Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
0097317fd12ad18eb631055d43829a22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0097317fd12ad18eb631055d43829a22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0097317fd12ad18eb631055d43829a22_JaffaCakes118.html
-
Size
139KB
-
MD5
0097317fd12ad18eb631055d43829a22
-
SHA1
8fc001d598d03885d960051f182e288b21c1fdad
-
SHA256
04da060a19d592987927590a429b002c8295df4b369061d6d02799ce10f3c463
-
SHA512
14ea347fca8c8936c8f65189d9de28c281b8c961cda80ecf2df9b7b9d43384ab0c863b68ed9aad2f55c6e2833bd3e1afeafd4496cc1515900d1a18c959c9bccb
-
SSDEEP
1536:Sm19wXcU4EfpHRlFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:Sm12yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109b81c31a13db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433850089" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002a82bf81868d74b76d4dae06b7990da8aa04a7e1738f7782246378041353ccdf000000000e80000000020000200000001408200672ede269cc86aa314b2ff122ef542d6135c3ab17de90aa5aa17761da200000006e5d6c702dd7de111cca2f6be2fe25a8c0320cd76e07cb19c21232b9fc692d7a4000000009691b4a13060669d06326bf191b4832305ba0e757af25652314b9271abafa900a6558f9068b9689c30ffee3f07dc10c7a42feed42acbccc81260f349bfcafea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE9EAE41-7F0D-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 iexplore.exe 320 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 320 wrote to memory of 3012 320 iexplore.exe 31 PID 320 wrote to memory of 3012 320 iexplore.exe 31 PID 320 wrote to memory of 3012 320 iexplore.exe 31 PID 320 wrote to memory of 3012 320 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0097317fd12ad18eb631055d43829a22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513aa882feb2014f75185a4fa6f49750a
SHA16f61e8fd73d39ec44f45df1c2b520f4f431d5134
SHA2567ebb30862da8c473ed5e30f9742102da1d06281cd18e3667958855e1f6c2c13d
SHA51275ece8b126dd2b11cad6d5bc832baca0459640f3c9e9c052dde612932a9c28812e050e20fd235ba1bd6760a220f6cdfbd1196bc86b540e5b12b17b7923a95868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df69d8b6bdf298e49f4957db62d3336a
SHA10cff773cbb5d020f72dd25e53868bdaf63fe2cd3
SHA2562ae97f51c11058b543a60f846ca238a55527ee5480ed25ff44f97511d818fc17
SHA512e294a454c4f0a6099f6e6d9412eecf494d3eecc33109e12ed44967d530e5385511744e1db2d49fc93dddc334affcf1dab4f2f993b08f7a4e60afb7df7b4fd730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54437b774908fadda187e646bbe2ee1
SHA192eb8604fa2797c561ef790eb85590b8f29c3565
SHA256d35886c29dd6d07039d65de156df6f1f39e0e1a7010f2732f01f7575581f5408
SHA51248584723033e0eec3160640c74b6af03c276df2a6777003b9567c0b002568fadd431bb105e92f2ba89a9ca2862120244200190b40ed9c6cb0f2bc07b53633d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123a6a7e2dab4482cfc999d633a43eeb
SHA175dd05e1042e6c744255b4e29d7f6c7562916e16
SHA256cd1416ba8207b8551eddc63668d9ec45cedb02389d4b3ce43e85aa8d8990f950
SHA512f84dba612347945303abe9bdcf64370556f1b7d04789c8ced72842a888fdbc1f6aaeb3e379d44f93da866b03566e61bc96051b66073398faaafa09bcf4c11e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a1bba69c9b5e37900a3235010c4dd7
SHA12e25d2c9b3d9986c9e685a8470ead5e6ba009fa3
SHA256998e0377c87025fda673cf3822bb3d5dbd4cc3cdb374c1e1bec9dd876a4733fe
SHA5127d74f98be91ee7283299a1defea135093726ab2ba56adf4bd84539001182f3499c03cf5bd5f8807f099a0427fed31b1165608c85cec163ce69ae33ad4187bf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b70564c8c0b711546bf2a81f3bd6c62
SHA123f123311b2dfa7b5cf2fcb5c5392b90e8b98bc4
SHA25633edf3a44317ef70efbf76aede4b9340a53869e570c2cd2ef4462129079dd967
SHA5127bdcd33e1ad2815a951fad728aa2eb707daa7b1b03559fd8ba60d921cce437e514c2a8fb979597088dc33a6ec1b53911dc1f8c263cd91062eebcd68d49a2c66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508919e84c7d3d1d9a4b1de1e601cc9e6
SHA15f95774208b1d5749596d66fa20b78fa721c4971
SHA256b8d756c78f888d2f8a8ac36f1b00ff6fb9ef39fbd318a62bbabc4366a008d04e
SHA512a41e4ef1fa2abb5dccdd3cb5b57fb90570dfc595b614449205beae78a800797dd03a5ed5291f8d1fc3b6f14fced71284cb0c8995a07d61e53faf249181c96936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b78109cb977aa7704933fc077a6788
