Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
f5a01e82e657736e98134885e26f8fe6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5a01e82e657736e98134885e26f8fe6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5a01e82e657736e98134885e26f8fe6_JaffaCakes118.html
-
Size
24KB
-
MD5
f5a01e82e657736e98134885e26f8fe6
-
SHA1
07e95258ba7ed1636753ddab07359b144b516681
-
SHA256
58b447be5113e79bc22774c56831ebd88abed8fde794bf88c8dc3717989a8ad4
-
SHA512
1e815990256d8c1057a7fb59144642880945d17a204e8a253b4a81500fa0caebc0436ad5ab9c7685e51e7f0ed16fde14cc433d736c0c24ff574d1fbf5556b95d
-
SSDEEP
192:uwHyb5nLIJUnQjxn5Q/TnQieaNnoVnQOkEntdlnQTbnNnQNGLnLnQtMqMB6qnYnP:NQ/CRGti
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433415630" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000197bd9b0272a94f1e6a55c230dc87e79546a38ede7eccea157334076120518b4000000000e8000000002000020000000eb7623c2919351065e963c2cd51b457d23b088c68d7962ce829b6e31267e846e20000000515d6eba8065fc1a3737a1cd4858f451106d02ad5fdbdb4c92db1770e6bfe8f7400000008e67761d6c1cf4d5b1ad15c4ebd6917d051253d4d0576ad90ebdeaddb99bc320669f8c0f43b409d621861812c2bae0388eda213770ab5cde825c396a663ab2c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20E41F51-7B1A-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0be1df6260fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5a01e82e657736e98134885e26f8fe6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f546a1dd86801e6ba0a57512c1d3c8c3
SHA1d5b3cf2bd94a097f21b84627790a8b907ddceed0
SHA25695f12203e31baca53509d35c64178ce0543463b249c435a2f787988ef07d93c9
SHA5124124024d4cdf04217405f9a13ce484b629794bcc58a6ff11bce9640c7bdbbe828191d6d8acd98e901d51c22355d43a9431f6ca896ad0fff780e87395dd74213e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fbb01ad8c1ec9ee6406142aa6e6814
SHA14da40b43583e8b2432195166f778cdca72230aa6
SHA256c79d03a380db090c8aeb5de1be76e35829bba864f2cae4fe0632e6d9a20b1f6b
SHA51235975c1677c20a7a4c4a52137a8301148b1f1864475387ad6155ec019de79d326eb9f002d2910fdd3eff1ea2ad3fab030ffaffcf96708effd3c2c9c07b085b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52927fcbaf6695d54527f2eeb29557dd9
SHA1083bf7c2a2fd22a49a2ffeda4c16aeead713ca14
SHA2563407690f1a4570095f2d6bd921be16715452a57a7865b6ba1971537dfd5c8e75
SHA512189a5d95411a49447e5f2c21d833c6fb35fb7e5d0ae17e8fed467b53c5e90dc593d3c8a86442ca1dcd635a9a445152fe772d63bb4a1f6b23d5028c45a2035795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e1abcb42f31c58fcb5a8c21f18150e
SHA1fe7668ad855e0ace5fa68c861869aa558b861bcb
SHA256bdd3c7aefffaaaff639c4e5acc61c348de95167a652610ee477aad3feead675e
SHA512b5f607947bc4889df52c0d65268a1471525f92c453a9fd092c870a0723cedd42f6bf3b94fcbc48bc0544a30c69ddde90a66b008ae8afd38835ab86cff878f325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24c4f14fca8c0d90dc2a7560296054d
SHA1a26a23a086909f9b1d4a12024866a23a508896b7
SHA25647fc2ac50008f474feab891b797c8c598313af787172686664c6c60fedb13569
SHA512f48642c59e34108abf8bdb3c6763b9ba174585f6f6372a9cc8ff9532e627ba9d53bb0fb59c1ca94f1b0bf5bc32c72b6776be66f79ad694dab817158c22258310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd174336166a7aff660793adc3f2a7f
SHA1d20eb389de2f34be579ab58d4d68d7071e0ba725
SHA2569e48f7f7d92b7378bfc900479de0cd534798edca859dd1042f374ddf8db24ee3
SHA51242be52a1f4695d91f36d9084bd5019208f11911b6e962b290117dc4725d150cda85952558972277dfc4d2a730ebc97e9dd3f43536bec44f16031c5b6cb4dfb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda92e08b60660f6f1666dda65d78059
SHA1047b95a359b155b39ec9be53d6d0075e2fed13c5
SHA256d1ffd89485f65005383426396206ab6a63c19234d3fdc78b647152bce29d4799
SHA512e04f11c04389ba4f1a2f09ab8335126b5826f90489da92e1072b06f4e349d6b0a41937f5fe7c134c66217df2c3801d9d8abdb96a0005767bd1b39b87a43994ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f311e197791dcea4b1aea3cdcf82b365
SHA10f49469f9cf054076ae0f6def1ed9dec19c8080e
SHA256677cc05dea8483b7d2a54b6ea5d1b81450b88278b710238a45cc82af0c3086c3
