Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
b178ec3cbd8a810f4580998338435f37_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b178ec3cbd8a810f4580998338435f37_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b178ec3cbd8a810f4580998338435f37_JaffaCakes118.html
-
Size
1KB
-
MD5
b178ec3cbd8a810f4580998338435f37
-
SHA1
d9a5447ca35193ae3a43229aaabec3994e4f636a
-
SHA256
a1c84fa5744ea3bb67acb4e5c23de06da579307ca3e77bb09c13b4deb72ddbc1
-
SHA512
e5d8028e61b67799fc7c9efb80861f7f86b445ccc49846132109007ad890d07ce086fe4d30e1aff2457bb2cb5996b7decbe44c3b75e0e69487420cac85a37321
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0071919e61f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C83BB331-5F54-11EF-86A3-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430362188" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c1346ef5ff13369faede5b6e85069396eb4d9cd60d1229e4b336d1cb2c7b053f000000000e8000000002000020000000901b0d325515d9f0f34b665d0a1f88fe7393fb8cad3d4b73fed6f036d060af7120000000dbffe8b96d43453bf4021e02358f5187f92c4566ca238ebbd9ad0cdf56b19f6d4000000021b9d51873181ca174e6f5eddb484f03c2bd219f6aa422497f459f17c15fe4cdb701c9cec11286464c00522f3cca9c11f301bc1307289a30fe005d28fdc1e79b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008d991c913c86769d9b7df28f9318c22af81099a12f258e9f86deea4731ef06d9000000000e80000000020000200000000e8135f9ec3b2296ee8554c5adc281fabbb4e8dc63866cdb0fdfe209bd19a3c79000000009b64c18884d6173a4cad26128e0e02e46a9d2b580aed7e5170ff7527ff2df2bbbcc77f4a188840d33db5457d7410c83b31c0ed22094c33d67caf21c7d42a90b852c2c68a171e9d8e30c0905a3fd4e7dab2d1022a7f19bb5fa53722edf1bc8e33248c167e5a0db24ea76786527c36dfdd3d49045752b1122ef266b1aeaa0ff1c489313eb619d712e1d6b01667c669d60400000002eae577e650bd4d8e771354baabbafd34739f165052f254506b7312bfe731fb9ab1f74e2c08f8788dbc96994b475342a0311e2c82c72f0407f54bcbfda98e334 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b178ec3cbd8a810f4580998338435f37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c0e81dd48e18791b549df95def8f506
SHA17e3379ee31d18c8a81c45521d7fb86ee9aeaa08e
SHA256ce40763dba72c9edcaced73639f84c73f2e34d8ad129544de6117a8f59e2579d
SHA5120e25329605bdf0bc5cf2f4cd60550f4f65fdc93c6fffeea088dfb99be1b8e7d274a39c834e47c151da194b7b2aabe46659d1bfc4222c41ff48ffb267b9edbce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527fbae56900935c2dc2666d321d086e1
SHA1ccd8777fbb328a38af0f76e751deb093c0753451
SHA256bf43019965cec4e7ec2a5a94261c558dc22de026f6027524c3a7b5a5ad11449e
SHA5129b22c28eb88d9bc63e153889b8d73f748fae02644a3d047b211e62c19c5f8a3b3ae730f5e51b64fc2ea03bd91d274b2a0913ddd2fc2275af2f3f768e13471e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e454c44388af59a35e4b8b39be2dbf93
SHA10143a6c399eed9bb341ef2e80cf7faa663212b19
SHA25678098639bff3b0265b831c5be74d883398942f1fd692f297e886212b9ff86669
SHA512b666875f19ca9bc1e512cf5450c65d297be5e82175cdce6772c9acba9cda696ce4d965e6eff0e31040f9b6e7575340b9c370e08af8c2b1e66edb1a3934db4c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c40a91915229a8a87e6271155b92cfe6
SHA17514f610685ad253e84d3de0225538f44a57748c
SHA2561bed6ee3cc5a469fb3d523bf45c9482c96edf2e7d32e94b6df1bf14cc0314c5c
SHA512a7ecf7df3e246ceb8258573f834fe3776f3313a527851c169c6d0b3d8499981c1b41986f22922998d41e2d21a53c0c5bf397440041dbc0f6e0e1bc464226b132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526684b73c8d123732f30b9b060def19d
SHA112cee971f9bf157bb9419f649e710efdd768ea1e
SHA256b1ba6b76083b1e13fbb900cd5880917fc114636409508c9720694b326f23e014
SHA5122235a9bdba87c41337c9debd67ed47a2791ead3e176b3b0bac5f89a36a6bd34d722f9544e807b0a5380fd6f673d2f8e078834ec71f102122c462f02382b5e56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584d0bd7158da94709d139db0612f162c
SHA1ee29410d79e2317b704c8917d71b2249f11c564c
SHA2565f9f7c87cd312d9d875e5cf7b0ed089c5626df17037ddd9475060ae4f0647697
SHA512cc025a720e8d4d0fa57d76fd03dbce22fdf50f872c7756614bb7d7faf0ebf821206b303747b1901f55bfbef899bc4a7a8b090418ac71d4b2c838d84b758f56d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a4d723d300a0097314a7d3276c4466e
SHA162c90dd5fa5d50d5e06927884a8daa76d63a12d8
SHA2568b6adbc694b07452e6de761ff51d2007e72f9871a834c1f78afc7a153bbe5359
