Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
f606826628d9d97c2edf4c730b5aeba4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f606826628d9d97c2edf4c730b5aeba4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f606826628d9d97c2edf4c730b5aeba4_JaffaCakes118.html
-
Size
43KB
-
MD5
f606826628d9d97c2edf4c730b5aeba4
-
SHA1
f4cd07ab2389f9ba1c267f80c6b53ac594598374
-
SHA256
045d22ec9865adeaa9a0686e36f48c7dc83ba61451f5f4d38fe57af0a2a96583
-
SHA512
5bdfbd36c394fa26ecf162f6accb4f254cd8983407618bef501af7deb5bee1c5dbad01ece2b301889330f6f76446ef4ea95ed1337ad45871f385920953822033
-
SSDEEP
768:nbGKhGGmkb0H9QAXpdAMNlAnS1g7ySa9Y5:nbGKhGGmkb0H9QAXpdAMNlAnS1g7ySa0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006869223786059768e39cccfd49e2e37deb969f9d228530d0a9701530d0e82aa2000000000e8000000002000020000000007e22f0c7f12fa37c00c89d6a53ed01be50836de6456ea7df7996270694fd5d20000000a022015320dd6ff957c40f531e7d06a837d8f699dd459ae4d057767482787b114000000088a3ea0b7ddd7988ceac82b47f721111311cff6e6a5f5137fa8ff1fa03099317c395ab0049988c4f21a209f2127fe4be11c011c1904d8ed26b02aef279d5042c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9076953a470fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433429486" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{644EC451-7B3A-11EF-BDD1-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 iexplore.exe 320 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 320 wrote to memory of 2188 320 iexplore.exe 31 PID 320 wrote to memory of 2188 320 iexplore.exe 31 PID 320 wrote to memory of 2188 320 iexplore.exe 31 PID 320 wrote to memory of 2188 320 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f606826628d9d97c2edf4c730b5aeba4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef4459d0d2139be35a8888479810676
SHA1c855c428eed4858dd80958eff29ef35b63904cff
SHA25688da0c1bfd2b25f11f42000c4ee684dfa2ac714fdb9fce09a4ce21578ce4c5a7
SHA512e7ba7c7f097d4f3d35dd4f90e713287fb492836848b7e0b0d6e4e02b0444e2266cb53f52c0d821f815d6fc9fbef8e73044145a0f0bba014e7d46241a9717b22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e280bd7877a994ce90b547a839c7138
SHA10a48da965bf5527abc084d12d7252924c94572ba
SHA2564dd5fc0104b22ea417a6db7047956c0b4750195da24101fe8256bb67afb8cc2c
SHA512942732a98f23729cb126e13d3b6febcca16b2e81715223c4b83870c3078ea1e80eea39cbe94b19d9715547d851169ac7d9a107864651f226d02ab632ee409dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac39a5ad928c8c301aefc7c2fe9c857
SHA140cd55c152e8d034431f728f26b9ef0d0bd5ce13
SHA2565c17d287b54d997d5a1a1980cf527552a08bd46fbda7ed2ead60a958d27e9dba
SHA512e0f0871f8b023e60a551ec159b8468e367be7fa6c5fda3d4f9eb5a897d8b03d782acaf1e37f1c8024daa65664be4b6a78f23ccd05c7b129e41fbc0a7ce417a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f404288b7fdbb59260be3cc162a8375a
SHA14e103265785e25e1388271e032e4c6bbbd1b4006
SHA2568e57eee1300d4904d48756d13e48ead071b758d28e30eb62db0227c24f1d56d9
SHA51233a5617b7c9f62e5099957eb758e2ce37a63a034d924fee92d229b17869aea18575ea41c7782bdd724edad4ded52949389d0488ef1a1c33c1f1926676cae8b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09d7f5b4a45feadffcb77cab7b31d3c
SHA1e3722465450191cd8261b8f214bb7c53970b3572
SHA256f146293d79e152981512c56777853084b367b86018375babb1818410c9b0fb98
SHA51286e281a735c019a4042b9d2062dcd0c83cef016768ed8b109709e6b0823696968dfefe7e6e19045d832d490fbf0cccadb30beecd2b2c5d58f4ac62c011c5775f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f5cb486628b4b4bd5b97cdddfe8ae0
SHA1c958bd0bbe38a4ccfda8f66f956faf07b0968ad1
SHA256df8ef754f44fe9c77c8e509385e5ceeeece7b3a4d568703432d52bbde60140bd
SHA512bec41a0555a1893f4b01e05e29580b1ffae686288e2f62750b0e4e76f7ef909880f1e722a6400f41e942aa50451326464a7ab62547130ae71d8b3a5dfc1ad827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4cb065815459424e167feb948190e14
SHA1ce48a238687c964b101cc2d384f833e1971fc827
SHA25689fe24f3ea3bf039544dc663148b612845b9959b35bc1a6e404d72fa1e0b9887
SHA512f36a26862661e202f1c35e22e5ec7450abd74e5c7dff8e3272892eb8d588f3b41875b996b0a8a87b6cc20f91f1d23c61f547f8abf53981193113a73b51050cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ffcf4add83962aa9344b1905bfa8f6
