Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
dc51f451b6aec3599471b06b8a74e886_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc51f451b6aec3599471b06b8a74e886_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc51f451b6aec3599471b06b8a74e886_JaffaCakes118.html
-
Size
39KB
-
MD5
dc51f451b6aec3599471b06b8a74e886
-
SHA1
462457b1b8034dcd1ebeb2c9e23f77f0b793023f
-
SHA256
d3d96e88a3f9074600f5507cd1dfbeb590dc9e930da39ae74360d4d503371808
-
SHA512
2eb22e521f0f081d3b418c2536ddbd82785b059c415d31473546b6f1f989fb05d7c393bb5f038a37894f637f13efaa3f91eb049ba5f21d76c0eb9147fcfed78b
-
SSDEEP
768:GPMfwl0yjX/fX1Zem5c6HH0rZOGR7R2IgZc461VBqNOXkz9SBdxa:GPMTyL/fX1ZeAc6HH0rZOGR7R2IgZc4/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a3da47d67677ffd89338bffae6c379888d82bf6b24d6461d0e9fb1837737c1c6000000000e8000000002000020000000a81bc78aeb30ecee4477322f571c82195f61d5d8f97a29e83cd5dc34b64672c92000000020d1fc2207f204085d439108bb73c7c08aaf35104c883d3de4d3e0c2863ed15440000000abfe1e670b3017a613475dca6f8d8eb1eb83db075264bfcaefd3a5f6fcad1eecb9ed2025fd01dddb1e6bd0e68cdb86deb40e8ec2141e20fd56df17644da479d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bf417d1305db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432307683" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D04ED01-7106-11EF-BE65-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2688 2820 iexplore.exe 30 PID 2820 wrote to memory of 2688 2820 iexplore.exe 30 PID 2820 wrote to memory of 2688 2820 iexplore.exe 30 PID 2820 wrote to memory of 2688 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc51f451b6aec3599471b06b8a74e886_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568293ce4d3f76f99dbf31e2ea6621bcf
SHA1b113664b01a2ecda7cd354cf3d1e49d34ca152a5
SHA256cfde5cb216e9ffcbf8b5c4b2ac69f41962a6c46cf120ba0178c0db970de7f7c9
SHA5126a98154fcab0c129c9cbcb5b832aa126f5660adf4340efb23355b1ebff75155d4b6f0663393044d22d012fdc38cadea42f6ea299ed1cb82bbc7f3fa5a092849e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572970349d8b96f112b9a3b63905781a6
SHA12330a3f075e3a323a70a35b4bb6620d494f72ffd
SHA256d615c2cadcd4a23630b853e6edbbdc6a7e273b1f7e3b4db7e30ccb7e8409812f
SHA5127360911f65bfea06b33cdbd01dc38fffa35910d382dacda96b308753f19101a72ff957d94f280fb6f12f81ec6326b5a66afada0564c9ed6eff0aee4dd1dcb26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c807298c342363f43af8036be8abeb
SHA12f6eafc5abf2e2daf39ca90ece5ad059de01700f
SHA25635aa57d0c079bbd9a0ea4b8469989b44c90a866bfa4701a23ab09160060c8c58
SHA51260cb7b2f1f22326689c8d9ba3351fd7b820f8e759a2c5522709581d26823b1a0608c3bacd81bfb5e6a47ae9116c6806bed98c57c5ff9e22d42f1957bb2e1eff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc18e2defba300da794ceb2d2baee1fa
SHA1c83093559c14fc06ee7ae3088be385de3b95f524
SHA25633538e7d6af908ebe4a7381a30f6d9525be9c715ae7970678397b802555fa3de
SHA512270571825c85f54c4c0290606348342c4a1874eeea9e3cdf3fe0ca399ade674196afaceb17796c4b522eee3854335efc99e739e6828b3bdf6d9c573f0068f7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67a7332b4a660d87dabd5bca1150f70
SHA19db22d15f3cfac7de299f616572bf79f79d2ec88
SHA256008535b213709c01482e9078579601b34d1147d38f4e5570b8a50aace68caaa8
SHA5121e1b219f8bc341b3c974ae7f9ad8ec042ce157015a65625cd689a39388c8aa9983951d8febad30a6f87fc7785f11062a246a8934e342d9f8c88f114c061ae0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4111a9e5337645fe56ecd4d03893df6
SHA116dd5a9bbedb7210fddfda514c95be10b90ccd5c
SHA2566617ff75e7a19aee31618b91de8662ff28ccdfdb597ad99cacbd3949a7869c1f
SHA5124663fd5448e2bba5c51a76aaf07d0fbb6f0089aacc1bef5b6b0052d984c22c4ad06d3268f62cbe2b4deb95ae2e1f612bdd8d4c68c5d190ced1551e57fd04ae5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c3df042f16822e07b13ba5396f3c99
SHA1e5393674bd4b7b1ab4c3e5e446936d8945fb1f9c
SHA25699bccd2bfafb657569e2511f0bd74a4831bffdd3982313e7eaf938acf51ad765
SHA512d987882bea2fa250a070b09b8db49516914c9c5bffe17b39b804e4f3f293fc166bbb4ebda64bb0cb3450b46fb6dbadc95892c5cb6497ce04917417046c4266de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acdaef030cea5948c8d9ab193d32822
SHA1f11d0529f96195b33689c96b4431590d70448e25
SHA25621394ffac0090a83e999f93086270028a76e4f0fc4b20079f5ed0cda64c53998
