Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
fab7a47675b842c905e3ee1783a64357_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fab7a47675b842c905e3ee1783a64357_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fab7a47675b842c905e3ee1783a64357_JaffaCakes118.html
-
Size
40KB
-
MD5
fab7a47675b842c905e3ee1783a64357
-
SHA1
c94e41afd0b7bcb7e2156df076ff6ea4111d902c
-
SHA256
234b39b6d1273907b11413781ab04ef1b60fe9f27bdb6b2a8c353e328b1b40fc
-
SHA512
bce65df160a60d7fae698c133d8e9be6b7a33edb4ce698ecc7d700fdbbff5afda29454ac53cbca22acddd24a3c6d426bdb882741988f2fb152da3a3135f60726
-
SSDEEP
768:0ipA//9sYjF7JB03QpEzhUt/ibwm22PQMt2QikovzNMSgl6Thd5QA5yG7bKhiUWD:0oA//mo7JK3QpEzhUt/ibwm22Pt5gbNp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33101C21-7CEA-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433614947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1908 2844 iexplore.exe 28 PID 2844 wrote to memory of 1908 2844 iexplore.exe 28 PID 2844 wrote to memory of 1908 2844 iexplore.exe 28 PID 2844 wrote to memory of 1908 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fab7a47675b842c905e3ee1783a64357_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc5a00912dfa52e6dcccc557db7716e
SHA1621ace1c9002644e13c7f4eb7c405c05665df184
SHA256546dc8f3365b87fb3f22f191f6abe7e76bd7b54676229d7aa318b890549a6c6d
SHA5124ef8703d9c7520d826753d614d41920b93fedbaa255a87f64478553c098b86d7fc5a93d4e62df3c4f3d73d14d1cf16d76763f825da646638146d20de84333657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527adfe9219306b32aa6d705247c6fabe
SHA15f5d1d1a0ae5d9551edbc775520eb0718336f2ee
SHA256c668010ccac5c6bc438b4b3f43871745aa538580ec94789cbf098db0dcb18bdc
SHA512c410fd92f9dc79d11abd0c9f451f9dab23955c0f3fb0a6e8798cb7a923b713c7e4ad29bc431e339ab6dad36e1830aaa1599ff0e565cfd10ff42f211a1c00bc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec11b665ef46bdeb4d8fafa55380368a
SHA18489eabe87ea48c336e048b549806f8b5466cbd7
SHA25674e32001b564d07223cfc1b27fe0df52e6254a439861b57860b5e279ecfbdfde
SHA512cf0044e9137ebcf863c297bd46c0e1b8cd836a22d29b19a4154e6cb237c1d1023b37ea300d2060b621c328e650eb089eb910c7dba4fc18f26fc203f3a0941d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055e38a75329cdbe4e9de7646053c7ab
SHA154636f8ccbed74773b306fd8c146f4f193c530dc
SHA2561dec2a663a656942d32be578e31462f02988db58fb3e4c7c24bcfc0d39bcaa78
SHA5125c0eb4f616c4c3bc111200e58e959299aa8c33c1890585f40feb71fda9c43a1fec5b4ee852fe8dcce8288aac0ef5e17eab6c4dc281cb6c57e4fed968d544659d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820f6aeaeed4e68035daf4ece6022239
SHA1bb3c0f9ca74e8c9929cd7128750f22c231dd1c44
SHA25642558e624c2cd6fc817369287aa8592ad0afb549c92b43b0de33db68370da7b6
SHA512078b17daf6231c874561d2a7c9f182c01b8e1c49ffb0d2072171630f411e2aa26450d06ca76429fd02be6e625e675581d16c139c1c21b2946fb4ab87c28f2d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59832b03e592edf10b98104b882d831
SHA14f3f01868d3ac0019a6d5527b3d466965f330ec0
SHA256e06a47669a3b8abf2396675f3de0fe18a95cb13690dc8cd9fab4a0d13113bef9
SHA512290aa665883494ac5582256420a2dd15221991084a81e84c1c9f404ed908e2a715ae7c42f7612d612ab74365c05c9128ac8c5a8c744f9cff25dc969ca130eb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d0d9f0fc466678779a6c7a7292a7b1
