Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
82c6af2d0ebf32ff7506472d169f7502_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
82c6af2d0ebf32ff7506472d169f7502_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82c6af2d0ebf32ff7506472d169f7502_JaffaCakes118.html
-
Size
10KB
-
MD5
82c6af2d0ebf32ff7506472d169f7502
-
SHA1
7f6997e43c53f2e3ed1b598318119f562ffa2364
-
SHA256
0124681a412387b4733a0e4afcb8bf1f719e69c052ade9849bac5a3ba157c3aa
-
SHA512
cdf6468a9e869b64ea15aa97f52a9f968ab30c3d2212b34277a1927fce00f736b8ed2d6c2b1581aea8f5125115ee3e056d03c91039b035ee795de91d0c3aafc2
-
SSDEEP
192:SdJ6JqJPJtAJ17jA6eqeJ93gBMBlnRki7hQRjk1njS3R9Bb9j77fvt5GEUCEr2hp:SdJ6JqJPJtAJ9jAbqeJNgBMBlnRki7hM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D9A8911-507A-11EF-9363-5E10E05FA61A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000036ac3e52cc21e7219af1a9fb4cb9f94af9439123d350885da08a522bee0ff868000000000e8000000002000020000000cb6c17272bf18e73deb07dae425ea44d7a463cee735c0a16a9d82088d480931e20000000c83c838b45006e2c3cb9fda7a1ea35aee1a6dfbdb2f384bf6d1b63c21736369d40000000bc99404b9cc3b20de7c3558eb0b42c5a5fc4c37a7ddd263ed86b59cbadfa417189edc7d26db649921d3e3ffdb9a2ac95eed74f43a2f0f4d7fd357f4965e5b309 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20aee46387e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428729144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 408 iexplore.exe 408 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 408 wrote to memory of 2756 408 iexplore.exe 29 PID 408 wrote to memory of 2756 408 iexplore.exe 29 PID 408 wrote to memory of 2756 408 iexplore.exe 29 PID 408 wrote to memory of 2756 408 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82c6af2d0ebf32ff7506472d169f7502_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c1a0478bea7b0958a615332e8d1e07
SHA157591dd310453ed3e0b05a5e8a9f68e895db6bcf
SHA256f851919087b8ac2bd56692a2d904686e6aaee478c71138636aaef969fe4f96d6
SHA5127101dcc872a837c9b244461ce864703ff2ff61a06ece50c8f157ff8b97cb36993ba29b371a41cd73f93a6a6204f562433b831b595147d7af74a0ac381142ec36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c9d61166bc2d7e14f2ab8621bf98a6
SHA1c5823282a193d6acb2d86a436478bb234abca950
SHA256cf3a7de885e8a3b1e1f1da0bc2e053f5683b62171b9aace89e5322d8ba2a4749
SHA512c850731537e64b6710b1cd03f182f6df7d6f299799d05594a74705de66636bf3df0bf366187437e983841b75512bfbfbd10c82dd18e4b4d9dd3aedf033076875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975dadc2b7c1b370acbe3e50568cd0eb
SHA1ebbd48380733b193a56f7f0471e39a8dc57b9a45
SHA25696b0688080c55dfd2cf9e01175752aaab1fafa670fae3692b88a110b18ba8929
SHA512f528579a1b016434572d1fb2de229eb9a34a6d67bd9ed27a84b56fa836adfdae43551531b6a95f34c63936e22d4ba0b09d5e2b4496e7cbe892c0935ae899e1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dafe44b8aea9a8d33b51e342d524edcf
SHA141de7d863b6a13fd9e84fc7d871daf2b58ee4e6a
SHA2565c2142e28ea06d4194bb37d86c7acbc03c1df0b712c49946d9b793663cfb43d3
SHA512bbb7dbd95a76caa25ade4a0898a6dd2a9cad166049d80b5d71af66d0c90ec85530b62419f4222882d545bb59351cab31ce6166ee0e8219aab6d8bcf88d184cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d0020a5189707a91b31cdb68ab0430
SHA18ae43845ecccc87dbc6bcf47780344694aba6c6b
SHA256916a3495987de1996838f179c5b0ff83bd442f4717e91be9351a5878eaf3e83f
SHA51297e7e3d87dca4b404f511bf76211c4e34725b31db07ea97da63e34947df84601365e1528ea3b62fcf67454152ba7a41f2b9d8be6d95a21a831dd0af4ae914526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595acda8149e28aef7dc0fc9efa4b12dd
SHA1fb8d5a843eb5375ecd0c5282a6104b8c6fafd674
SHA2567a607ceab55f750012ccf33979a77c9be875d2c2efe0eb48f2a7119c0cf33653
SHA512dbb205442cdaa62c32845395e8b74ef6002fc87c5c4cc1566d756e55c93e25afa98d0f3369ac8888919a208373648db54b045c012bfe34145765d8bd3a4413b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4eaa67a0ec28a5792e5341c7b1a081
SHA19b5932d5418936fc471c9bac5daf54ebb82d5deb
SHA25646691cbf91dc3d67bbb8963b2984ef0999c8fe7a45988828e5cd57af58d16351
SHA512fd8d8c7eb51cc79bfcef30137abd30dbd56a78740df63240ca45c42c3d0fce496bddbb6ec419a98113d540a0edb9757ccddad14c3dd8a036fe5a7d1b09fba718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179cd6642c6d5af3682d80a00bccbb5a
SHA11b696e187a4b7f0f1bf9dbd90a7f316e3c7f112d