SHA512e4f2e54abb2c429bf2c6ab5c26999a25844f6eb388e1fa49b944bb41ae20c936813e1b5e151c0e2188eeeced0669223f1d5beff4319f10b6ed18706e57fa8064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5841423b8f5c5939df5acff9eab8c9a4e
SHA1c050a80352e46e788dfb392bcacb7bcf2b6868f9
SHA256586b86c15d8a0014f1d456c050cfd4259cb0d8f812e3f85a6b25691b1754647c
SHA512fa14528fbd4dbdbe4de63c8d68114c7f29e9fdd43b9fe92962bec1c48e95e46ae3325e709dbb663d447ca80a40cfb3f683d6c1af3567324d2ed046e969b0890c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523d4ab52b6e4c5a41ff1647e1b8ccb5c
SHA1044c9e645bba30709fb53113c6cb29e6c8cb3971
SHA25626efef1a7c641635eedf2abf211a3cfdd2eace256b815976083f53a52a3f9a43
SHA512df6bc6a0a538149101b669704f251e9fdec71827d8a5f30f5536e06e912db229260c39d0b2b70eeede478bc813e73be15a166b83248d1a7e1e02f1ee70200f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3b4bcfb68d7356f9d8e4af4178d7690
SHA11e90328049d5fa1fd61812dd7093be8e2d77b506
SHA2563db9c930bd2444dc0e55bb54b17665e4d665c7a944e0c8be144a5c9cd1b985b8
SHA5127058b48a3ac58e07de0c1489c0d3c5c5ec063219e5a073a801058484190c12e6d7dcf5e0ac2049f2e06a02f3247288b0b9318be2fe3f8fced71e2fbdf76ec9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3948cfc34f004820a1e2704edc1ab93
SHA10acd1c75a322f7aad3c88c817f27767eb224e2a8
SHA256cf8c137ce4607f537f3bded09d977e47620d888af5a800fee83299f9f5a01ae2
SHA51271e7f11f5712328dd665ffa25e93bfb50eef66aae76ea7672ee1b287893f96227dd4a57105c1f675b785a694185940e50bcc4183c2bc6923d2a40d10d8ea95e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f9135f1a6bde10b1a3a8579c3d98098
SHA17072a3c0961013c4169a0045f046153c334bfa12
SHA2562e67dc7bbcec80ba9e6797a9eac3f51d89661ffd1f9f53a20f2c3cdfd1e99e5e
SHA512cb927226235e5a5fcca1cf2c057c26e5a8983e5e240b75b692d5cad266870cc517112121d92f15c5f8a1523c02674264f81a0eb0e9520d7f4e985a3ce8600830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ff7c50ef55b9e28a204475e7289c178
SHA1f775f63c298709131db0528d31f4752494fa2750
SHA25649a05d6806feb2da52426d1a30b3f9d4d740ea1031613f70168e0855257cc195
SHA51201d9dc0c4531cf387b15e2f04e1e92e5069da90cda325cd15776bb1dc1d99a1fcb1a8c3a7001aeaa3510beb89f31602b4483e09982a6da6f61039b987d4e90d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5474e774ac5842238912380fe59b43b5c
SHA1dc57329b9d07f36ec89e1edd96e9b040aa3c73a5
SHA2560dcd587be7c31bd61f54a5514e2e4661f3de05996686811fb9c3b6214b006820
SHA51245c31c0fc8af36df5093c17a4f2e7ecc73048dccd5503e0f7bfd3053a9b7cc08451cc3c4d4290a8f891cf13ea86417bc8ea2fde12ed3dc409ccba47c1076b6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da99a8473351fcfbe5445c3ad8cd1b1c
SHA1cb62c30899aa2be95ac69f9e19e52f946c53041c
SHA256f46fa37f45f7dc23f1853c3bc362e8bbe33f8dd71b6ef500ab78547912948cc7
SHA5122c01905270a75e380513e6fd2a31ef294b7f0671d7eb8eb334351d9c9668b800054547b84456f8c86e034b070d8262e5ecb116461a26dc010357bee893649ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558afa7a897702af75c7007ea64c9ebe7
SHA141045049d0c2155e627aac265a65f005d7960ced
SHA256c1331a7955db12dcbc12235b962b5f0dc78bb4d80dfc7eab3f4db97cfb6f05f8
SHA512ab4f6d5df31afacbfb6caf9384bc54dba8c7012298cf33d5752784cfa1a338c9daa52832db354a2cbfc59694b0358827176e773c01cd011e839f36263193091e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51083f6cfbe3669c51a94ad8c61368cff
SHA1ffc70ef14e7a9b29c53ff06b9354ccaeb2f797ba
SHA256a928ca5700c429d07b90f19dd1190c03915af52e960ef3330473045e17f99ecb
SHA512a203ebe5df0a666a89760e8c22e7d6a4a5a888ffa87c524b12c8e3f1b9444085599023ad7eb95cf563d40de2e64ad97f632a6f6f32427bbcdcef31938683f142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5119f1514cc9af25bdc399ab748e2511e
SHA16b5b95d41ea754adec03fe9e7b5addab5028defe
SHA256e53b276cf0e1c18dc4c626f1de6c25b2578d6a6b98a80e1a82727fdc01aa25dc
SHA512bb4b8890217cc49a9c238bce46d522ef92b283a63f0d7dca4b6645d4125bb09affb24fc264cfbf96b51ac4739b696f5fd0925effa58ac4ca815dc9745bc92547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e88bfd0cdb9e2196e0386ebd6192bd5
SHA11882e9e0c209ebdff03e4decd0d00acd1031bc8e
SHA25694e603af29d63b8ba4be1624303d4f1adb6c0e1ed6a5c3a8ea1ed733ef3295a8
SHA5123f97b7ece3ad01ae27d594e86ffb25f03ad3c6a01566ec9d3a0a98edcdfb8c2fe163ed71c37216dbb99f69f3091e1c14f6b1ece97dfd11150ca40feaf9169ca6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b