Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
e2660bc90c68df72b6e18acdbc908d49_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2660bc90c68df72b6e18acdbc908d49_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e2660bc90c68df72b6e18acdbc908d49_JaffaCakes118.html
-
Size
3KB
-
MD5
e2660bc90c68df72b6e18acdbc908d49
-
SHA1
3177c459f76ba465b2ccb5d823dbe5bfdce183dc
-
SHA256
bba865be93fb47f17bef6480e0a145587c913d675b3e189221cff404dcf08b24
-
SHA512
a29bed01d9085a8e333fa940ba579fbb4c52e92351e5dcd16119f59907751b220009b6dbd9f7f0496d92e6856605e20da578eb9275a434af4fa2533d7a3a745f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000012874fa43ee1c4db49d14305d6f72a6aefb3af0bba400806e6f25eb62f4445c000000000e8000000002000020000000b843ac02562d3ed0d40641302a1d0eca53c08e72f68e4d65e2e644e5eca9ea012000000039ad8d310f4e01958d05f00dd81f9d41267b2b218bfc1b622489e251cc8ea526400000003114d9e708073a2f38ad79c8e1526cb98168cf9e92da748956b8ee695e22988230efa57c2cb578af3a4e5f596d4aee963c3b37acccac818333c83cde1733a95a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432562388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{859A36C1-7357-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06d325a6407db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2492 1984 iexplore.exe 31 PID 1984 wrote to memory of 2492 1984 iexplore.exe 31 PID 1984 wrote to memory of 2492 1984 iexplore.exe 31 PID 1984 wrote to memory of 2492 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2660bc90c68df72b6e18acdbc908d49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1ca02fbd059f352bf076b54c5c0ffc
SHA127377f74899612d1d81eb57d961d9ecaba67599f
SHA256518d2242ea164586587496ad583fd7a0b4681ce4f8108580c82eb5a97c3b624f
SHA51250df138df281ec787bc6e18dd40444d9e7635642608b54a81156cb4a6021eeccb7104194d90c7dc2baf34311b4844db86eb7705964e189652157c53bc8b2f321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5298c8b04f08080eda671a55c361bea
SHA135a6c7237ee3749d84d286e6b6e4b8022904b537
SHA25671f2d311072173497c529575b07753c2a91c491d7b72243eac35168c015f534e
SHA51272f7d5d8ddec847fd60bc5b6814c7f598da58f274b07696f8089e9c4667f153e7f9182dde3cfb18d51154a4772f2e0175726ec0b89f31624da6dfd762ae14883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3fac3697568392848523944980ec4f
SHA126989ca2849d9e35cfc540b7bc5a4d12032e402f
SHA256e69f8d0bc7e86a8cf79807fbeff0e80d15c038122dba88f6b253d5fc3dd490b9
SHA512212566c0c7c3aef05026330f3c67a46eff4fc70e3ef752bd90b4de5fcdec6bf3f55de52e898c53b3f3e7b41a03684e99a9f6d7d200dbfa71d940b528e84f9290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f65f8956a7f96733b2dd2b215ee119
SHA1ab178cf3ef0c8d053d28bd4ec0efcc6f39972cd3
SHA2566625e5f0d7187f3d1f9d8fae6196c0515ca3a0efa79080ef6d72e62a7b899b12
SHA5126322eba2af8004f6001e916d2d4813e09eda256fdea23983d3b5e23ad93462bc2379f9d8b418639d8745d7bc98a470e33333ebd738747732ae8a5768d504f9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba2a1bfe6fa87fc73bef2804a8ef7126
SHA19608d98bb1a2edf4528a677d2883f56287c6bed0
SHA256390d7efc0d4d6e98b2d9ac8c9362c7019f6211494799a562777ebf9d1fc4d5b7
SHA51221275ead3a2e8cf246fa1125c58f2d2cc413cd472d403930785b38d643f0547e660f0c40eb15bc7dec1546b43309c8f322fcafc9799f1b6c56ef05e13d20e0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802cc0ff0c51d220b348139bc88cac31
SHA16272d560de656b9dc0bac26add918d4c7db04fb7
SHA256c0d0344b004e93d686bd30915a67bc2c064cfca9c592ad6e5922fa9900c2097b
SHA512c23d96f410a99b85f51e0954881fc7c2746f54abe01cb4ed1d2c73287c74da72a4d50b03eaf702e0788e4d650b45cb5f0cba08ed4008b068a224d69357184c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004a7e58ecbcfa81686f3740b1f594c9
SHA1922246fec6e0e2c6052d6dce54171a863ba5ca43
SHA2568e6a5a5c199327789a72f9b430ffd1e7b46c380f9619267f4647a571f0711bea
SHA512b3fc1e12ef6adb1b5d99b4bb7572fa47bee48bba292e2ae75ba3165bb760139fee789b971c359d17bea62cfc65d4a2658271128d1a362c65e0d80800945acb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511acdbfa5e7d298eb3849c69c8fe28ed
