Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
3b38b71ee93dbf0d9584ce2c9c50e347_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b38b71ee93dbf0d9584ce2c9c50e347_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3b38b71ee93dbf0d9584ce2c9c50e347_JaffaCakes118.html
-
Size
20KB
-
MD5
3b38b71ee93dbf0d9584ce2c9c50e347
-
SHA1
48ec7797644c7b144a9771af0f3c57013a724cdd
-
SHA256
323c79f1773feefdfc1b34513631f143db3c70dcb978d943259f33274a13770a
-
SHA512
86083735756aeac105bc3f99af418dc1af0886282543523fc1f5da90652971ab6b2d2aecafea6ed627a13c7facb96e1cc94d453de24d6fbf832a9394278d00c5
-
SSDEEP
384:Nits0/eQHChiUsVBGGfKdLLJOZFnACClpGSpO6:Nits02QHChXeGGfKdLLJOZFnACUpGSpz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a289dfedd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003cca2b951a422977ac0e442bbf3bfeb1ef2857c1ec0ae2b3bf63b76076c6fd76000000000e8000000002000020000000c783b3f0a8a7e14e3ab81f573222e7bc8c2855b41157451a25582a5ac2a948712000000005ae5cb5e84289168520b5362e1337347ce4ac916a76db9e5dd6b966ce45638240000000d641348438f820f2b0863670871e2589b06968aca5bed7d68e5bf3bdf29cee9697fd646fc704cb935f3d31f154f7dfeb66937b82d898e12a2591738898b94da3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426903988" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07C78B21-3FE1-11EF-9452-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001cd637410f899ed5871d61608dd3840654f54917050e7d46520374c8d0a246bf000000000e8000000002000020000000b3218686f2c8e74a5bb98fef6dbf796b2b3390dc020898630fc7bf7f8802189c90000000aac6ae3d6e0f0296eb66e3955e4633b1be1d960a9d43378273509b1b339ee8dc98701465b2966551794fb82a84b37bc52780e0923162559b642a4ad6f3c3dea85457ba06b00919a07cd571cb0437816dd9135ba3a7bea138344ab1c3dfe59edf833a6fe5f8d63ad8ebc759eb098df0810e6c273d0f145b6c146f96999d3ff3902278b2f5b0381a21da3ce8d2fed154e840000000157c4a2aafdbaf3686d48b5ef7ea320c10156361641af1338b289d00e9f7a54b7d950ecda18bc6c89011bbac41adae7af7be97e403054598f513a91dbbf7ed78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2308 2480 iexplore.exe 30 PID 2480 wrote to memory of 2308 2480 iexplore.exe 30 PID 2480 wrote to memory of 2308 2480 iexplore.exe 30 PID 2480 wrote to memory of 2308 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b38b71ee93dbf0d9584ce2c9c50e347_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d563cd61c4e265f8ab605f2bfba71e
SHA186ea82bd97c8b2e68489b48d7a4a17d8dc0d379a
SHA2565501b62e3807038bd59fd6a2d0e20b89c6b3486cc3722ac6075589e13aaee199
SHA51289e75aed7677a24c090720e6d5e4709b3faddb656ec0e7fe85482707b59d12502de9c143f949aa9439cd4b50cd120135d38ef6c7d8d9c0937d80fd0846f64675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1012b3a6f5965b46b080a518ab83db6
SHA11a60d13ae66cfeadbe37d4fc0047517411e59ff7
SHA25699033eaf67aead4235e9fd5452b6a1c4027d97fd4a8a4dacf09bf3efc928c7f5