SHA16c3172dd115933b534326640f4acd09b31c349a3
SHA25651575a9f77706c378d09cc9db6b4e8ca0e32639d97d6b073bd9e97b55f43d771
SHA5125d8e24efa7bdb4616275a1ba057d9d3cc8961b774cc9dfe4740d74cd16f89059b303bd411c5a7c38122ef8877f364d1352ad3812f9148405a5306135ec51754f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199b176361354fa5936768c446ebe2a7
SHA1d3d0949ce61755999a85d94f922b0efc24bd30df
SHA25664f024ad9be51ea4ad8f254af2594da8bf23edc971e37aad2080d42a7278ce8f
SHA512ee228e4ee32abfaf10a564800e36407eac739af4cd7a2412704d4525a8bdfbb3b918106b37d02c2ed1ace257a6d2337a6b4628c9ec318a12fcc4fc5be4c7e9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e345757294d86a430fd89bb363a081
SHA15e1c18fd9b94ec7bc35c169e3154367fddcd7c4b
SHA25659dabcf69092fd8e1253cf65b0e3afac2a02c4c643a04baba09cd2dea4b4871b
SHA512b34f898a84699b0634e9bba1da3127063a9248591f8e564e7d51cebe9bc8810073eb00121da69b07a8cc19f7192996c90688a8b80a0d6917e40bb55d201716a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea0bc48b263e83211f1872a47776473
SHA18b38f8cf9f8aafbad90c98ee30d30a769972c912
SHA2566a1f531a306c56763c25eb074b8e02697c4a4e691f5b587910c8761b2b38c3d0
SHA512879fa08fa9b7ca0a8702657972704f8361d5d77ceae826adba975db870e142de8291aefc0bcb290f0430b841ae2ef9b707ed73d9bcca1a2a703eca05d8418c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588726f78d63f6557bf3af01d76740ada
SHA11c7c4a8a3462b773aec2de488192fe191f050253
SHA2565fe5f51b4a2fc8d7f34b1458d5d1b226182875e28871657de833c34fbd2fa1ba
SHA51220f8054ffb8df43ec5309cacf55d7f1a328530d525d567a49835ad0861efe0b0b947d2d5997b262a7b9f22f5d81cf783b2a4b1fe870ed419454a21720b80ac26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acb2d4a6ab2bc42e4ae344a1c180598
SHA113f2635dd85dfe9367cfdc8f5e530274634cf526
SHA2569ee5773531afdbd4c6ef95ee85c789d61d74de295693d2051cdd2db7ab17479d
SHA512d7dc2e7e7dd43bd43eb7c9672f98f509f4df4a02e41f127eb0b6990f65c7b7e2b8f5a086f5943dca7b573ba2cb51f93be1812ea5676e072e515494769903744a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50f02c02f74d3396f9e5b1d5f7256a3
SHA126fdbd07b751c43afe94f6acf8890e5121919a2e
SHA2564e8aad1d885eba523e5fce79dad9cd023a225d8e51f15971477fcecd758e41a9
SHA5125a9d320c1cb1f419e740119ccb047fab5fb8885aa7f7e22348978e94dc3cbd861c32fb661da0fcf9dc273cd324205708432696f7e9bc97d50c8baa302d6ee198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900107624f15e8a0ff62087c61b3f4b5
SHA1f108e35e2986f89bc6eb016c099eaded974ac00e
SHA256d6a3ca1877897274b9e34612d39ece2e77f9e88480dd0d3c39f74747f32396e8
SHA512c1fde9392d9dc7a214c8851fe392bb94227234a067d4587bd879c037940a51cb5fa41c4fdce242be08adcd4d0b13d55c4a0dcb72cb5ba6fd8765a22650112915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bb9fe5b5b3760eaa3e80bddb09886a
SHA1f222e22cfdc96d2b3a189424bc488192d8065e62
SHA2560531d227b2b7294201a99ea83bff7157073ecc16a576d6701619d9430a6a11c4
SHA512b021a72fa1d207caf33fdf8972594d4a98161810ebff550318bfc49c83110f75590bfcbee2a6fb0754481dbe06aac796863604a1d874a36126f603664b9fbcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661cc07aa3c7815f170f258453a14169
SHA1665bfa203afb9fa920d8f61a402588ffefec87bd
SHA25636e261abe26a5961f4bb2a8ebcf105eded02aae851e7c785ffc6126bf63c71d6
SHA5127bd4aae9e569366a0e596518adcda4a09fcee168e77c37800189dde11f8d971863a11a84ea6415c24786570b8bb50dfc72cd994f29b8b0897102cb286d0b9bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827eb195f4ffb267ace347a8c62c791e
SHA17c3125199eb64d670563f291ab6209c51d7280b3
SHA256beadb5bc72c5106d47efa22ff36aec9be01472f27a25c0278d0175c32c6f9c60
SHA5124ad8ce36cb6eb411c2f52816b6385aefb2589572624e448883b6bf5839e62be8fd2d78001ce220e2de3335b433a304ad107fe4671614fcfe5c1727f0bc684b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3ad8c123b27dc1cd0fe2e7b18b9a12
SHA1bf96dafd456349588cab63b21efa55235b40860b
SHA2565a68921e8ce6459ef270020e5e9ad5173911caf410b4e453f869bf81769df546
SHA51288dc3b9118dc578709e63f54dfc1b92ef6647fd3fe37d62d9d353ddf3e6fd85aa1fd1b279e1b307942f0542cf8d996c5e83efee4a06f82e83aa4045e773db09f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b