Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
16c14c09f292005ebbab3eb2110e7d25_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16c14c09f292005ebbab3eb2110e7d25_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
16c14c09f292005ebbab3eb2110e7d25_JaffaCakes118.html
-
Size
53KB
-
MD5
16c14c09f292005ebbab3eb2110e7d25
-
SHA1
1f31069eb532df69939dda0a5928dfe94cbb2578
-
SHA256
d000aea39dacbab22d706a84eb6ad39ef9849f3cec93618ce056b6aa0849ddcd
-
SHA512
ccfa1f39d2316888388a7599a82987546168f7e8415a3ececebc20b115d37df9093114f52787a8f10f21bd54e2f0963511146a429ed11f298aab0f375f4c4a8b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUbrunlYy63Nj+q5Vy0R0w2AzTICbb2on/t9M/dNwIUTDmDo:CkgUiIakTqGivi+PyUbrunlYy63Nj+qt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b27360b2c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000819106c6caa4a24990099b598410e40600000000020000000000106600000001000020000000f43675cb29b4523e8130534a60288c4c404f197a77ae5c9ffba58fa901aab21e000000000e8000000002000020000000af9006537ca80a0169019dfa809945910920fec3d3631610edbb4cb18d80c2e220000000c1e42814a830f0cde7a372321b17e0acf0ea9192e173fc18b2cda7c67242fb2440000000574d61f6203603621c54abcd7c78af97741307bc4a26cfc883b5f89f0e77e80504d2a63132bf5389152fe2d91882d5e98bbe1dbb4b66bfa2037b933c9cbcb935 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425668975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AB2F981-34A5-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1724 2156 iexplore.exe 28 PID 2156 wrote to memory of 1724 2156 iexplore.exe 28 PID 2156 wrote to memory of 1724 2156 iexplore.exe 28 PID 2156 wrote to memory of 1724 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16c14c09f292005ebbab3eb2110e7d25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ade8c1278b2ab700ebd29c28d511686
SHA1fde17c7853bec4842e5fcceb2ebe373951b99753
SHA256abf4354a23adc2f58bf9ef0c2a1f5d4bc9a22478db37fd2f89c0b2fe5364655e
SHA5129c274e37a15c5bb9af0bda39f51bef55e1a4d771853823087c86a2ca93c06a792edea5e5804bea7abde58f78f40db85e2079c3f810907281a7a4a5db2f4093db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b245aa508010556599dba1ec97ca2e
SHA1772c9b54a70b6a0f1629c9c676024d99c8226804
SHA25624202bc9f77fe1caa4a27701f7d01c08ddee951c07a118dbe5a9b7bd1575cc0b
SHA5124dcd01f244a764a423cd99f3a980f34971005aaa73dba7440843fba651dd473b2b5dafc0c0e3a7d850740a3e6f969bb1cd47f7053e5bda87f49b4cf8cda9439c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98b3558353bf00bbfb6573d87fa70f0
SHA16835b07fee21b78cfd91d3a675c7d980f361ac86
SHA2564fb08feaa2288ea7d7e799c199c9ac3deab6e1b9b4e75084e0cdda4a27a599bd
SHA5123f199f4aac44e2653ffc2124cc6b15108d616f98151b49b44694040a4bda87391c10d369935eec0226e91e7f6bf993d2201c0427126b7978f6b8b9e038f291b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b975eda81fee6dd4b6599a3a5da4ed3b
SHA162bf9fa010c1b1927d78198e04691a660ae33241
SHA2560f5627d41352a8b0150797fa5c60045b16e8ee6d4e2d9e98d252e63ae36067a4
SHA512e09a622ee3ae001f37710f0cac10c17c85d04bbf410cb51efb32ded60750e51d2ec08984a6a87ff5cab1fe4ccb733d4b4aab75cb441777697249b295ca2d962c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544085e2d9ddafd8e41d21665573bdc67
SHA1c4d38112ad2133b5abed62b7cedd783668b0404f
SHA2560587ec04ced25f64e334865f3e48319b86e5e07dcb0460d2aa5b5d6aaa716037
SHA5124473542d8ede653727e2572c0e55cde2dcd6195b654c551e98fab2048b4e1ad7790f0c676c34b3e58c974409c63d6bd355548f61da48163d2270d4bec77e3de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a92425611543788683a999e6505bff
SHA1bfc89b88da8595dd124f70c76c1f0c17c31f640a
SHA256b562b93e7fe57a37a7aa463aee5e8123fc23779aaac967878c93ed5be0088604
SHA512ab773a1e66319e3fc3fafde49e5f77d8cd298ee10188b1e5237b77b929e78251afbb9d342c558c609cf2ad3b21642f206d99ddc9ac663ab4e930b3fd2c7260e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26b6777c15f1ec407f933c7ff0f44c4
SHA1ca96b17d2d46cf4a349e636703ca6885735835f8
SHA2567f4a75f58398baa08f58e1e22f9c8d564cde2fc0ce3decf72211c54306ad428d
SHA5120c12c966224dcd07bb17fd52ba96f178a21287d7cc97d9fe08da48945944ebd9cbfc3d5fb385405b32ba9fa630ae434d7316c5cbc48150119aa28590fa848535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58342f70092abf93f1e2e5be0c6c723af