SHA1d8cbf98ae941a1bc9d341f90ab3d875df36c9f0f
SHA256d9ad8d0c612d7c64e976fb6155d9c4e4e3f7999b17a590db3577cc258bb58f81
SHA512b6060d062a1ffd501df1d5fb0cb5cfc2038679604947d3b3dae17e4b0f8be105c4f8ae2a01c2bbcc364b93c7bc4fc172969a1db426cbb202c2a869bbade1e8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f99c2e0f958cb5fe7d2de4cce455fab
SHA1fec0a44f6f0cf6c0fd8f3982c7ee3b37cea0c991
SHA256063751b23bd7b55fb8a30e3f163704ae4614210ee688894f0d7a6de864ecfd47
SHA5127c2300cbdaf10c5e7087bfb84c7a9c73fd000206bb44822a195a1e6fd78b9666b6b210838e141f4d75a3ae1a81565ca787d441b091b43dc1ce305ba8fd600116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da8ba4b784f81bd8587de423d6a66f8
SHA10ab16d918a52bd0e8a684cf53a90b7477a970056
SHA256a1c7ce9148d1d7569d21c3157ff0e65645299d482eda838c48c32340813c06d5
SHA51237b6fd4d291cdbf987a3d905aaeb5e2bc0ed0f1629bb79f3a333d624dec98132e70137a72f9467429291edf1214985b0f295a8be043be5b720cf08e9cb414c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b02930c31132a5c286b5ec795ea7690
SHA12ec46e4bcc8636d757e0d6d98961e81ddf3677e3
SHA256695b980ffbe9706f9751d9913468019ef3fbdbaf8710fe033a97f6dca12431e1
SHA512b84ae4edce15c4469ec3290a169eacf930e81871c2a1a00c7c1862e4fbe56e585e246846a34c6c682f726f94bb9bb9c966b7bf6b2aad4be9e79c18c45394eb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042a2bf9bb9f7758eb48cf3b4187ea64
SHA12683cb5f257a72d7216735afcb8dc7d4622da80d
SHA256191606a0d9360515e3b9cb6cafc785a99d372890d8d6437bfc1ab2fae5dc677b
SHA5129213dd2a80974b878cc0d3bf02b5916819be7468302417e1189221afb9dce3901b2d6fdce079e9bd60f0b68a058031c63e8dd872a7c32cb721e7698fbbe21c74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\jp[1].js
Filesize92KB
MD561036a19e45debe3d07de002541a8996
SHA1dead6a7c3e919b46bbcb78fce20cc6170d375505
SHA2561b3bff0da0e029868ba1aab419ca36f907ee4903283cf7c30617d6065cbbe88f
SHA5128cc58a8bad8e91f6a0f02467f3bfaaa997722d7d636c8ba123a4859dfa0ee0f1bb848d3f133649e9341e88c2e44cbac5b24399ea8976eae7beab970b37176739
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\popunder1000[1].js
Filesize98KB
MD5ade60f02737db81296b84400eea8b8c6
SHA10de5a7825f74fe5292d1d18325f9434927bf76e2
SHA256631e1dfc75901f2474dce887a353939ef5d58947d2f7ddf4dcbf5e2b7926fd94
SHA512e4f9b15ce3e4ed27d64099de0aae1d7243301770c77c1b62f70cffac682896c5eb59de02d180a342de6b0f29bc32a0a5cc0155f032a2ac62ea5fb7067018606a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\video-slider[1].js
Filesize44KB
MD53908e75540e9f4c892d7989208ba58f4
SHA10d7c52035e57fc2977ec47ae034a2e0f7bd54d3c
SHA256f5ee80433d8589a8ee23154603be2587cf949b98421e01b7f9b9a778153c03e8
SHA512a4f6fb5be76176bc53fa8c4febd2d7e416cadfa912ee5aa96be1136b4cc889858ef9fe41e6249e792dcc568c0b58fc4ee6a80349e40638b4c02847c68252e620
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\addthis_widget[2].js
Filesize56B
MD5de3701eecb9340ae075e05b04bb05a6b
SHA11262474193bc31e859367df01c4b2b26214a375c
SHA256f475c34186022ba531ebc8bba97fc10df7e4c3ea854f314a18ab0644c851620d
SHA5124cce11abf10df2640900c923b0cac9ae1b80890f52701d5b57ab937c4752e91aea392ed9439ee24357a6f88ac6f0f79b160a9c080f5670220c29c81b5148c69e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\ads[1].js
Filesize435B
MD5f272c4fafcd07f74a095fd6be5f72034