SHA512dedaf25e9944f17e52c46d84ab85b1b64cafa796d63d4ebae0a44d1c1c7ebfd29974008375bac5dbfbab360d9dae9a34c8db831d98d137a1124483f2d3431dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543045101ce7dd97828258221346909e2
SHA183688b5d9508455ccf6f32ee36becd22ce9c5e66
SHA2565f291eaa5817cb745ad238012233870464ce124749328e3713d744a25faa9e06
SHA51275c077213b7c9579a52e4850f60923af20272031a8f5a4c860636b6f5a36ba612dd181d0308622c697db23c0bb885742a8fbce4babaff143eebe2ccc3c290f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86debd58825aad98f5c49743977d6aa
SHA18b5c1efff29c97160e661e9983f9e4d17823bdc4
SHA256cfb27626a755c598522e2dddda679e00ad89d0a154e50e03890742d3097e67c7
SHA512e9f51ac58920eeb55b487113917a96607582ed6f356c2db1905138d38ebab504ef9fc5a7fea79e7d79207050daa37e2a5ccd788c3dc4650920e1d2d5c35d9e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa79da7890a52a387b0472a2752df910
SHA131dbc533d221f0c6a85385bdaac25b3df3ca5e73
SHA25647a905c8f6641ea4c1d868f0f077c476558616411b49e6992de49cd4d9400e86
SHA5125d2bd6ce784b06636b9718234aa8749a72dc8bc7ceb9273c741990c9d08a04c61c15e72e87a7ef059d146f2c9e617c8ce86f51bc06ddf3d6afcaef2db4c28bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3838bd9aa956979b9c8f42f1591c8ba
SHA11c078f63dd4013618a0d4bd112588e3a28ec0a90
SHA256ddaf4e5138ed58d2cc9a9497d76c00cef9fee3f7862b9a31214b37c6ede8f9e6
SHA5125287ef2e7ca888886f60bd86fb44871713e1af9df672e4c5865d6b0731d99fee110b8c12cc06fd5875ddf2314b4ffbd7ef8129dcda07ccd84feef0215efb554d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4761648f7a34ca4c143904e5ddc52a
SHA165a614478a9c8c818ec16cf0c1b5e6c597e1d426
SHA256c8e59b3208e254010078785386ee9b9eeecb68a3da36e7a14fed7aceb90c4ab3
SHA512ca094f57994d0e3c657c5bbbda05a5b8b294cb8dd1a6e550c9150b94e5a5c58d3ef2cdce0239de99b80bd63e09111fd4e62d2ce6974c18a0767fd8cd18756643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59be34b8fe15a1374bffd9867db626b
SHA10b4832f9e037e3591330d3141a3c981ef2354dd2
SHA2567c25a36b535a5194515cead3a29747ebb1b2ce43793f5b21baf58192ff0f3a34
SHA5126f5a0d76eb22e80d23c0804b12be4de2b12ebea7ce1efbf3d695c5c0186f079856efe9210bdbca74c23fb3821541ac103b0134fc04d3fea14de5e1c0bb0194c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5b854f750e3cc1b820ca5b7c79f89a
SHA152ede3b05c4c6f94dfcd574a4eb398080bb324d3
SHA256b05e74f0e7b5ce8eceaf96560a76777626583a176e531e687c299f5d64fefca1
SHA512094db6e9fec4eea7857c27b4375634a28e44b67a5fd3169a28350df9bf9ca412f9185c02a7b3d17c6b6401e114313815baeaff3bcf84b66c7f005dc54fcce309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef8f99b9eb4737088d1a55b8a93a1eb
SHA1982f3a3b6cb94c51fa0ae8ef5791551f3ea79d67
SHA256e9c22f6bb37d58d210948996b422dc329bafeb4a25afe4018192f07e36b3d027
SHA51269c1e3b0071c34647e796c37189a7f7bb3f7a6255e7f9c88d581538fa431151dc5b26a407787a95ba55e852d3edd0022c67c000a5d0672f6c141dc83ddbf163c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bed203c68171e84d0e42bdaf820a6bb
SHA14f13f77e3e44f70a0ae8790b27e61baa37e609b8
SHA256574892c4c48b3e838f38fcbd18ce4a3606461d1dac5cce9704871a1253e291b2
SHA512074df5709fa8ecf795839a1d2bfaa9ad9668a45e56d02de80f1a75c3f3d1ea3e5f7190d49c1d5c765dfba6654b4655c0316dff173cfcb2d8c1a95caaa4e4b019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0cc6576622afebdf0709710d334cb9
SHA10b0b64d81c471ebf0d4ab1435ff6c9f122730b49
SHA25618b493e65c6c64fb31a8e3b3ca0bf202fb8efe5b1309cc3b0384c6ac1359301b
SHA512df2fe3fe5dae296df90829b69309d0b5fff06d1b71c358dec630e81cf2bbbbc4ad8678dd7846ad9aef2e2551129f9d70f33315dddbb466e1325818fd735f69cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4b478c70441ebc4ea75091be4a6b56
SHA1fc155594e6b53b43ad56459cb9d1011138789132
SHA256267aeb046adec487d87570933fde7e4a2d5f2e9163fc4a4da8d6f9512ff14a71
SHA512ba027cf24324b44cc2624ff3f447991796992ee56322d4c01077b96708189de4ca5d78d961e33d07e920d80c5c57dcbacc4ea10081d780e24245628c5fc9b574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ce748d7418e963e00353a6ec432359
SHA1491983fca4f2688bf6f2225877391f1d611713a6
SHA256bc232116c9597731fe0f8fcaba57490c42955608d15930763550edac330e3c9a
SHA5127d17d750f06c34ad76214bc6ce20c29f97e6d476351a86bd5b8b0ea430db4db510779ee2b0abe836c14e0a218c238bc082a6a764ac7d0735bb31539a74bcf499
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b