8312b788442b0a2553d36d26f81dc08d82660c14495e2d3107d7e8cdf03b88fc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef3c844f4a11857859233543949f7f2
SHA17facd67672cd654edfa238d37c61d22f6c47c4c6
SHA2564a0e930ef8b66ebeaf04fd5a5a9e006f95108b824a4c938fccca332f9f828d1f
SHA5129ec164b7c51c179f3d7687f6f64a61b70ffbf25e577f8153d24298ecfcfdbbc55c9cb146e9e01af66c37139e115fd9ba9bcfd643114bcdb9bcef68f537a9f164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0b1ef6d95f7e74739ac80768a5caac
SHA18cf38d486a0044eb1892dd4e03ef10d1f8118868
SHA2561ef355c1199d77803fd27c2acd07084664e63182dcc01f52733123605aa98e3f
SHA512d3862a07966fdc76689054a21c7628a2571fdb98a13c918491cd123bc3b1744dac168d8a2f634c7152ed911a722a12bad990ed6ae17f1e641a523d0635f4b2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524299a40bdbccdf01928a91376b4c301
SHA19f88569bb9c3ced324bd4f6a3a905b6d2621da2c
SHA25696bbe7308483f4e6c8f7cd248b4e234227286efba5a8f76b22bd81ed3503c5c6
SHA512f579bf961df94d3ad694974a3de7244c70642e91abaf8a03cdcd6c3999878b5cac16b552c5001dce4bcbbbb365a7c1979f65f7a49c67e01907391ca20f89cbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a5bd5628fda36bb24d2705097ebe7a
SHA1123385606068577a8175bdf48bd385bfaf7b2166
SHA256465298b9dad5893c97243f5e7f58a6f871531467cf0d04b912d4223a19b6f9a7
SHA5123a0639b7e92b17b1a78e174c1a115e77fcd32d83ef0e73a15c053ec75405879f242b990dba89c86fa81f72e85d29bb54ce668e4fd549c89c80c96e3a3310094e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6de14b123de2637ace8fb417441f34
SHA188c2db0e40d2c448b277250eca82e1268c4f3ab6
SHA2565206481daa48b50155b0fa3bc2d6c772b1120c1ba07b2cc10ba2dee2d662203a
SHA5120e1af870a7b96e24add9a97965293dea3bc6e43d0ae9e33030bb294cc46fa78406f31a90487c890eaf52eab88ac5aaa36ec8ca17aec7989c95375a08160082af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54378a38020643b349f9897fb8874dbb2
SHA1c288f87506ca088ccd9206f5ab63672fa8acb60d
SHA25607de5b4db6219b2c7692ca25d16e3d781ff88bcfe7051e66d92a928508eace56
SHA5124d4092078a484f87b9991b514271366ec69185bb698506360e2cefa09ff678426a205f02b4724d09176026b25768057a8e6daa14a1de316f3c72e4f50c9179f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a05ff289cdc38d93dcd0204b5e6d590
SHA1be27a4e7b72701260165f60b28af13cc2b13b8c3
SHA25692482c6b16acb2862e9214af0c217763a0324a563d8740b542fb231ada8b04d2
SHA512d19238deff0f7b0f7289f9ce6733522bca2f15ae4d86cf3135d518653b84123950778359e67de671e628a7093262613391fad7862daaac46fdbf8b06bc98153d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b