Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
eefac3fdb4bd1ce37d055619ccae1de4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eefac3fdb4bd1ce37d055619ccae1de4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eefac3fdb4bd1ce37d055619ccae1de4_JaffaCakes118.html
-
Size
17KB
-
MD5
eefac3fdb4bd1ce37d055619ccae1de4
-
SHA1
0f816d45ce6882beaba58c308eb0d81e80edad60
-
SHA256
6afb7974b0a08f369cbb66e2260478710ce0561fc822a27e7f4b210a2671054d
-
SHA512
9bb345938ecf2089d32d7da4536d9aa5b1a658289edfc32acd62a111451e634cba1b567d966706d242d9e49f2daf42d20a5eff70e36d311686c76dddbe0827fe
-
SSDEEP
192:YidCHhx17FilrlUHdWqgl8Sp3ONRUidWwg7q/zz6M6Ad/PTxhr9uB2Ydaccdh5Q:FpUoWSp3OTlWi/9N/PTLr963d7cd/Q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF2D8691-77C8-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000015d2d6d1ef9b6782325a9015743621cdaf2b0a003873322f592ee4681fe3598e000000000e80000000020000200000006866e93df733163f49c07e829094f2d38785c68e1ece2decfdccefeaad8c25b8200000000ad3067d675f551f20b64cc3f4be5338ffb10e8718924cb67cce08e72bc4169f40000000fc573ab707d5dede0224af9a1196fddc83055f1f3fe35fb6bb7e9517e034f78533f33ad49dbeeb401d221bf2d7b8e936ddd8a0b71b160d019599b5bc66fc60ce iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433050877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f4a7b3d50bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2316 1292 iexplore.exe 30 PID 1292 wrote to memory of 2316 1292 iexplore.exe 30 PID 1292 wrote to memory of 2316 1292 iexplore.exe 30 PID 1292 wrote to memory of 2316 1292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eefac3fdb4bd1ce37d055619ccae1de4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aecc22356b6220e4c2f8f39daaf981b
SHA162a433a6c6ba21363d160349482567685cbbc9cc
SHA256f0c81faf5a2a3eb87d83f3b0ac07cd35e308a170491710e04273f078cefd3959
SHA512a37ed9aaaf7b674263e9663eb09b8529941dd86c342f70123f5ce3bb1eba4e618fe42c4c8c865a7175e5d674f95072088dd3e39857b72345673c02531975aa78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaecafb1018f051ff3398e75922f182e
SHA16995c9f74f3331d3138b9bfd1c332509a8d24640
SHA2562c783549b5d3c8abbec08c48557e81edf81227ad0ec538c4d73d5cbfaa52882d
SHA5127942af47b0e77f02ca55f7eee70915cbf2e9c780ba2fc6263356e5bf0b08f1a3ecb27b0a4e14e75714ff6949994ceafd6de68719046ddb7d9520d5cf6e4dbb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34f1b1febef16c20d614093557dd5b2
SHA180c828462e11bffc48b3e26db5eacc1cdc8d6a89
SHA256226eed41c7ca1ced52f4bfc2929c664ceabdff1189fc467059123a89bfea5146
SHA512186778098e65035cca5fffdcb0e25d46dca83bc19ffc6c6396b4a4f76639c3ca8120ba3476feca1becc9491589ab60d3391fce08913d29026583d08e32020778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52034d3baa7735af7336b09597cc88735
SHA1992eafc722ae496f36aa5c469ec7e297f7d3893b
SHA25615f27631ad460317f270089379b85cd866a0b9ddfe0ce4758fc3bcf3e342a7ec
