Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
6725d00cb78421bae48b502b6fc0f473_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6725d00cb78421bae48b502b6fc0f473_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6725d00cb78421bae48b502b6fc0f473_JaffaCakes118.html
-
Size
104KB
-
MD5
6725d00cb78421bae48b502b6fc0f473
-
SHA1
cdb7a9dc978b4465e6c6fe3fc85bbfac5e8070aa
-
SHA256
185a0ece390a22b22a89e3ae8de2d4e9e961e6356df344a4699bde9c39f0655b
-
SHA512
79467a882b45ca5627ba89ebea5ef4b1a40e1a5ec57239d006a2f9b62eb04557285e31b79d6dd0d5e4a6dc9288f8d6d7305b88397b0c745b0aca34b5d91f0c70
-
SSDEEP
1536:SASW7zQUIBQlUsk1urmRACKzZ2wQzRLkFZWJRigGEFhH2csw:SAS8FMu6OClTzRCIigGQH2cF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44601871-48DF-11EF-BBF7-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f20d5b0ef849d38bfb027517cc9cd7b709b47f284fcf90ea27260d1cb4be8a83000000000e800000000200002000000082d7a9fa76c48baaee5b82f746bb6e7994313fe54f9ab4b9f79bb0423deff2b320000000fa76a8fccdee74c184b29e3927a9c6c0609e1484263e3c761fc975ef0eabf061400000007911b739909ccb7f15bf44a34fc4dc66369e8b7ef0a77b1668832ccb614a50553c9235d142afda84f445b6a3379fae10c9170ecf500c74cd4c9a89d4116aad90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427892791" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c28033ecdcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1972 2068 iexplore.exe 31 PID 2068 wrote to memory of 1972 2068 iexplore.exe 31 PID 2068 wrote to memory of 1972 2068 iexplore.exe 31 PID 2068 wrote to memory of 1972 2068 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6725d00cb78421bae48b502b6fc0f473_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD56e8a263dcd55b297485eeeb185ce0a82
SHA1cbb3ecfcb9c18a3099751ea125a0ec0c29f407bf
SHA256a2f023b1fea423b75e07579b5c8ad9324cad068710fed68bcdf436c07e44e227
SHA512c6e09ebb3040d59784da264d344897b1aabec87352ed61989cc1570d8d4a757e20ff068e6fde9be1fc519f4d0c407f8df20fb5e5de2e446b897a6b0bc1644b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1efd5c21f7e8e255b9582f3f42f4f1f
SHA182d88ccfcb53b0d97396692015ed818e2bb94e73
SHA256a1cf60b0c1d91fed31c1e9b3ca9399a642e25a828166333355891e16974a6903
SHA5126e525d2abd437bb3afc3550835b2bb9036f87f63f702f43c149c10dd723866b314b1f153b3f312c1f68eae24b5541f8ac1d50ac06feebdbb4fb8b6cb1a108715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eafd7536a27cb95f67d81e6c66a1dece
SHA15ca92804765de5ee980bc455cc469a0821b8b5d8
SHA256ecb685572d45c9825f7dffdc9bd5c12d6af5e2319c2af0d81c71400d3da54b00
SHA512489a71053a24ac20a447c13dd58457341f1943ac1d2dd75dbca2a962ab11bb5ac4bc324ab2e85a4210e355453ad668fdfa3350bd122f6ca048785f4e7d46f6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599959c032b50f06d59281a83ef6d13a4
SHA14cc46c5992014b492c8f18bd6f5500152fd5b568
SHA2567c28a20b04a3538e9d89f1b979d29c47770fd223359c796da305a1d8bad283ef
SHA51205dbb5c59959aaca63cf17d299006d305e99bd3d5913769337b9f2d7083eea1d605077bb096845fa616035a35d399d6296fa084e192ba5b279efaac9f28da8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5704bf0aef3781d6f96b985b9bb223da4
SHA1d98c53cdfb6eac3db1d3f6fff1c91ffcebec4603
SHA2566d2eb803ae7ceb300eff0b9e15251badddd9a81f79ad56fdb7cf43b0c7f0a3a8
SHA51283d239b363884a0e63a191fc76216d365e094020b13523df2a86b815acc0b79e37674e230ea2ba7760e06de22e930be1294d541ae27a577299d564c55a01f38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff1dd26453ca69eb391668dccdbf9528
SHA1739d371998967cd2be6beeef37287b9b41454594
SHA2568b780253bf9ee4e07012a0eaad12e56c442e1d10a7164aa8b2908d38bcc71f22
SHA51230991d2aba6f7e535d3bcfd6351a6ae719bafa08791f59974ceb429d6e1ba01672871cd9b834a8a131f20045cf302a7adf39382a127ee7d06e69619271bc58b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52239e4d4bcc97ec4de4b7d17c5b4ba9f
SHA102d6c75f9cfbc419a34136999de451ba225bef1e
SHA2569f9d609324ee7a5f666619c911cfd50d1ad15a65bdad1d4162ad58a3c2b54d39
SHA512f1e8a22f4e81c970ab5778b15b7a0885c7b5448ace3fe74646f16bbc789c83811c13c6749233275a337d6c73c9664b0c0ddc94e2a31a24e6267fcecf1883177a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1d64952a011c58c2e4b8e2932f22c82
SHA1cff5ea113df14b1a9fe19909f8fd689478ba919b
SHA25675f785c891ddfd941cc20dd55fc609d14196fa03daacbbb25d24477fd9a38cfe
