Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
38ce0e2e85f6ed8e54e3420332d2acd8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38ce0e2e85f6ed8e54e3420332d2acd8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
38ce0e2e85f6ed8e54e3420332d2acd8_JaffaCakes118.html
-
Size
18KB
-
MD5
38ce0e2e85f6ed8e54e3420332d2acd8
-
SHA1
20b79a0d729aca194be494cbf479dd9c8252e70b
-
SHA256
fd5462771978ec3995cc1f43b53ba0d59916a6cae7bdbd711abf6b7818ed078b
-
SHA512
3086c352dd557925ea825e315e675d5aba0b199b1f0c5dc62dbe6062ecb3a743dc5b8c92d787f2f212ac31b1cbfa60b8bc579ff9f4c1cefa96bd39422b3a340a
-
SSDEEP
192:2EM3Soo58G0WM5TjcGRVekg+yfLlYQ8lHvQKnWkG+z5HzaYuDG6AScf+l0w+V3Nz:fzM2fZx52aDG31kQEqg2ihnDY1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f2fa4c80d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39AAB361-3F73-11EF-B74A-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426856827" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000007006adb5e40e668bada87c8cf60cb3c3429e79411648e29175d8e34ebce5b3ab000000000e8000000002000020000000cb067f4af083c9b8369ea3739c8f4ae71cc3b7958cbb0637ff6507c65de4174490000000cd3de5e890cb838405449675a8ac00126d600d7d98fb098491e86fa8034a2d25f5fd16d6f3a5d60e5a87cf04d4a614a57416047bb958fe7cbbdb1891903609068e0946a24c2f3d4870989b7b91519c20024d7d810cf8aca56cdc5ce5869967aee011c79ba374b9438b67215ca06f841331c0f641fe1f0ae7c16a19ca2fed218523f63514adb45642982d0eafa184e61c40000000500c99d118991ba7d2d43be320baee6ff914bcff27173cd8d7f8d0b5c1398049400f8c04a30c7706830a8833e7ed9599004bf1344f21cc0b6b242c4aded9985f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000033c2b36863feed781d9e39f6a907d42b04a8d02d8855ab9742d6b899425da512000000000e8000000002000020000000400d4676f5809cb3d4a148ba3b5556cb752a05bb2f7b1dc881289a3974c8f4472000000073d9f4e2c9430e3c96d9c2b5fcd55e34771dc699be58cda17054ea1a9ea7a8b540000000f6951797873f4a4e4da3ed70456092776de027706edefde46a2f59e6d393015214fd48959ad07c55150c6aad05fe7a209b77207e073f64b119211c5778aef1d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2796 2972 iexplore.exe 31 PID 2972 wrote to memory of 2796 2972 iexplore.exe 31 PID 2972 wrote to memory of 2796 2972 iexplore.exe 31 PID 2972 wrote to memory of 2796 2972 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38ce0e2e85f6ed8e54e3420332d2acd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dd6e2a8754d3b173c4b6399255a5a7bf
SHA1bf2e4080cc177de9b66754714c99e1d620ddde57
SHA256356565b4bd9f7a6368d83bd28d00609fdbf86f33b09233673880f1da64b29964
SHA512cd819de4c84b3ca5d820266a50067d8754a4db541cb55d8fd193c1c4652198b716c46def10d930e50eb710f9c0106f788053b1b026a246370c55e971594d61b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5719e9742f6d229aaad592044a3806810
SHA11ff134fd9d73f6218635d5080d27794d863b4332
SHA256cd1d0aed4ab897c83c5c760f4f9e79956af13e42bc5dd6681a1ff42e519308b7
SHA512d21531eb3cd1c62eae25f2ebd1b6af437a481c16401c9653129722cab46dcafb0092854cf15566890cae028b3f571268a259d0b5f2b07fbc47f78c5c0951642e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2567168798cb7ceaf2ced4dd4ebf08a