SHA512cf83ff1ef9016e778ff715ed50e4b3c3d216d71bcfcc811dd468946887adccd889279f60e3c29c1881705bd05396818f6d38c7f9b80ff8ce245890677acdb2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a701bc813ae2d30c1fc73266396c0205
SHA167afa7ccd712526550ef0b7be7775fdf307c941a
SHA256599484294d13beb06010895623ce33842579e0a44879b4a5b1c154d52f3711de
SHA5129570c45972864aecf41583e1bf195c7a421dbb83a45dc5e078017fb425d6ea0425666bbb50fa12436d20a6039cd7f287c63e9da5b3e56f216b74e3037440b8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b801b1074939bda4fafc4b4a5c4698d
SHA10762680b04073767bc96ab1ed0ea1e1f01f939ca
SHA2567fd354b344c32e65ae1bf77d0b479b7b7234022d1569aabcebde3bfca9c02b08
SHA512b39816cf1e0d880433d8b00ed4b05edb931e71a2238ea5b1cc12ba77b00b75c2f57c2df8eb24e4aaa8febc75fc611e2ea02660378e50389a16be362a8cc09a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cca6659c09e8a9b1fbcfd58fdbaf906
SHA1ca319606c4187474c9c7212484b56416ba4431ca
SHA25623178cf7763c0c5489217a2701f753fa47830daedc2f2a23dd14f8109612ff80
SHA5126d627d11557717ad543f25d2fb25cf5a80f33b47944924c8bae7433fdb4076326a8f508d53a827e8014f8c74dde8c49f810c8835b56a8750f2bf882d5664f237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db8e4cdb93987758a2e8d7cfee7aa5a
SHA1e499d1734008b0b11b95778a0359495904dae5b0
SHA25690de70e78a1490dda0c756858193e795651375ae7e3c1bf81ad762ade3b6e4ec
SHA51230cdcbf4a542189c4a74639e0371253cd2582794179320c2ece13179fad9d6d19f23ba74a15c68bdbbbd311a21e6c1a1a951e66b736968cd0713173aeca7ac94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51f9405c13f32da9b6e87e07f6c58ba
SHA1356d76c3421553f91013ea906b96c8ed3946553e
SHA25682aec0551b689c561b1f2e971c4fd209721f91f38035b34df39106c50410b8dd
SHA5122ea4dee03d05f339fb52dcc0d6c093da3c2417aa9cf52e41033ae4dd36bbcc69ac54b395722218e5ee1f22916761a7bae4715a63884f2bada6354b78b0ac1894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e197141276a7c9bebaf55d48668e031
SHA1703690b4809f0a5108836735af93ade4d79d7f1d
SHA25643b314bc596d0fdd740af8b2754021010e6a8d65b554458f8c48d128c1911608
SHA51215ea5aae8527e7fc80ae47f2deb4f2653d7e0efaec09154eaf65827df7c63f4af8eba0c57329e1f5482999f5b273ddc4222228a3fc7c5a48416b130ce9747e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086a6bdf3131c7d772efbf1fe8a644f0
SHA16872229754b2264a4d7af2a1efb7b5dea6ba1da7
SHA2568000aefc7b2c07e5a32dfb4a44998ba9bd21cc9f0bd989f21d6abe9079d96eb2
SHA5121e9beafb0633c4b88d042a72164b4247339ef751739bae67bf269b5510a021cae85560c301ce5e0f7c65e514f2bf2cae3bef1405134bc197278b701bbc316346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e30aedf98edcf1e91750e85c467c7a
SHA1949814c55e3e462914c6ac5006527ef42c12cd7e
SHA256cf654bc05333b295df94e7b0ed954599e6d6ba075e966dd14c0e7ceb1cb16227
SHA512c804803e8496f3c882e393e0cdfd6fdd697a91c7391d7f0c76b3cb57f4f7b0579d40d6ada48f018006a687f1ba86a680197a53620d32d0dc9b1cb242b26b9012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfcc9b4f9d61788839bb7601d320ae9
SHA160818639f77e90f7f5026f3849519253ff9d8e43