SHA256cb3b02ab87c6851e248c3ba1dfe5fd48d0a2f2047bfd6fcad880f0786d3f5f9e
SHA512bf352d572beccaf2353ba1b38fff527b42eae261f54cf20b1a399749cffabfd2a7dde1c83fe6c2dd64cd2135044e06c40c1c1b85538637697bdebd71842f2acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d811f81b7711e5a4f67a508d3bfb92fe
SHA132adbdeb77643e369d7b7f0ec20463a715466a64
SHA256f5ebd0c7ee7e9a39e208e8c59568006c8ed023b7c74b5c378b685276dc42dbcf
SHA5122cf163a12fa85a594b44173136aa168c079452a9f0a564ad26efe2f20ca6c3d099430a21b8cd19f669b7a63a1cce5878fc268125a6a21d00c7249b290c07516c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7fe12085a5b7eacdbbf83b9a21743f2
SHA18937cbadd92e851df64e8ba40fbb6463e692cfd6
SHA256093bdb460bb30f769ec2e70ca1a2c22930b6d9efbe56386c391bc9938046e4dc
SHA5126d7999e183d0b3225c8f72d0f9dd310c3e4e3cdebd0451c86be929c4fdc76eed2ee3380bfe121f018dee2fff5b94c5be34f7103d59a149b9a3151892c6b5d43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa031076bdc7b589dd3e12ca0c4d3260
SHA1a4d18abc054ae896fc3d2009eb3e55a61c52504e
SHA256cdd10718b2fcd4367a3c5ca58e926a37f0f43884824c5c24c389fb43aed39def
SHA512084df08ff48126318804c2bc0fcc72fc5a22b654c66a7d534ab40f8afcba16ed79dc57a9d6fb8b06d41a0c03d9d139cab1aff473f6f07815a5d0694af1568774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56199a1c7912606a7eaf50a6f12533e4e
SHA1e31046ed6e35e9bceada3e125d0d9f986c9bf9a5
SHA25610edb0a78770ac8d0ea46d07cbbf4cedc91c48efb2221005143b27e1141bee95
SHA512659ed0e1cc02e13c7b608756be478074188be9490d719cdc317654344c89e65c318cd87b6c3138730f852166058468e39e05e375c558ac10ddfc61f774215762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580173a75b92853bb8a12ce8b24bfcff8
SHA1ff5e201401c981eeacde97c89b0a368a99ca835f
SHA256e1dfa6570f104d67585cefed847f5940b0f4c658566d8d59cf8c03ae7a8e4534
SHA5123eefc0e7dcbfb52aab483e572ab269278748a9e7cab69ba375291024305116521bec710c54a6d53db435968ddcce8d8b6b2994b86702ea5e8e19199515574cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9110e338190b6b25a1779a3ec6300f
SHA1e63781735f499db248a8a43c6ea8a8d467a05359
SHA2563889e0a97ac182df5de6cf5d1e2b8320c046317897728808511d9ea56d9d0712
SHA5128176e14b7980788da9b0b400ab91bd3963d4f380fc5f4bbb8ad2bdf7ec01b8d1670fdb279bd221b17430b19abc3d2210eccd6fa435c95c5083fe7ab18c09ddcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ab2d8ef87c18c28a157566b95388db
SHA103a11b949868afa00cbc844934f83c796df007ec
SHA256b3538c76067f102f635703a1ed3f53945cbea34670c2fe723d0dbff25e7b964d
SHA5120130d4cb36ae87480b53e7cfb7d01985be4746d98417b595fe06a16c12e3c64984d57d5cef7b741df706663b94fd46824ea7a261e30364b0ac761ef4c620ea0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53f559a4f2dfe033fb8fe452465f072
SHA1a0ff3dc8114d0db9a1eb8eb1bc87d9694813b0ef
SHA256f4f9c2ba8290acf5707963484ae48a71dab0a1691118f5bf12a9276609bec887
SHA512d88febfc951630b26f481f27d4bfb719250116d6255997c6ee646a35940c797e0cfeefa249b1b8209ae98108bfbef1331f2976483ef581b112efb034c6516d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b352bd88cbe3779db1440640d6a8ea3e
SHA19937b586710523021a81509405bc3cbe5da3676b
SHA256321ab68b23ce147418d3a7d4f8b42a967b564d875c090c49e006ef0fceef24fb
SHA512724cfcf934ca3a18668f97bb73b9795edb10d57d739e812a47751601802aae3ba14ffc6262eedd8e1a1e3117a57ec0ec410fa7a3f1e915a97425f89d02cdbaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d149e6ffae537719b805b02b33409163
SHA17166f393d4c1a7aad28ee3ed1f86ae008929e01c
SHA256d3e6e1966d14350c0143132ef0ee35375024bc5962ee01fd2f0dab3af69b24d6
SHA5123c8f3e0f759c520754343b42a072ad92d720f3ab6c7e8ac2f4449b7ba7ac407c3b6eeca0ac70ad023bab39803a23c57cd98e2656778d566122701f561936c68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4477916c980e0d602226e8812c1996
SHA16176f772e9cd2abdae8dd5a9aa797b2efa7cf65e
SHA2562168fdac1fdc75cf3a3a67d1afc3d1eb7f5503419482b27ababed24e390b48b7
SHA5121352fe5c9b0a39f68a8f309e9db67884bcaab368eeec203daabf0b1d77c23b905ae289d9ea99266f33c9f7bc090e0226779be2a2715e6a496948b5149d56b661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78942d3d3fa0e1ba09d2d0e7240c230
SHA1e2d5d040198ce27d2d55bf1e3fa4b09b65c1c62f
SHA256246d0173d86bf82a4f261ae09752e94590ea25f7bfd6a931180305777afeb53e
SHA512d4f4fb7df884800c5a861d7385e1d31f8fb512e723ee63bfc4dd27a518d9b49d553ec24a2b994876322fc5046d27baa0eee94fe32888f3d359a70fa75096438a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b