SHA1404d7a271a871c40edb767b6bddd6c20a15abd2c
SHA256c7e2833be8dc405123e0c84422945298e8fb7c5c268a6d581037d7bf2278ff45
SHA5123ef08c005041a9f5877954cd02f16137f519c510bf30d4e9082a298766bc778538a89751a23361b458fd73d77737b6cfc59844d3e92097571aa3d3659a2d7950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51230b0eba7808ad238b0b433dc065c6b
SHA1ea02b43ff167a06c2a818a528baf45f71abf6c51
SHA2566991c3d42f3a5d64c0d9fdb03aaead4ae71995c5ca3ed2f4b2e7f9ed1b9ea744
SHA512d6650dcbec4b2f8517a2bcc3a36bd2b3f97001a5774362e2a3803acae3a46ddecd63cfcc9bb54304da1dd68dcee0d26f35132b24b11a9a5a6e1e5d554504f24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9c7ec74479b9c63cc5eb9a7af4644c3
SHA16244937822799a1ede2ec7c1c4a783ea6c413030
SHA2566c465e37b9155c3dd8468385b5ef4d94fd80da9e6b7b8adc387a099b6597a731
SHA512fa4487437a30316895e21ab1ed923c1697425ae44e1f488080adac3931a9382a2994706ae2a75319ea673d3acee2b5e3e46c128f0bf6b57f62507a1b8b793daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c4a8fb21d26de0790313e82d7642f3f6
SHA1d031f790bf3e5f17e17e7f8e2636147142a75f1d
SHA25692e839e4c41f0657d8aadf4231dea16a37b36cae493da0b3d5bf63d2d53ccf48
SHA51201e665c3ee9fcd1ea31ba0a7a441b518f30e0eb51b5bb20f2d42103cd68a3088980c25f430142237c7873dbb94c343063645b6c5d3f81c79c07320efde3315dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5763553b86c8799f4d56e4670b532921c
SHA1f39aaaececc37ab808d2bb0bb85337f6aa9b1b30
SHA256e139ffaf4be4268157d84d8432625bbd83068f7be6a92cf9eb7cf786e8d7719a
SHA51299806e82e2487ccc740c1c86de94910a94675108ed69f7b63d3ebf8aec2fff5dfb46847c405d12bb898554dba5207f7b26a8d8f917bc9b2a9477719f6a409e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be827df4e0583f7dfdbffe408677d7c5
SHA1b5bf9f21f20be5fb3245a2cf1a87047c299b2c0e
SHA2569aaabe90615eeae1949f4925a5b87ec381c641a90817c447b85dbc2f4c0f4d40
SHA512af1c9d709fa3179b2a58bd576c2022859f3301713ec95d3e4195026e1644f33743013caa5851552794eb1c668891b24512ed4b506263a2b4fec49a503da3f938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54db5de533ea583cd9fd43235b8077b11
SHA1873f711ebe464545ed152635d7e6b5d49b141e5f
SHA256b9ab321e99eab8101cd8f63897bd405a7734b6195649bfae52b009b04c3f28db
SHA512bf82d647221df498bacc16490df73bcf86822bd6effc37b58b3274d3becb2ee29621770eaed0cfc063d89df6df6a455c1efe47c4bfb48c4a6ab094d85af5f4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bffd274e2f59e045324591e751d34c9
SHA15c551f31f6df5247136ee3fa80b5c7108732b89f
SHA25694d51fd7518e54cf70056c3f502c71f2dd9208b5094abd0518040a337dea15b3
SHA512234be8ab6ed0e3d3167a5416007d37d0f986a10abb7a3394545ddb133b677b53e9663bd70693e1eaf047d0e51b1302c496ae62fd24386950cad4d21e65c41199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c48c8b3912d27d5a920c5b5f05d02c6
SHA1182c9213e00848f9396d922b9c10e197826d4a23
SHA256b9d5f97e95979508692167986902c8083b7673bb87c2b1fd311ca56a449b9428
SHA51249c1c37997d9bc0536d9b2b7c25b8795a755d483a7c445f95d50962f04ab43485d78679a096cee616afdf7a3459badda89cc750f62c4319e87936982c782eeeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d92ff01da5c3510d3b7074455ccc4a6c
