Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
f090c8b540ff09881e1341ec7c94bbfe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f090c8b540ff09881e1341ec7c94bbfe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f090c8b540ff09881e1341ec7c94bbfe_JaffaCakes118.html
-
Size
37KB
-
MD5
f090c8b540ff09881e1341ec7c94bbfe
-
SHA1
3356b76303224905e56ae92e42c391e583413037
-
SHA256
b76bf3866d6978ff09cee0f6cf29c1509476298cd8b94cb01f2f4bc909d11fba
-
SHA512
525be5fcf9d100fcb53eb38213469e2f309aa976882079dea9c6973ecf35a35678c66dca733a50265f284fd86514377bf3b22118ca004ec4b5580e404cc2e83a
-
SSDEEP
384:vQ/BcpkrGtEGxd5mPR7Lbe0UmL7upmTBF55:QWNiR7Pe0UmsmTj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206dd903660cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f4f9f3a2e942d9ff437519156d6a4e14bea5861d3e248bed1bc2d9a00fd18535000000000e800000000200002000000083151f6eafdc2787825256b49cdf2d25790875c6e65463c58a028ebeaf87446f20000000d8e1ddf08b198394689742db77c482f2bc014bcc4dc81fff19d8b4c6403920504000000055a1b589d7029dc3fb064d75cc28da0ee610527aa4381e5948476f6b03263629f81dd5b53e514e3dd9a0ef2e1daf303e4f1b69a5e1e0d672152f4d1f8c4c2fdc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D829DE1-7859-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433112856" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 876 iexplore.exe 876 iexplore.exe 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 876 wrote to memory of 1048 876 iexplore.exe 31 PID 876 wrote to memory of 1048 876 iexplore.exe 31 PID 876 wrote to memory of 1048 876 iexplore.exe 31 PID 876 wrote to memory of 1048 876 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f090c8b540ff09881e1341ec7c94bbfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b28a8136d8da3869b04d27c9a7cee74
SHA1d3a589fa543cdba9a05121dce682a6d884893845
SHA25642c95e0f248b604d9124338019995333506c2cc66c5301cbf360ecf39f1f8e36
SHA512e1aa51d8e7e5cde0ce65a01f99f8bded379bc756c0fdc5997a22e829fd3abe58ffb817ab395554b32e98fb189fc45ffa7772e8397961f55d875702ca2e190215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ae9b5788947a6375a90a4805b0e877
SHA126103bfc0590581ed2340a86682ee1546bffce7e
SHA256a1784f03a538c65de2468d22109f4d934dd781221c3f75843fa2803914e42757
SHA512ff4a5c49481a7e4c4adbe085c9ec992adaee099e3a08ce88ae70a3867c9f79548eaee136717a06b6ac51b1e697358069948d98cd60a46e878b1c2ae587c89b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a086c27f35e60112d6b3d251ecd9bba
SHA14fd9709e7bb69e16147c3e6d5669e1cba28da7cb
SHA256daf6a1a79dda311bba0a3ab2d3751c79f2f7dcab40aa593dc505871d1e2dad69
SHA5128f354e4f6eab474fab92beba1e0455b8fa7212c00b88d102d6c584b6d0e34942fae8e8584d07d4386ba54d9d8d91725c5a0f1ccce77b8bcfac9fad6f313a2b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539dddf07acae02671eaa3184095b44fd
SHA103b8a9c713a0f6351beaf7bd0cae0c061bf59d10
SHA2560543e664e03d8e96b709d7ec0bb77f7d867444e1a97b2205fb9cffe92e880a04
SHA512c6f59605f48ed7e978ad69bd869be7dd0e2727014d4f04e15963e22e4239c31bffb6ee5312452100f75a406691201dcb634c4877480b69f6a10060e70f16c7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44ff1c101c01bdb70fff6687357110b
SHA1f1efdc86b819a08044e27b8b204eb5820a1dd50b
SHA25658407e996fc78033617f9566c0f21e974b2c32ea85b1ef598ff6648f0a8194be
SHA51219986110aabe56024bf521207a45a9351df19e1914d01325763692e85ed81bb22860135a2594afe1a2cddf2695e1b1535c531fcbacbd189d5037be7060f719ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597f1ff6f18f6d205b6aaf6e0aaa1bf6
SHA10dd6568ba74236b925cf91d9e9774ce03bfc7b34
SHA256e2f62dfe2310546f4aa6de8406925f57d537c765cec437a319a2664b76f6cd35
SHA512b876f083d41a9d7dfeb0bceac3bcf86eb81e6a04d817c5bb7fe580b6eab3b8289042f0184300908ec7c42c5083ff1cb80a7906826e279462ed38a0eeedefa1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57233ebad5434ee108bac57acb10ddd67
SHA19fffd64f21961780997ffcca55c3800dcfc60b1a
SHA2569ac1c3c0e048fb16de3be6460e48f428be1ee28e879220796d4ea9ba9653b043
SHA5121dc4f9cec451755f6406cf284b359525cbe15d9146d08969aaed9831ff5832d5d1f1820f40ef889344c663bd6040227c8a23cbf7dc4a8d5e12d5a67ba7562e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508abe45b163ccba44bdb9b3d921a1222