SHA16f74be4b31ee91d8d98b52d96606c99c3414a025
SHA256905f4b4159e676360f04de47a5804e2f9aaf7ac07d74c3418dff899cdbd527d7
SHA512a3822323a315d1673a5a77354911b3ba954a221c7332779cd59db4e1aeb1bb29a55ce0949135fe97bc84920bfdc6c8c505d1413a227ea7d0775ffa898a453058
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\ads[2].js
Filesize435B
MD5cd842b7756caba4cb646aa410c73edff
SHA1f172e6e540b703acc63cb4c22ddf6ec2420ec24c
SHA2568f6fdba1ea6c887918c4c12993fcba17d9e20855bfd9554e7a3f0339110a0220
SHA51251c432f62a19f3e0c1b5bfb1f5527171ee6b2b96b130e1b07b4b525399976ace70afbe0b0702d40bd45efcc4cff03d0d7179f6090772a222960bcf529d82be92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\nativeads[1].js
Filesize45KB
MD56b7c92d7071558bf15c264f6d8715dbf
SHA124cf954ba324a1b28b2ff7c5b80a08acbfca34be
SHA256e8d7f3a9bbc7e58637b6b70a7eb82ba3373b2d1f5c0f407253c826c2b8a652a5
SHA512ddbf9ec45140ef05d18583c36577cde1a1f54415ecb6664a265068afa0e46303721a15e44be042c8e95049d763af983b9830e272f6410804f4b6579ee9b54778
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\ads[2].js
Filesize1KB
MD55bf11a14a06c7782e54ff17d882f94d6
SHA16bb7a5b5ceae064acebd6fdcaed0787a03c458d8
SHA256273c95ab65884bfb12154bf674975fa538719d095fcf78c27504e52cb391c68f
SHA5121bb92b93fc5a5b95a32404c4d811f2e6a944ea48143301da804ca3fbf39722065d44910707c68d71878ba90472ef993de2bcca7705418a60089d70d8a51e4b08
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\css[1].css
Filesize978B
MD5fc700624b06ac36ce84777f7de3c59a4
SHA1a2a674ae11716bfc4fdc98c0a8106bf970b08565
SHA25616adc6ab035bf71b78ecb4f52fc944f6a8383924e3bc1e6ce5f9648f372f1e5b
SHA512e07a1f4ee6d8b65a154324648c619f804bcb4eb81ea1a1ea3f59808bec1e37e546a0d95511a5d8330695e65006a3cf22aa85c27116c7d55688bfd4801a9b4522
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\pn[1].js
Filesize17KB
MD5721705b6feee6cb24fa055826107e111
SHA1660e525a93a5feecd899736db836e33353c2f9de
SHA256b5c0a71e77e127da8090462b75b686d7911e43521efc6b1e1143b34b702ef2dd
SHA51294ac108a929cc835e5152baf82c2da3b3ea00b2aff137d7978e2a7db0bae33d81c1dd6c3a0c1e08b6f7d4df113cc4f3a83896d0c7812bea44d76b46584b10f22
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\ads[2].js
Filesize435B
MD52eed6885ef06e829f6040fcb67b32721
SHA189d08a8871281318d5270cb5d37a0494471048e0
SHA2563cdbe828696adf1b3bc0c3ec49862f6549bf930c64ca1e19520a0357494d2200
SHA5125d1c4253a6d62ab913e33dfe4235070beb12870b017ed4f409348c9a3156385a6841f15e498a4ec0ac6f84575360af07cca22a3bbedc9887cce13df4f247adf5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\ads[3].js
Filesize435B
MD5ceb5e37b2fb16f5ebffcad2714e7cbeb
SHA1c80094a8fb0fe6f6959a6be6c0ab2781738e483e
SHA2563eeb6ed5a32941ef31d229c71c4618a5f7bc280c5c1b0be00a761c6cbd00a340
SHA5121656d72317fd4e2339bac697ea4d7791524e1055c48a78bcf679aa5f65d71acd4f4fb63faf262244bad4e925057b19d5c6144dd96145c44fabe23311785a171f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\count[1].js
Filesize1KB
MD564932a1e2564351aa7642475acdf3fbf
SHA1c3dd2b7d1d4604e3559c2732fd90d71059dd77d8
SHA2563487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
SHA512ffe08187ef578d7afd64adb9f50d189a894819bbedbc116a6a5d3c18bdfba1a44ff5ce5a86fc365500e2ec03d4757edf03cdafb92fbe9ab7e5a3191829bc74a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b