Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
04ec3a36ba0e290b9992e926c90eabfa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
04ec3a36ba0e290b9992e926c90eabfa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04ec3a36ba0e290b9992e926c90eabfa_JaffaCakes118.html
-
Size
8KB
-
MD5
04ec3a36ba0e290b9992e926c90eabfa
-
SHA1
4d2dea910cd70c320447fb6c45ac727e1542d0cf
-
SHA256
1478368191238407fff6593d0d977b0ab6268619406f508e4c9453c42acc5a60
-
SHA512
c1ba4f5e39066bfbb25f35d1b60f9c76925820f9a4cf80ea9fa3264ffe9387868fc059f8d2603971e4945f0d2e627bd13e59c0076bbab5e64c13802087b7d768
-
SSDEEP
192:Djfm+WDv8DJyjXIRKDvo/nymb8U3QgARGa2pZwlAb8:Djfm+WDkDUFI8U3QgARGa2pZwab8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7B38271-7FC9-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901ddcbdd613db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433930930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000003c84054107bb20753dd275e0e18f1597119064044e8360eb507f4d7e8851e973000000000e800000000200002000000005caad2e023d2750331cacefe39734475b960d4a5505a52e984faa5ff66d620d20000000802141d14c753279e6a33847e5e75c524b430816bad3d78cce84d066e3a4ae3640000000d8d519c9e5ba1ecdb0930e50b1949029d92c7860a15f8908507c0c6359d3290329d4015587a209c0ee07c5c91f9e309f3491a7581a1dce199340f169f8e3e4e3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2380 2960 iexplore.exe 28 PID 2960 wrote to memory of 2380 2960 iexplore.exe 28 PID 2960 wrote to memory of 2380 2960 iexplore.exe 28 PID 2960 wrote to memory of 2380 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04ec3a36ba0e290b9992e926c90eabfa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54787c0db08828f3b1b020b82a160000a
SHA1f6273b9104daecc004bc4b2a422af4c38d1a3b6d
SHA256fc37fb7f329f49bcc20f804fbe5c69b5779d9b706efbec1409dc739e628e0052
SHA512648cfe1b2bad4612351c14fccea124c719ade186e98208ba113c1d631eedd1755088f8eaac9d77f94353a24c087a8a83c7ed6679f646e3e97512808f9e826128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e20167c55f8e8144b90793582724de8
SHA1a676de151b71d73166f85e739af2b0bb7185b46f
SHA25614be67c86993e1456d8324a692af09af9f2f030263044b4919017441d324cd5f
SHA51243ee82a8c523d511bd75145af65171f94a652c3bf9c6786b1682b07e4dcba75d718a362fcecf2ab2e3aaea059c3cae3ad6765fa48f171c77bf393251c146decb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e9fe323fe6216a012e7d7a35feac86
SHA13dc4d340bd564b241b9d87038d43a9481463d68a
SHA256aa3cf6d2eab052798533b2c499f2596105a411a0184948d3bee893bea9a2dcb6
SHA512428212016d315178915e3c09f47827f98b98b3f3a5baf2d7581c21fbab6f886fa5a717ccd33695fb364366a805225d33ecdbc997876bb14992b52016e5076740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7fbc7e5992087b408eee4b53e053a77
SHA1811a9f4a1622815f77ec855bce60c1e189766b8a
SHA25670fa4313ff52b1f655936fc4cd78d2446c7edb50a9274d8888a557962bf3b3f7
SHA5129ba2a0a38a330d40585d69e27b14e3fe5962e60a7620a0e01e5b5a985dd60a3d90db1053698dbd44e1570d66fe70694e3c5989813001a0f061a2f028e3af3cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a78a8324f2ad933f3b60375a5dc11d7
SHA1d0c913e008a8aa52313ec73709739f797a791379
SHA256d4984b3a917b22c6253cdf4b097a6ab59d44f3fd9b4bcbae158443a4569fbbb5
SHA51227292c059e149521634b2d6a5378afbf00a3dda70b28e2bc7134ae0a47ffee9d7fc862501bf96ee12a3247888ea05c72bc6b687b5ac535f2452c64a0e498ecd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e80f8ccc7ed73cd4b4a1ffcb57632a5
