Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
dcc21a883ea489b16c35b12e44b05f4a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dcc21a883ea489b16c35b12e44b05f4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcc21a883ea489b16c35b12e44b05f4a_JaffaCakes118.html
-
Size
12KB
-
MD5
dcc21a883ea489b16c35b12e44b05f4a
-
SHA1
6380544362c37b575f8b24bb46f708f5cefee0cc
-
SHA256
1bd434eb692d19b88905d6e242ec89c99c1987dd3fee1ec6594dc04108f1ef96
-
SHA512
4e5ffa4b1cb849154b44b89f15b9e8018759babc5a8be4be76cba0c26e91c94ff3949fc055eb2563146f91d3938cd6297040b45e448dae7eac8aad021f5d2e57
-
SSDEEP
192:2VPlIsr0KXyJSVCqN5L48k/w1wvqVkZHBIZYnkhvcn01SZauBuLbdU8d:sPlIcvVnjL4/gYHBIZYnkhvcn0kaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6050feb83d05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B78490F1-7130-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f914279a6d065e00829a0a228c223faa6c624cd39e13b31f3db791ca171b675d000000000e8000000002000020000000c33f71a6b18db1e4a4c74cdec04bcd547dc0ed6ce205943452753931ad7d74552000000044135520bc698c100a8df5f985c904c4860915db9c44a6be89a9ab5b2e5b563f40000000e430a6d035b57d4eff102e3ebe307e4b2de2b29efbc3ae61415b95e9a87c107eaa8d7a7c095d7d14939c7f4f188756e2560f059472467c2a27e392a93054cbdd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432325820" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2176 2424 iexplore.exe 30 PID 2424 wrote to memory of 2176 2424 iexplore.exe 30 PID 2424 wrote to memory of 2176 2424 iexplore.exe 30 PID 2424 wrote to memory of 2176 2424 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcc21a883ea489b16c35b12e44b05f4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f386179b4ea52c0f302c4daba2eef1
SHA19d2f864a6ea6740a5ee6a3286868ad08e26f3ea8
SHA2569a4886c32a129826a16cadf0e94f06a251d1156b1a9afa0757aeba0e2474ffed
SHA512ddfea5679598fecddd36e21fbf1b696eba264b835a0dbe9f045fa0b8d5e565a25c8eec1f3d7ef2adb1143d9490cd794e4907a1aef6b7427c06015b85d8c3449e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d3057c18bff851749b11273f86e5c3
SHA1c7107a4b5b98c38281e1c20400f9c6d5f75adf96
SHA25659a34e73f945386a44f315ca2723f3c12b10fbf2b178c0002e663fc5fe5cd04d
SHA5123e17313a20cd213d186a81a93a7f39e59b4a2230167fa5771a41b126d3dae60ff40ba4d259300ea4c75a6ab55871452f303d930b6457c2e7f2033a5c12e8d601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efac1bfe2a4f2ad280b9343614bc1d85
SHA1115ef45d6973319d1d338a5e989c2130d6175b27
SHA256c98059b39f5eacbc9a5966dd6b6436133094f22d51123bdfa7bd01e3079fca4d
SHA512b59441c405868ca3822d50e3cfc424bfd14572bcce9612b7f654042ea96ef32f42227715806eb7ebdd0ca9861d4fb89b0f04d9af815a1d999d42ca50d73e9c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d2d89652c65e6a89076772ffc2a6c4
SHA124e4248642da825ea56d011ced0ebe6c79d1ff38
SHA2561a485278c529054bcf165b6ef7eccea9c30793aec1ea8e06e242f9ebbbd31b5f
SHA51282da23d405cb4ac095b4cd21191816a578820bb99d79e4dc42be168ae96be160bd2190d5505022d6050e23a5b50fa0b2392c97cfd0bc6d02fc66eef9176ce48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb129247bd0d9c5a8c4853826424ceaf
SHA1895ae6aab992e9d05237b23a5fbcfbf5b4a72c8c
SHA256befcde3f22bb43c93c819936840beca203fa4eefaca408a5dd3caf8bfbee21e6
SHA512a9b7ffd38d0a066b179464f6e7e560a0b2dfd86c5e576de8a48e187bc158faadd4229585b4d034e062600b0908192ecc7af84f7b932ad8946abece9fed51a51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a1fdadf59828109d890e4a94a0298f
SHA1c1440394a38ada1dc7ffeb833dbf559d34339030
SHA256ea14e816ce70ad2c63f8b8a9c4de6a5f7104b54fe74bc89f88a2410d6d3d49e7
SHA5121ebc1c15c16e799270302d9d760d6f4b354298c9046aece5902e1647895d11469b2fc4bda602744e0365054605ea9797bda7b56443bc61f58456c52c6d9cacd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e8723ed3624cd4ba5291c5b98389cf
SHA1153e2235da023b4a31f385e269112e673059e35b
SHA2567476dd30d27d97f0692997cb88c284e6d798501cc53ec032d62839b8aa01b7aa
SHA512126b3262bbbbac3e7abbf3bea837f757a7cff662a3159bbb862cc26b1ae4b5337d9123f6b1a6ffe079cdcd3057b046e62d1475551916ceeb6a7d79bdcf68e719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a441497f75525b5e6461ff520ce963e1
SHA18d670d1bf2dd3f8eb9a394e889463be49782f683
SHA256203b60e898715c076fb5c972f3ea34dbaccf721698732f60f669b340e8529b29