SHA512854e1be2c7d1919d973e92dd845b5c943bc9a94be50cd922a3c11b9abea9966efb106d1ca7545b026da9f75783bae863b7528378ef60f07677c397198d9e17b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d19b36e63a0ff1fb5489338ad1b4f4
SHA17bba4e0feaa8218df89669b8926a1b547dcdd594
SHA256771e3653c328e21cb5f010c4eb0fba07649d849fcf4121b1ee33db5f8da9aa22
SHA5123ea8d3091354c8dde0aa93e5abde07b0cc6f6326a1df8f7815f2d596915bd84763a71a32948edbd44bfcc5eb465c67d4e0132bc79f7518e80f531df711162faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58856ab952e614e92e736a319b8b02472
SHA1223160f1fc74215e482cff09b7f06d06072d32c7
SHA2566720b8791d73aacd7ea1a6c6493ef53969132f8d0e6a7b890ba0ab588e0a56cb
SHA5127505557055df0b8105d0f60b85f121fe5d96540eea66259612ba794f647d15f81c2f789c40dcfed34638e176f19c31768aeeb7b0c56272c2c89607563fdf46d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b281b719daf3de85db8eb6e97f758b
SHA1d9991331d3116a672acc5ff896316003d20a20b9
SHA256970ae6c54cffd4769f0dc3a5377e7693a35b5962af479007c15070a587df64ec
SHA512a15a7d092e756f707aea29cb4e5a4b121249d7ef01e8d096b032f59b33c2424e14ff18da596da9e1a7acd560d5679422c7e495c448d812056434bca8d984ed21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573fe882ad52079239ea5cb5e44c88acf
SHA1758a4ccfda502a2c2f910f77203ce54280a83d61
SHA256d42ba723ea749de5ad920eba55d0c20459acf8b597bbb4442ec0452a78ff94d4
SHA51254034de6505fd18f19a02d4c107e4aed91ff72485e91ed3123c0e3814636542065bb59c3d65d68fd262731637d6269cae61649a18cb0cdb871cea6799ebfce8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538cd52833ad097eaf14fe510e46f558
SHA1bab576750d7fe8cdfb717f151e26a4dabd9e5d02
SHA25688d968f3d5e4315f968c4a205eeb8e51549ac78d3093b939a7cadd5f2b9bebae
SHA512eaa2ef6c55609b62eb6894b976e25da94c66ef94eae0040a4558b1ddc70e3ca6ce6e1ffff5ca947c126516ea171ef7bfbf17d24f3c858db8e894d9a2741a995b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bee641db61b6c8514395401b0b1697
SHA12bb9b610b886c9dda3f339ab8212ef949511ea7e
SHA25652e0edb5856da7b36adc1f4f961e29c41d51c87c0690fc1df349bbbc7c29ff7e
SHA512c8ec2ecfc6f5dcca6abd1b6d654b272392ae33ef12e4ef1b260eb13e9596b50bb4f8f314569ac087d283d03bf01d05c71dfa72fab3f2017e6d3f4f8373a81094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59968a2692e5d8b19ae46b3f1693607a9
SHA1af21c2c01a34877201a3846f592a911b0dd2456d
SHA256721750ff8aba46789c377cc91a2b15f82085c1f4049dc2c4980b179437c2f9ef
SHA51239b63e774469eef337b43678393f8c5ea76e10edd3622ced85e40cd71592fbd6cde2c6c041ebd072ea1066862f3a66f34b7b3b14ecfde9f7438ddd063088a05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9662a99e9ef8fad5b14be15ef08114
SHA13685a6e76319b4831255bc453facfcc68a11d811
SHA256b2b9c77b194ca954a2a23ec9d8c9d56de81644e1da88686224e91f0d61f34328
SHA512211a741e84c250b37c6cba51780d31b6d22a27af186c32f34e405d9453c0eff576fc5d95c5d35bc61cca212be3a552aa273127cd1029583be8e59194a5f258ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba070ba255712c9a6b57bdf216b770f
SHA18e07ba4acee77eb6215bf32e6b41aa7c645f5b0c
SHA256187a920bcf75c968c59e58ad9e7e9f53f0d864c8d27b24aa4a744162c930d799
SHA51284936b2d9a387972be2f89a9bb14676189fa8b538fcddfa5726dbae30f78f2eebb5d470e3a393aa506c52ef12d9a154346d1548a80c2ccc031721c5f6e69eff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fd1a0420a578affc67c7b44496c439
SHA1b4f011606acdeb2a0c66223175b845b1b9d2f1e9
SHA256ef3442103c6c62650fdc3b255e999a4423a9451d3822482e2dde8898ccb3c6d5
SHA5126c94f3db8d610be47feea9e801fc01bd0f37108dc8c9376a1e0723c5cea9180fa23e83c6282849c19b794c9679cd14a9341fba5ac4490710f4144c46c763ebb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491e7b8046003d097c59386645379e99
SHA10dafe3b6f69b776c0d5ef900d988fc4084cf151e
SHA256a6270c502a01fdfd04dde8ed1294d590bad080335161de2b79e370e0a0e0cda5
SHA512b0436a66786a64cf42b1c4fe68d75273b14cad0c120441cab85aad5ad4c37833cab7e204fa8a874379d6bf5e3ba292f0a86b491e1e7a39133e2ae8ff84565a80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b