SHA5121c4c7c597681f423bed16ebb4f6252a7a7627f806085007756f87c1d6072b2a2c0a3d5cca90443fd08bfe2a03caa30c0a39c354a4986c6192720aa2f8f3bf7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dffdf3470e50732803ca7e8b057a67a
SHA1ae0289d3578490c477845d0dbba62322b1f9ccda
SHA2567666d1d55a032d2e73c543caab4c5989d202773859f2e1d6ccf726bc6d99d9ff
SHA512d60d2a0e02876902700b2688617ec07fbcd8c80dc3720c9c4249dae6f2fe3ac02b1ae9a778c87dd86be184c73632d0ca93db216c9311de746a23bb89bde320ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610b7e8e4f5ffd02bd852c94df34fae0
SHA19f71c2f4df16a38500b66aa5c20dcdfa53b92c39
SHA256ff28b957159534e386b468e46e27dd602bcfde5764302730162f838781ac409d
SHA512bd4e80811435c23e4525e3e444e5b7a11aff092a10329a92fbc957f33d98468633571042aef42bd28e05436818209196fac12a1c0019e452715830b2fee3ef12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7b03c44eb112ea71da31d1f84431b6
SHA1f2b8ac4978f8f59425503ea8e84fcbe89a19f469
SHA256e2ebd98b2abfba65c3e4fdcf75b5c89d106d09ca5b282834a1f1386f9b6b9ad9
SHA512e3fc0f9e6cfbb185065f53cc932581fc23f517f12d00e9006fe448bc9feda8325486abaef4e9457dad9b0b6e2587670a9c777da123bab52168a18289b2ed537d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51108b62a743038ecda694c13a0fe50bd
SHA1be18a27424b4f2f609e29658d62145f7fcfc0ed3
SHA256f9c1535400f067c8ca9a6c1991c4287de4b128d2c1974c3e6f13b62e4b6e6282
SHA512055f6d0843328980aed5227cc9df5d8473ef800cbecb7ca649f56d2c85739bd8c2acb78e3285286df42ee15c0c375d9cb72c6c16476f7615536e67aca46c806b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e497db8e474f2210f8f769763bbf37c
SHA14cdee446353682e3973f6aab4293fa321cbd357d
SHA25646445e592a02b0ab1c7cbdf4eaeed816fff71bb61cde5079cff048b5d581b4ae
SHA5122ac9378632c1ecd4559c4c4cf72134bbbde2bbb0147afd2ac024daefe7dcc54f1c8bc42a531beab7c335199c97aed8ad41697defd0fd8b5d47152be071e6b6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751b162046c5c64b4ff6140689510f03
SHA16162298e866cee8907ef7e47cd5498b438b6737b
SHA2566fbc10f939471eb7687e5372f8ae5c773cf32ec8f9c6df53971160ffaf2002c4
SHA512024922fe639481bec06ff3d2de1bcea4efa0f0fa5de3329119733ca7c44d9edb82f1b5dcd5a13c307ab2ce66ad1423ffea71a6cb6fba4306fe9464a128e24636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddb2512d6624acc1e3948e2ea878f01
SHA19046faa985f5914ebdbc4f8184d600b174535870
SHA2569f7046f8ad78e59881f9710bb89ee5ce36ba39445559e0a607f9e7177e983f52
SHA512a3429c40d2321fb2448ec0e9c11cc41d6b84155ef40a02e018faac4f30d30ac1c110bc3067ccbbc2e6a8aac5843bbd5a20bbf11408b43b9192c97f32da487a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7be3d269b191a565540a5a354d310fd
SHA1c37a75753311c7db89e1ebf3444a2c004984c80f
SHA2560a1b80bfc2bfd18ebaf864fb71439d36061cc8c5d5861c8c9b99a205e26afd54
SHA512357c5c77dfae121d88620fd7eedbb2d3e9d89425c5780b595612a952a3cf71093f7ff0b1b9138028c0a00248b72edb42111576e3a4f271d14bbd186a1b1c059b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f5cadc5ef3578c4a6ef24a4765272c
SHA1352dff70854137a62650b37bfba947fdb66b036b
SHA256640c4a8d17a62f9a0bf219b93a680346930cbd971efef4304efad3e77910f6d1