SHA2565fa4945af387bca9d0369b4545f738c86fa05f88aea650b2b2708646da7eee87
SHA51277b00b257768d8d2d32eb64247749b6560560b47908c897555ed08617657f52c7f6712765e44e308533ea7935f425260cc37d3c5d5e84e9f230a7d4e5c9bc590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d1cc1d91e6fb482eebd8e2a2995d01
SHA10ac6c12aeb10d69536f312209e4aad4bf4f150c1
SHA256da46f0845504fc9af940fda30fdde99db32a0328c1ef20ea05f4ec62113d651a
SHA51209b33f0c75a8423466c72faa7718716107850a5367f55e33cebd6cdc9bbc3117bb8af58bb162af2b471f72957fb30c1d9bff4b3715029ffea00ece86ff9fef56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594418273f1ec01a3a5a272acd0ccca8f
SHA1924ea81b44efe12986fb7fee35fbb3d05edd8759
SHA256fc61d808e053313399530db2068d61b223ad3875af656eea9562994a01f4147f
SHA51287473bfa3c25dbaf0e8d79652fee72a8b92339c1d00a3be1ed7ffd98eebe11203068e745cbf7a631a05a50064ab3e6e0311a7a0ee3a7c2046a9eb5d025ebe101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c98cd67f974f5a7f14e16405600d11
SHA1cbb9cbd20ba18aeaf2b3249987153998b5e66a8e
SHA25679ee76bf2b56e326bec2c99b68e52560fb8127a35be918bc9f156f609898236f
SHA5127dc94d07c247d27c7408f1af7262de266ff7dc55742eff2122a45d815d53c8684612ba6cf5ee21e65a28653c6580fe1952cc37c6c4510d8489fc1820eacc8c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1e2839ffb52fc873f42678833d2f40
SHA12343779b7b604f0d3207928fa57cdb3493a46296
SHA256c063e1b66959d485760c8ead5bced0d4af11cebf279f4bbc292575dabc9f61b4
SHA5125c62fffbfe96c2f2aad97f203b67fb67ef9adca3765df936d00c6adf7dbac949556c93308086ce947824b061c2a2d20e23dd0edf61e75eb876a43393e55c83ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d8b24b165e4492717ccc858819cc5f
SHA193f4cc474603a8edd6872ffcf9d9500236cbd2ba
SHA2568871b5dad62b3f90106765a89d35da4da0f7e78d64836afa4b06409ba88b0d29
SHA512e53a1d9289cb8bf23642158dece9f4eb8efeda6f9da73fcafa007918f39e1cdced9ecea051a9e0637c87e18c47b0ee9fc4e9ad80a6bce01bd23a7aad9f1ccb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029c4577d2d11da489607bec5db4de3d
SHA1c1ba26a0f9742da2f27988ae9d885341e0d699a9
SHA256bde9122313b742caf7f776a93d71f12d6ca55206051afe9bf28a3329290ccb55
SHA512be178b626c603d316b6d927fb93bf7e38ecbb7bbcfd430ee48878ee1d59078b8050bbd3d33eb482b33874fb7c627ae3f5914149da182cdbc1144f7b5a9ed8ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2059fc947913a9cf32101a6b4483ac7
SHA169e958f5ff2c2431771190467fde9102d0c69eae
SHA2565f1b290aaca06ea47bf582919976530086657d966279bde2c5a3df9478b9132c
SHA5122ecab6030223511d3103b5b6c7c62dbb949b6b9d15292a996166449924684499edd50e9e07893ef36fb24d5446edfec2c036a356a9329f25d3979eb7bb1b0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d2fd3de65b2e1fdaa63106d35334b2
SHA1619c74e60fbe685d512145cc9d1dd65e12e824d0
SHA256f99658551171c1077a8c56c418422e33354e56901b44cdb23afe77b1415be6cf
SHA512208a18f0b3e52e3ff55b9b7f312aebabafc2f6446c65ef045bb49d95a2a93fbdbc8f324d909ac9f6d008b1d185ffcb232a991846e1dbcae0b047e92c48a0fa58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b