SHA14895611d2c88e3b985b158df98b6005a72a96931
SHA2567f4a9dbfa358adf37e7dccc9e8ce4edc9a4aabf905bdbc1b82a91f9e017f6aa7
SHA51281f7ea707d99bf140054b837cda7bdfd171362a24fd4e9346609df5550d42386543cd740604a300558ccc401ff00d89fe7306f32d73df5ecb335660889ab6b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56dbb43dc4928ff08e7646d6ddd162937
SHA17e37fa3bbd61266c1236f9b1a3a91131cd37b745
SHA25642f5aa2eadc7d498f36faf8989cf79f931696cadcf421881522dcf4143f0f936
SHA512c4dfe6be48f866e5a4550e8d1490714286a599522c1f24577c39ec21b3eea8de2ca9244fa666dc2b4d5e2701ca285c3c9caf3eb5aa48862ffae7d5a3a0919975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5755725c16d3f517355d7de4695cb3913
SHA1facbacb8283d2ab56534856a6db9fb9f3bfd9fca
SHA25642550c56c03949543ca5cf02a246e9ec1978710ebdf814becd38d39eb4a539dc
SHA512167577e2500209d99e1a2eda0d7811056bee793892e859aeabcc40a9ec5f52b54be6ba50a1d8c9b01df44c7641edaf703d346f6ab407376bca6454154d6cfd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52fd3e5bb7d1471961b6d19cc951445e4
SHA1fd133c8729d30b17f39bd0ee341615fc6db7ea3c
SHA25691061928f162bae3e5e35dac84a2d2466e85e6d717890f8e7013bf46ad4732d0
SHA512cc734f0c616c52bc4103d4fd09dfdf3db69926f3594ad3b7e05c0f02cd6333d036c369392173dea74a6c91ec4cbebecb745f2718655d3020eeebecdc2f2ab891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9e061370c2695cb9f2dfb364db33ba9
SHA12518ca06e706dae2f79747ac5a9fd69ee659993f
SHA256a8fb08fb8f28288ba2e14d571a964289ae09fc78a8e08436757ee1a881b23bf6
SHA512f7dfeee743558e3f30b8b835d6f14d39676dbc3d2a0483659b6951e1c508c64d02d99f589f468a8db4084616dbfcd6d3abd3c77f7a6460a1d13c336831b88884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a374d5498d7cb65ce624772723af5855
SHA15bc8c095e5f3e9324afa6241a56df524d43d3915
SHA256222be4da5954424d75bc36d52af815a3cc8398d390c27093320d11bcda513642
SHA512afc3dc1666b4f91e9fdac28559f41b4c018c6b60cc2bb1879492a9d649241857aa7a947f52216d71b6fc756b45ff59bb8ff34b3aa1a21f73881c71aed5840dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c48c928bc89e6ee31acd96c6618740c7
SHA1aedbfe79eec4e1e4eeef193dd58e3c9fdcebd458
SHA256e612eecc9d03df16355128771b5f31462875b5605315f7a62e02be9cb1ad286c
SHA5121a1159e7927d4df5af4642a893b8d8dab50f2785f5d5b99c9b58cdf611ed4b05b13b6bb6fb8ee6bdf266d2f1cf9d7ccfba85cf827c81fd22406fe1a4b5fea4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520f72673e485bf6054cd2d203cad0ce0
SHA1d0f419d6d346ed47bd2147e3d01a82f45f5b79e6
SHA25677cbf53c0528cd59466c7d7b1f27091a59f94660446316e4918760bbd4b6d477
SHA5123a16d4242533a34b34115dee9eeca61eb7159440371e134588ab4f6870cba82e4683ba665155f74c7ac1185577d36bcebd663b94f1b420ec2c1141d54aaf3ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c552b34e3f8a5593b50d199bd354d335
SHA1f18bd7168042ad7b660422709b8ad85132d2c699
SHA2568d93f52696860b76e34ce335132040694a79441c49df6ca44d8b55d764613508
SHA512ce131c5126e12a09e7df96aa8410e396c590aa4e4b45913763771f6dea651441c8f9c730935d4ef99a3700f727bfabff9fd1655f90fde52651ae3c237286d297
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b