SHA51230424eded4e301630a4b63251a86f5789103f0eea924e2822a97a487df0c8d56c7bf43b654a41c3e4fd4d7f75c6a7647fb1bc8e2acd381a856d21157fb34fac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c1e1b9f42f9b6c0f46e5eed2fc754a
SHA10366582bedf58a33f672d0505d9a9caec0d4c46f
SHA256b3fb33eb1ca4081fae91eb08878cad1ccb7e9016a67fd91a18a9c2b66086e48e
SHA5127386e4281ad742d902dd820f6b93e8f6fef8edad80f2c4c9f7a8cb186314f7631ae76404579bbd187e8476bd03cac15a4f7b00c725caed86fe9bbe81252bbc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59247947f9aacb0bb5d92100a7067b06d
SHA151a6acc48521133469781ff0c4a7bc8e09c3f708
SHA256cf51550f187fa3fe30a8abc4f4a0477f1fdb33e643fe99cdb486432ac1a149a1
SHA512d435b25a9d26cb3db58b477c0ca323c7f2d14f69c024a049094d87855574ad095eb53b61cb7d1ef5e833780faef256babcd0fa6d21afddbf5a7df80457b7a751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c94a4304cca401d74fe74243ad19e44
SHA1e82cb1238b862c49d6e26b3b096b78127513376e
SHA2569e730bdee5d35ba332d00234ab1e9fe8a09c50b217f8e2cf427f6fdec5c417cd
SHA5128c66d8cf5dd4a1f6aef2574ceb1851559c382a1d86abcc254c6cc135af732fb0068c0f8ef4222ab23eb57d8df51278d352a627fb314748104b06a53938528cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c3bfeba054c7f000e3e60b5f58aada
SHA15784dc4b48fa80c75c1905d1d66f2f2ca594369b
SHA256f166c057c2b84df5bb7b768ed7b329a79224a31e8dfd43718ca082179415f152
SHA5129bc2136fe4bf33a21de079415e524916f4471c79cb1933a8ceabb66fc654d6b2c2200ffa1299a7cc79cba97b9a51f0d827106ef418b44c3f7bbf4cea3193de4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4c136bdef6a001f9e30a3d6d6e17ea
SHA18c3fc8c35e1b16f325dcc4096e18e5d7dab88b45
SHA256021ea44735b46a8c97382be354e6bcf1c3d605ddc5dd9b1c22b761ef46b5099a
SHA512f7b0da8dba687706e8771c4ed4a2144d4afbd4f8ffba1ecb061f975ba03063f5527b994a135874304ff02ed566461c2d52921777f99c47c5fcac0d2fc1660fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb095d874f3a8524c93bca85bed78c6
SHA14b39dae965d3b68e3514ccbbf060fb11e59211ed
SHA25642b9bd6d594c82341641c02580b4b415055c0c699b1adaa3e0e9ec11522ad27b
SHA512a19bde2821fa7cc71f09af7d10e0a78f677a93330039038cfe1d2ff0801daab8a1b9529cdcba7de995f80e7368ff04cc57e87157c08a6fcef6256f5b609ac91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859ed40068c729d51764a8bb94b584d7
SHA11ade6da8a0a851f295ab4b698bfeb02303975d33
SHA2561629f37fc7398e5aa3b835c3d2c79e2fc0c9c757e1ffeb5e35b772c13d132b16
SHA512791f3834f0730ee1a0a2ec5bd66b876e0f0990ce62f16603d0f63f57df9934cbd6cf07da7ee6ea7bde4783654e28808022bcf798a2584e0fc5a448afdedec7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6bae1096f0cd3f1f16243456322031
SHA1a2fdecf4776337b658645ebee74d0d32d645c916
SHA25632f610653d8e9fcf8d3c1bbf5892573f41480a30b2a1e3d31fe3cb9c2c6c5302
SHA512cf4b1dbf7e59b10e0c7576ad1790276e7e5aa1c577630bf17821b696e505571c5e6eb135c25ed9583ad1db01abb2414ad601c9d2707dbcfbc664b81f1bcb2c9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b