SHA512099804f5b6bcb4ff1ad6b863cc2b051c7efe6dcc39272758439448fb9d03d8a98e968ebdc71d3cbd74e9d24477503ecd7951db58a8e68e1527f1c08748cbfc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a9bb3e471af4b906be1662eda2a60c
SHA15da7b46962aadd5800b56d688e12e4a50a9e44c4
SHA256799b719e8fa0217b9b24e5242beca53736b0d5ec56060cb2a3d5c06ca68a42ca
SHA512b95fc9ae4a34fc2c4fd1aeade0e09a29306727756cdcf0d1ce0774260ec513c423edb59a3f2f4f3307b9fa2edc4b9ae2d15cd064dd8b54ffa1a0ae1def85f22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34139dc834f28257edd250c55f45d65
SHA1cdcc4e07a356c12e602d99a214f377f8b8e7fab4
SHA2565f358418ba3d239a1a5071a6c6a1bf14ab8fadf601b30e0405f757729b929376
SHA5120e84685c2d4b815e0ecfbf4d4f6e188f353c676b0c342f9d8a973129b8bc892d98a3bb4c9e75c7ecb9309ad24a31a7a2beb90b3862e2f0e5c6f0fa8ad77d3c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d37a3cdee83212f5d2a431e0ac1c4f
SHA1e6efd9c61f4e739b3fb06a627684d2799aac25a3
SHA25657c2cfdc30d7bb5d5ca7f9c1082aacc93cf56a2800d298d7c14b7c3e29c03360
SHA5122237362c54e05fe4ab2ec42b71be4e9aa0d8bfebeb7ee99b4c8f60ae256f2d2653c1c67500b2ff3eea96982c3661dc59665ac5b5682190a130a0dd5d077e7d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2d1aaec712a54ed5cb29b459ef7cc0
SHA14745482ad9b03710683b40259991bf6cde10f2d6
SHA256a73dd398a26110e0eb3d130140e49a76dd8ef599c2e468025ee577aa77200899
SHA512ee562b0be4638c550180f7c7e55f328b58d5e13cafface9460e07a20769ee917c515c9b639d4b342dd151d4236c04d4fafd991ba68fc78fa8214a31e497aa3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657f0be86d365362cbeb9dced756895a
SHA1822aeea6e5a76820d521c10791c89af2ac02bf38
SHA256e4588cb54714aaa3fd68b5dc8dba3cfb2760de4044b903cfbd573e7ef1a15cde
SHA512ca5cc63fc665ceffc96ab93d019f8891a9fe881e165379fa6bbf67421f24b0f41f662bcec27328d7b7e819e2133dd9b97f7a67f3cdd52ae0d7e3766f21570832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5e88e895b27b793a6bbabd47ab532c
SHA178e8335ebbc37a6568bfec99da986d0ddcd8ecb3
SHA2561bfd6cea8cc83348644000eeb01b5ffe9e2df039391f775e1fe03c463c04019b
SHA51251fb04f551f86178f804fcf1780f5d7afa9950683b1abcc8032396bf84d8b3b835b240d11e613e11fe3c664b441503c1f83eaa3d64d31ee77f5470d19462974c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd18e51fd6e8aba42e1e299dd382147f
SHA148abb48003204f5cb97e69905702d282a797721c
SHA2567be1cd4cf149eb6354632a1e70e113a106486540926782233860bfc87ba62692
SHA51221d6be7a0923aa0ac2eeb2659c27d8786ca36a5fbc9469fe0657246b7de86b752d3ef72df94d19b9309df792ae32b3a033fd9e4f232b0899e6146e076c1e3fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56752fe9d5313c25c4fcb1540e6e56442
SHA1e98938730cc0f891c66b4fd9566f53e9ca8f317d
SHA25697f653dda1e5edd22e8381a7aafd54d94d71a5bc0bb962fa775baaad4f2bfb3e
SHA5124cd4180e74012c44904a6c4985432e85f9681c74c27c119de3487e34dccd608f2c6bf4402cb282b4d1a3ee93551be92d6e8932d77dbedae1c89c6f99d3d08b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a26bc3e961da35520473cb3aa81280
SHA18dc21757903b60198823a5b34f2def4a174cd1c8
SHA256ed2a91f6ba0a236799154e0ffa91b03fe4759cb25ea94a064d11318f4536aec3
SHA512dc56784fafbf6451a070d9e633053e42086e792e54f3d89dda6ead3e0ef5536b6af9a7666f088e9329eb022c105431f2314c065bc48d6af6587bc232f742639b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996b1c2780713eb929f5170a701f0d39
SHA1b391bf00601dcaefb74a0ab3ea46c83b1b5f471d
SHA256d19ea65f945f3db4c4af5a9fab15c92e295b31db0b0b7d9fc2d6c345845aae53
SHA5129468e2ddaaed46193387574b258991299f15a1a423b998fc6d154b41557268da48bbca0718ce017d4262efc2e0b6f8b55337530e6a4b9caa2a6dc733294c232e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528af453b8962a5d86ebbd182497f3a67
SHA1135229f2128ba884d13042b7140659153f9363a9
SHA256218972342160b03da053cfb24040165887f1f5683237799162dd5fd2c53650a3
SHA5124deb986baf2c11b31d73441c67e2d655e857f2b81a8d474dc4b339590eed2c8a9c71a893816e31b683c5b37dbbff6bc2a8b780084089b75ae523725c541419b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c64a5cce6bebc71f180606684c0425
SHA1455545db131686bea926d3fcfbe1979c5e98cb0f
SHA256b5164edb8ae79c712b65ef8051512ec7e9ce7a75dfa1b99488d2149848741b57
SHA512334f474fc8d423a3af731ad1869ae2c6453bf4fa68f84030c7b5c4ae89f4501675655d920ac759ab9ad2aef7fce10e52d7a97c5131107cd23a8703759c309dec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b