SHA51220116c19a432575ee13de8d1b97e6a9bdaaa6c45bbcdadd1b32df83a12eba271fcfe641df7b5fd64bbf8fdf5bef9b7c10027a42e866b6e630ee6ffefdaf2a330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53962a1f94f735b844117e0417a71bf48
SHA143074fc94fcadbac19b3661ade49fd430da08902
SHA256a6f022a07d73bf21fb359bb702361fb20d932630c0e4d7947e588b4d66c65071
SHA5125b1b24271404eeaf5cda3080a2ddd9ce712749232f8f48aad40a0d6a947367ec2f7aedc1a9a7831c9654b50923b86d9524995222aba1df60732d061bcd569a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9ba46db2f492482643870ef92675a05
SHA1edeaf4423a02fa1032665e1e1732f3f1875b9c8b
SHA2564e97eb61686cf27b9959a3363da29a8435a45fa6cee2b55284e73e1509e936e9
SHA512ef1f16600116bd4a4a13b9f4436ac756e04dd2ecbbac5aa7dfb2838b755d0bcade24a2e55a76543d9fc0f7a22f7bb3bcb59678043cfc53b05f3b3c6af0adc460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506ceffb71af175d1dfd8300b0d48e654
SHA1d94ffea1dd996c43f213c8a87eeba4cc69163bd4
SHA256f277752ddeaeb45ed1086f3d4b84fde3fbc46bd59b9b6d1a1185be76db07cb24
SHA5123e421c8b7db39b3be520b7b2e508a6e9b6ed6811e1d6e1be7dc6cdb65b66def94399845ef1f65287ae2db7a5a9f2189f32b508ed99e6798be51afce698689834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a2f48ea6695b47ed46b7b32431ae4f72
SHA16fcb4e859057ab54531ed0d72bc67d825dd67410
SHA256f5a57cb90b3a5293323ff8020b207c4db3e917d7576f8fd6b0e8eafefb07518f
SHA512c15865b71a930dae540757abd215955cd072e697a4ac38013ca77fcc402913004a0f25e6cefba2d87bfb755747b324b4f048b290c10c0b848490742251b76f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5543f3ea23e38b47f127f3bad9cfbcae7
SHA1487ed2f65705831b39aa86fad4e7e04231c8eb78
SHA256d60b34e6f6880ea6c79b19c1558d2bd1d1c6a370ace798738a3f9b07a7737db2
SHA5126654faa9ef70d76b1dd04d8ff9cf3ed3be201141b478b1b9f70008a743eba47d01809e3ea2092cb1c34325a0fe881868a6f1d21234baf1e68712147084a974a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa54a9126ed29d87dc82a44be23d4d20
SHA19e214bf0429f7b921815f011419a14f1dbd05383
SHA25692dcb7b27c35c5325b4845183b94b3a8b0b5e97b42d343ecc079d2c20125f774
SHA51207e8d8aab135fb52bfebde2bd46f15bbb76040ca36ecae6613a5cd0d2ea1d21525346db1e251a08fc7f7ffa0f6e3b3674b69eafbeb0ae2ed01f35e04416c1c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56112ade74fb37955f6411535987caaae
SHA1dad50ada4500851724c0026aa5774aa0cee712e2
SHA2564b8e1ef35c42f20c298e4d6cdd7e2ad39f860e270d0f0910301a95e52d383aa0
SHA5127f81579758412cf239ef207f1347a5198cfd235c62622c873803c1c9154b93d32fcf518cf0e4180db8124e6094f12389840cecc2f61c9d6c172d3ffc320e0ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513fa944ffd4e4e12c9ddf77d56436461
SHA152c746c7608e8f0e5c8636ec471f42a1b190d3dc
SHA25627d9a667d160c22517459fbd9a9b705f70b23e414e4c829cd2e5abf71bc5b94a
SHA512a263399368104f89ee59e2a1609806130399f5b43e5a85745e41fa440d5e96b39d448e09b58341653e95d466aa07657db56854b9394028ff6fb954415e60253e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d81bc23cdbc04534c8b9287352e5fbc0
SHA157affffc6e410bd4c5806300352dcf6329947052
SHA2568f7c1c1b2ee75a952fb822477048e02f02e2efe739a085859edb9d1e5dfc1111
SHA5129b233e92a0ff3c7134d0c5333f2780f6920bc4b34485841245b852aa4ec7c5422ed3945a128ca2df91a336b3d8000fa75741fb8ec89a0dea67505e6c82e591d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5c304eedea2dcf596f8ab791c762b5d
SHA1fe405269c9dcd9d593ca58c8ac1dabb4a04b22d1
SHA256bb3447ec57e5b0d255b8d8a0f16160d12daaae6e668afafa7b7b8f90c28d67d9
SHA512d4f4067aef4fa30a3f466b08bccb8a10a3b456f029a7dc871439e6dac66517502abd067851efee48c4fc49f2b34e21c96ad99938449c64e82b274c807fd8e793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55533cfb55c6517365553f39a79393be8
SHA11551a05b7d719393a5be21c5e8d8a8f09fd26331
SHA256ea326b925cd234ae3662dea19ebf52df3238547e53459410f00d13c14cb6eb65
SHA512a054634e5be98ccea0b684b2b17e9beb51914aa1e73481427a494c951cd0c298f82f9ab75ba19d243104f13772dad647b0f31841df9737a1cf0e6a4d3cea293b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b559e05b5ec62e9d53d3747e77be9d1
SHA17ef26202bcf11766bc207a9636bec8fdb9e62aed
SHA256695764572f70cfe158caf3b80f311347c36317cab8baf8bf4bea19bc3b49b0a9
SHA512f16883b67e540b523e4f7707414b18ff6d31c6dbbe25f3df7864f0434993b1cdad35cb7b054c4f891dc7320acca5961f5a5d433442eb266ebac0bf9d73cd3d66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b