SHA13c15a0294f9849fd6b77fc2f3dd627bc746ba30a
SHA256d6f6ced79fc3ec0caf4c493bb2319df840e4cb2f09ebfecd0fd0bb8ef8b35483
SHA51253e0dfab0efcd6a83159d13d2dd22eba129df923c17fbd24b5a6f788b13244aabd1d01b1e17eaaea11f2a6253dbe801e8605da9f78c61d23a7144a1b184049f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07d7d028ae42f7566fda9fc5b782f26
SHA17511350a4777768e24d0aaaf97a8e009cc100aa6
SHA256879f9fc9df8beb6185924941c6474334810961e29870a743e46256fe9a187216
SHA5120d4418083b4c41f1c1cdfc92455e04f1d1dfc3c1c55dadfadf181845740ce6109ed5961781c59524f21813d47f30097db461bea251de57d525e10c3adc480683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb4795fa742561d8ad0dd35f0650123
SHA17e69833a118cff52c60c5ac6292ce37d84535c25
SHA256b1329fd5e2b57dfeb25fc9e942b7a0cc9a255ab34998d8d20da30f4cbc372692
SHA51219bb79dab9ee55e46b5befc40e4774af2a2e6fa492436b57d283c72ed983338f66d1de832e29cc3e52c99aab4301b554e593480f78e95d07fdb0c2d8efd17b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae2d81d48e04d7dd513aa7192694e6d
SHA1e56d1653bab4dc02ed06684400e24d9dfff47508
SHA2566ab86a24dd4dd2366046004987258dd050aed96d5d1f5f7c079448260f313c9b
SHA5120d3aa71f288e2aad58643d85a9379eb4fadd78344a1b3abef716a5d0d498fc3181ecc826bf70a1df95d2f5fabf3952f88ce4afeb1543e20366f6ccab854c4c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1abd028e757e717e2f371afa5a56e3
SHA105d60f1624d7a33dc6f94c88433a4f5714f4e88a
SHA2563a10f9a65f92c7c96b09d83b775cbc21e9f3bd86284237894f7aa186be23c3a4
SHA51216725025734e60afd6f603f8683d31426c07a88c47cb2d4566b3a1f577d337f4cc92c504637fe922a27639fd1bd6c3e2831086be9fe164b7cdfc684a51bb7bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574bf94abb6f41ec5d8cdd0b44e70324e
SHA13fa3b909d60611df3bef6c7ccb0df82de88e5ac4
SHA256cb11ef3725b33e47f276baa64b170fde4aef9052d92ab00e38b5daa071987d4d
SHA5129a6c971f1a911dd28a0eb2ef3e2711c1cb8708b27738e0c5ddada8a575746d5fe517c66b379c909d351cf8811df19a9cc6e9fd56b6f22190bc66b23a1d6a675f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7228596aa434d8d2284ee60c6f9ad1f
SHA118e4b005da6869fac5d7e0d6b04a1e4d300f92b4
SHA256cd07994bb4e837cfa9d8136e662d35efc2c1f80d841a3f7ad980a0fcc7859b77
SHA51233b7d3dc67e5c3a26577794cadf0f86418b8ccff9d615c53ec77a84613d105fdb7f34530a049dec1d1a794bcc35e7728f999d2c850c6eafc679cb722f6df68f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558002d001c551cb1884a227929d361b3
SHA1735063101fe69a06f1864943feea30cb2c3b1cdb
SHA25652ffdf0e20dff764ab72e193f87c866bab20f71d2b155f1a6a2be4feaf7a3589
SHA5120ef2f88789a4d1c2ff65e0611521c86a8d92a17de4baec34919b8c4064d7c672f37dba177ce0cf405bf279b710043b8772f0d273b66590516dde54b0bffad657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750b063ecaa9abe35061eb3946827ae4
SHA1d17c0a53e3f46c1ecb31d986cc5c14400e513ecd
SHA256343b43b11e52b4549424ab6aecdb94eaf6119d8dbce207b9e659d038cab3e8ce
SHA512639d83f01b73e9bc2b1b706ec8478edd1b8b9840d21893bf08affc71bb0c434c51b1a67d80895ab334964eb4f0a2c1b6afd31282b070d580e4351c3177d09f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49243c87705eac3b48f8d068e447c71
SHA1baee8f49476aa52cb0c02fb633c0b318be02f10a
SHA2564b1e941e7c5b33bab5222e1c6f7dc3070d0ddffd0a2a340e9fa06480e9f1a28a
SHA5127ebd541f70ef1e3b92d15f4cbd186ecba5467c216b7883bf3c4d9db58e067005475726e4a9da3a9764812f303d8b7d1f8ad27f2009d5d862e956187e96a46fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee639210d56c65e6388055fec8b6c63b
SHA1f77b6201795e6f17d61f5b41bdc6b0a2285ddd3c
SHA2563ec7600fe5a673283ad57d607e7b8cb81590e18ecd9f79dd6df6bc330e80fb82
SHA512d80d321352076f691969f53c60c025f6b9f3fb233cd684c0e71412d237410fa12244f52f8a8229ad7be49591367149b8f7c0c42d2de4f6d9519f103f381b39db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf2b863cdcf29d1a837ea83e1b40cca
SHA15ad516d743c235d1e9851d26c1e702f01006d9e7
SHA256b475767ab6fde6da86cef762de0f931bbf4c135343f0e790e07d966e0a5c24d7
SHA51296af24cc3a7902af5a69467256f067f35a5cdad81028c541229acac02e108200af99c362f6a01e5ad1a1f622070bff7c3504defc6a20697f5b074a48316071b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b