SHA1b097068ff780608de081efebd175635823290afc
SHA2568bb7dac19ea6ebcc624c169bba2a6bb50afcebd9e89ea22941cfa3223543226c
SHA5127f2be747b732b2e16bc8fb52e0f774c2d477e0aac59047025b674eefc058e18bbd3dcf1f76ee906064010f2cb51e0078fa4b14458a41983867752c9d6b960f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1f81414e610b2d1ec7ba61ae77fc65
SHA1f2779691527a77e8575f1714ee152c01094044e8
SHA25680e87f816d71af245f61923a8572cf7edf7b35b128a8c56e61c297c856e0dbae
SHA512afe9414494c29f4542176168740011f5fb0227418c5d5fc9093915d29929c8682c2c9c4e534eba8dd1e99509aa1e20ba968b8cebfff9dbb88f98195ce24bd6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59faa1c05bd9b25d14f89555dd2be5190
SHA1fa5c6f1e76d9218ce6c38eedf59dd986f0b3eef9
SHA25635feb8b3d135f838e6cb0930c714974b211d5875e2e72e02fdc41009bbe73a76
SHA512e2897dbcd46c075fa2248feadd2f4456657c938f3ec27b776788ea75e27005061c831ee84c8c4bb16cf54b18f4df5f857c77f11b3b1ac6e992b5a2f49bb753c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c963e89822fcd83b0434e1af31766d4
SHA14ce6a0ae2dbf021f00d4d2814da4a8046590aec3
SHA256891c8cafa06c89e3ec795008280c9c826fa922881a0831597fbc8dcbef95d0e6
SHA512f54a4e7d3ae228ccf76aa53f1891a46c525bd6f4462d047f48f8d3ce363a67ae0e0da043bbd4d9fc511f4dd3dd90fb54e64de49a4d32c4b27034d332b0637f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e17a4a011ce71c3e083aa9cb4cf79a9
SHA1a25f89ef60e25c91e02f64b8b0ef34526dc1144c
SHA256baa280643c11766c6b21350807e5d3474eef40215dadfa1c8b8e59dbc8c535ab
SHA512b059e04216320a83ac59349604745e207af09c678ad94bd73475740ca3ab5512bb71d6de4b03bae49e4d3ca461411c08582ee6998942633c5355b8510d81c74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adddb8d7459d700e4996f102a15be9c3
SHA1e5f1f5eb6ab5d102eaf847f2e3db8df75082dc69
SHA25657bd9d2fc552b303a4bf2c63d3a9dba4b511d5d452c7df5ac22b62353ccba84e
SHA51245d2a955311a8f6c150afa79da8be5b6c63d8dbe757c275e97ca4ed14edc73062f614bdc7a6e6ffdcf735a406a20a78edb714915ca18cef800bc5df2c1768487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6939d0b2d7325131ba24f2096173658
SHA161d1a297a93f2d4b836614ba099a5d25df531f31
SHA256b2c50e5acbf78e07c8e3fab41258f8c8ff39b70866db1c3ded0ad187b75320f9
SHA51269b61733064c171beec748e358a6b3d81b254ca5b5acd9edfb78539cd00c602566dc2b69052b9055645707d869265aed54f487f9d23de0b30551264b3b5d9283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7fe9941feaf5d81be117a72636d385
SHA1ea0d1885c53a69895685c98c08922948ba1653ce
SHA256f13b2e5c894999e1b77bdb60aa466c86f0400025ccfee74588d48a3cabf071a6
SHA5120d8b05ec047c97a92fe0e897e011b77c95a5b02c71d4876d370a10b87473a7a7254de19471a43c8de887bb05f82bcf10ec65bcb95576cab8a5fd32daa164dd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcccf60654beb2d7eb08f8c5e51fb88
SHA1ed9a9a7184f6c47441f6d0022166e9cd99b5ae0b
SHA256ee100bbfeef25b48a29b0bb98d1550662a395e9e0444404c1307155dcfd8237b
SHA512906067da6935b129af41cb624f605a1d7de02a73a83cdaed0edd71ad47f0bfcb116bc089d981ebd27cf338ebbc5317b646035be4df0ecc8299ac81142052c2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6081bea3a2b3d348abfba9353290db
SHA1032c53b5ec717582afce3bbcf1f0f1eb4e3288a1
SHA256489efb639de3e7237e7edbd00defbb7b5db3250de8b1ca5d42868fa854edf8b7
SHA512c83facba9520566526b1749703317711cce2aa34cc076b3835fd2dcec8c1c1b8d839aadc29b4f928c680f8e534cfab2ea1bef257cd347f2abb0d297833af495b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52564de7e9b0ea2b1badd7b4b959f20be
SHA1d133719c5b6857b5ef4bcc4c8c26c33f27a740cf
SHA25602ca2d6862d08011b3e5a3bb8f1cad80aa1da1845b31515b202037be8f2b884d
SHA512d251fbb84b38f69e57628c484df99b7d7d531db91b22801e04e8ec8941002ef8eb99b1dc6644a8c54822d61bb826295143225e252e47fb3972e89c24d38624ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec29ac72e84d08512dc5cefd8fc05b5
SHA1db65d244c1eb6b5fd3486281ab09db77383f4b88
SHA256ede8f4d9a4865133b43363745727051b2665c4e1485f6137696506c68e2dbe96
SHA5127af6ca0404e946667a17aa9bc307319b5014d3f8da79d3a3ac0d73a5e41552f40180a5eba886ca2923e4557e5655849fe378f9df333d71dd68c0ec974afc57b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b