SHA196a366c4217b1780a331cd5a924c46ac684956fb
SHA2564be712ad2729504e584c8b0bc6503961e1a7e19822d188e0fc8bed4133c96138
SHA5125740635b388106646f59a069545ef598e5743968a26a95d449480740fd275f050b6b4676f96807a8ebeffc76ed1db3140ceb0d5902b59389a0e13828f52723c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abd7cfe01c76adc06504bf5652cbd72
SHA1dc5ecc0adecf56795e1b1a6170c603154c757418
SHA2563f04d99607f8ee0ac924466e9bcbbdc131b7971e0fcf6a0fb97f5cd8549af37d
SHA512e02daa1f6bd505a41f7b027f67bd8870d92dba7944d8dfcb1d60fcff6d23d15e81dd9be528ab56052c9936c9ee48064546a76781aeea00c164aa611e29bb2359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589df564060c2e651fa5bd2b1196dfb77
SHA1a8610d9d25216b5193b36dc34c19764d7e958583
SHA25680ad39221bb8240ae59689aaebc179c15ef01397463ef5307841ed285597521b
SHA51278fe6229d4602896193b9107c0d4775370743209f29ea2fc64808a365ac524b391937599a8668ec4de6d4d0ac4857f5286529535612ac3108a3c9d4adb182b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011abe85680a5a251fe6e51bddfc93f6
SHA189911049a9571dc6f56a7d115d1679c7125b090e
SHA256653fe9bc19a8dc242bd972e2082537bdc58672b68596417328e0c777883c68b4
SHA512e6ece73c9218a1ece43cc697330501a9e8c756a49df8a3cb27e85a43ee6db36f6cc4e992c3e3746cea179cedb9de3d44d9a2ca56eaee486975f41300d03bc2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06c0c7004a3098add5161ca8570f22d
SHA133047d3f4e5de3c0ce76b0610829e349bcbd7e6f
SHA25607442283b217b62e5c5154ceaa2068c20ad8f1b3bfa7e2001f58100039eb6586
SHA512e9ca146c180dd9b724254a07088ba37a1ea96700d236917c711b1c81dde97be75eaf6fb1707e026faed7a6e166d4ddc7304665c76c44591d0ef8c8f32e2fcd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ac7f609970e7f98928f1f4dd2058f4
SHA108ac921d7c7d967dc65a67826750042a31c75cee
SHA256dcac0fce80bc16b1b9b57fc8931cbc4e2e81cd1680ac2d590976e0ed98fc85bb
SHA512c46da0a3bff8ee10f4483b8e94c6be7fd9d2656719705af5e691ce12151cc9f33dd9bf4f26b8ec5f963287af569ebc4c3d7418f733a6147183d991ab5ff513e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf4ddacd1880038c70775d8e1ec8dc1
SHA17f7a43fc8495ae94060a1c51ca81b186790fc8ac
SHA2561c0935a23f0ed3f18ef911e69a552e1adbbb04c13cc09c316e840902c00accb2
SHA5125f583caa1c848f8c80f3e1311af55adbc26d488ebe674460322c541551097eab31939bdec4c26007361efc0bf6e439c81c8e7328098d47e91d61901a4c9c20d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33ccaa4cc297e77e8ab5fb84cb7451f
SHA17857552afe6efccf61054c0eca7e956f4013a874
SHA2569429286b6ed2b71bdda13a81d1f0aa3e979ce908c44e3d287d164bb95253427a
SHA5127637d66345f346aea93e9433dcf3002ebe9a219f4738cea00cc74d20fc841cc45e002442ab0ba5809beef9bc983f17269b566072a8607a61ac877d343b82f0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba533427b22ebf773f46ba7c75b3ebd4
SHA11d9abe2bc8067c7e4b80f0cf6b877a5c7baf457d
SHA256d2b50df44c84a5fd63fb51c11b4e5ce36d2155d5fd8c2303d081e94108982348
SHA51294bdc70a95f38b2301ccfa8d2127a9a02d0ad0c451f2e65e2309c360a24ca11de9e52b610c86ef179eaf5c18dcec92165e76c405b03c5aca8c115eb52a98de8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3dbb20c61c80431b46e1106236aa43
SHA14b25f1897ba3c4a41ee683515d4ffae4596f7d7f
SHA256e4e2fc63fd05243af6bcdfd57dd1aa190cc0a667b73323c6c015868855d3f147
SHA51297f8d3fede3fb46f78b3fb737b73c607f9b94b8d308501355700f44e0b3de278c691952891cb851991ca4509471a65b7e4e866b9a11155b166edd8481733b0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c59028e7d1a7b371585f4f12b121e3
SHA1c4707c070694b1da69d6c39464a78201639d9c12
SHA2567468c000778001bf6d45b32beaf27a043cb6be506c23d9a9e2418ba3b67cedab
SHA5129f4afcc9424584326a1612a01d78a7e4a0aec9e2ff0c2e4cf0eeac5ab9c8353d9a1de58e61fa3b77fcddec2dfd1649e263917ec1967e4191f2801adccd775c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b578f192a4ca5bbac1894b9ec1f5a9b5
SHA16a3fe09dd4510caed2f14d769379c5178505c8e6
SHA25622de1f14373828e141ea2de6801b2f61059f9e737b6836f28a1d669a488f1a4c
SHA51219e0e22ca1cf570138a497e02193a55b4fb254d5ec3152314776454e92b66fbcafd61c546dffff95fd3804f5333001b501d3d6e0fb6b5cf1113569577b766dd9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b