SHA197b459e63de74c264355fcd653e685786b47c6d6
SHA2568fa7d742c2a16c3cf53d10a5b671c4197ce87c30bae1f706585571d1fa954cad
SHA512ebe410febfe82b508a673f8fb68eec8a35c6d784977e70ee70e9c7a77e48243902872b4b2490ed64ed0aa2b4cc0261285307eaa5efb2028756bff5d32a8fa8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7aa0e0e9a70a8c6e54207103db76675
SHA1180ba4a773bf00091fefe0fcd7f0b172c3076dac
SHA256f9382b37b0fe0c28e91588eaedc125fb1f72d320bddbe65e2007f0903d17e6ef
SHA512614e474415138c0eaf6d9f3766cc38504d9f69a8a35e1a8158adcdd64bc19acb7b1449edd76507747e54552db8ead20055c97bbda58a556a2894ac6cd7f1b7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d4954e58825c65edc1dd72b17fce35
SHA15f158b64266d0381eee787f0a2e4fa1aef81ee24
SHA256f7da0ec50ea00ac62f4939569f7b677cdb0234b9624765daccb30a72497f3549
SHA512552137d3b84de24c0fd4c9aee177390dba19e809cebd3c2357b98824b9137703548fb3c925c4109d38180af1c22fab292ab2f2e82dd3d6488c6873d1033016ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51115064ee4ebd62d13d5047578873ccd
SHA19dac5beef31962d6f7b2c2e3bcd8e0fa2d5fdd2a
SHA2560a766d294eb1f1fd09067ee05dc40ad3d1641ca7c1369a9d824bbc2c7e345c9f
SHA512a6d19725c481484b46d4a7c8dba66e4e52024c194ad524799e9b3baebac49d308cedddcbab6a605fee36198ad72d2ed9b8275fe6615ec6192bf2cdbd7871a88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523341e605e737a8e84dea9fa722017a5
SHA162c6c80a835c2066cf44bdc5f758f07658928dea
SHA256daa4d8417926aedc3189c671c5e65202fd583e96df3bc284a7960af908ee8e2d
SHA5121fde1e515debf48b46b04310c1bfa67253fb38232128f3b1089206db1924e5b307068aa4979bfd7dea026e386d90cd3573a927cf77fa595438676a16a6f8f6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56076951351d76101a3f427160094e56c
SHA19733b7aeaed78a7109cdda90dbb6e005372b8340
SHA2560bcc9e254eae3bc0ee079d3205ce5d9f2c1c2d6305deadfd6b7bef557bd5e54c
SHA512969fe84856a2217697f5e02820e390fd82467a803894990bc3515fae4941b1b5a36db07576586b518c576609b64816baaac774432f6df74fc0dad95b06a17d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8abb5c02d3fe83e72cab4ac6c97359
SHA1575f4d4f2423a9e918af4152fe41258a416f9929
SHA256b8a9393ca249c0bac22d1731614bcf77e94b93b5d430d4aec3b0999adee88d34
SHA512b80abc900a8bdfab80a8906c32d8b4eb083dbdba1d9c7caabcd1cbfb98a1aac62d1e9f161854aa5c150e7ace89e6a093e3691bd5302b8b2807b8d27556c40290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527514a1dc9609605680513d45f05bb91
SHA1dd0dbc6f4ec2594a74b87aced68be000938bd9e9
SHA256aa7daaa403b95eff61207a7e5b03e7a8aae9c38b33d7f4ccc0a24c16d2ce6772
SHA5127ab0f278d32f09a8426add170b767cb9393eb4837c7dfddee921444e0edbc9e29d4f8e38147f013205a9c1dddd4ca71710e1d1124be13c55364e91d773add630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92d01d15830deb54e6d70c625a35ff1
SHA1ea4fe3e5e6be94b39ce8ed0642e216067558ac02
SHA2562b25ae4dbc243680a8100a0121ce7b7e82a72bbff491135df9a021af5d270611
SHA51272851121d850df2462149167ab70ac046d6e323dfbef8a275336c57daa9b13a235e03b1b4b8f2b33410c6cb648f08027969a08e76bccf381cca9e843db4fa841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123616e37e229184259e70448198a619
SHA175c7f06a785ccbf89d1030b20c23bf62b216eac9
SHA256f22ef6abe6b8d42aa40d46dce29c172523484b176850d2664a1dea8f7fa3b221
SHA512eafe1f1f7278737ab1b5c04a0ee90c8ed869adb05ad8e4d8975172c7df4fb28ee1debf23b17c59ea1db5a90b1de38830d2fc12488fe51ad4d32dfd0e002788d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730ff0d5d20ae69d846e6a25e4e50404
SHA12705f9856194a95a24c637fbe79c0609fae00d89
SHA2569e7833fc9b9807de0a131a6f0728e9767a4da10aa93deaa818f032f2e2f44057
SHA512dfbe44dc6c84b667b5ecc617db2158a3cf795b0ff8e98c878434a82c07d0119347991ab917d500adf19e36c4938740d83226f28630352b96add87147208bf3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599253139d2404cd994b3838a7b3a312e
SHA100f6e7e8fff7a461df321c1bea7f15c80e53c59b
SHA256ecb6e60b9f47d442eb7ba8a791e7be9d3b60b3065dff5d17265b94e951718184
SHA512e03550f581fd0b191c78d7f41b625c4d5cc08e3cd1b4aa5d2aaa84b944757058f732bd556dc920dc8811211bdb9914559354639e57499aebcc459ff56eabb94c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b