SHA15e9875663b731b0dee7540db237c618deb92aed1
SHA256f7df4f029993e75c5fe0ce34a8ab0130d1768524f3f08930889b54f985b17fa5
SHA512196b0fe57a07e034feab269ded6a7ba54e275e0115172845f60189a89915df116db50fbc5bed5d30a158cd105d1586cd8ddeff003f8fbbc24b0bd601e1a15a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80e942d40848bb91809e9af3da9488b
SHA12d30118c093f01cc6d2382185d53c54055bc4c12
SHA256f19c74aefe021b1ba68552198e392b41863ccc53d7272cf4683bd145eaa9b975
SHA512b305b3e34c2e71d4f1f11a150bf06c7fd4df97a94e55cc16868bbbe3d427c955360d278e4b2e8bb10eea74ce51cb0a49326113c4976d3482f0a86ab163506f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4298f3b3d9dce76af40b16acc2a0583
SHA186d410adc2516e16a3d08963075bec408681ccd8
SHA2566328c11f91caac11a6180f9b36e447df0a0a41169e3959dd1eddf2d6cf6bce75
SHA512e681e8d119c53550d2dc656c64798a3e998f017b233f7cc271b176bf01fc7daaa7a8f34ba45863548e0ecc1ce8e07ef2d60e37e20866307d79b4e77680f76355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0e86b838337b9827bec0b5a1817d83
SHA159d379da4b266d92be68b7e0e22318f7d3506a7c
SHA256d5f576ca4b68c761a703d5b98f440690e8258329f9461357a0ff985df08f286c
SHA51297bc52324c6e1f2feb6f66488d83a16ab6dac824995cea7a04ed922825eac77ca145f7d060aa833dc65452f78f92802c91d6c2c9d5ac16eb0ff72bc59f0a2948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32f32efe33f757e7b1ef5c40900cf55
SHA1812f4ac511be9d29e9582e1adcc81558da358279
SHA256e3639d44ac8ba61f1d4ea0f4977eab3ed9b0852bd0a15d90cfc1778cce0634dd
SHA5129bd5cabde80dc8ef491a52458dc069150691a3a6cb067f4078ae94670dca50d46d9aef2511fe325605467f89edf4e2b5f2f70181f46982b023304650d9c48fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57811fa195892be08d6ba50383bbd72e7
SHA12bab5e14d6ffd98c05f7851ce57d7fc99320917c
SHA25696c1e3e98421e343459532b8f3d46e9b90db97f10a351de0189489724ac55d66
SHA5125eaf0a65eca0f768c0d743d0584098f9eedff34b0dfca964211c52f29fbe825abf2de14705e85be456c49a4478516809150b6df17f86acf8bcaf36d310d4a1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d832889b147dd0c07a8e179bf92d6e7
SHA104a832cf476400dd2fec8cf4ec8a46353f6372fd
SHA25631a566be6b8f8caa666a1ae56656f5f2decc78fc1cf544023a8b65d72a934b4a
SHA51268fba3afdccfd70de2d39f7a4f49a7ef04409ebabcc1fbe933911f648150d694036df22fbd38cce53b989beaf84fe47cbadbcf166044c936bbfcd44b41e7499a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a41d68996a249aad2522fd23ad61ae
SHA16bbfa8d55c25d3bc40d78a52395f5d5e99e5144e
SHA256a9b9787ca66e0ec8ddabb6ca667ca7328bc925852062a74ef431f4f41087fbab
SHA51288637938ff4fc4936abcf53963d1bca36018cd9205b546e7016046ccac3e1a67a1ec57db97fb74b857073a123a50bb79ac493d3f243ad14169da5ddc588cec68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580768619cbf523f6b8cd5683051efe73
SHA1184f740a3322328a26637185ec91c4c2cf7f0e1e
SHA256546cb93ab3cb94dabf8c94f40618a39e0f13f088bd3c6bd6c8b7d6332820dba2
SHA51278af971ac21a6356a26fdee54ec4b184a7d3391547faf5aa23b3cb14adb15c0d15a584b0c5da5fce83b5c4710b5eea2f5850068a1b1ae03e30173a17ef78ab1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133af64e04358e4812180e2281af35b3
SHA13c765e2c0978d48434858825a2196a94d4d26a13
SHA256b82b9cfeb6323e60046735e86c543189bb65dcdfdaad3b3c09900a46a2f5b128
SHA512d2317493616a0c37cb62cce46590bea6b8913bfb386eb5de4fb9741771e986fee8d5570d43790d9e874765671840273386985bb72b04e168f15c54c8e38f5eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd15a975e7637dee1e0314f9b9ac38a6
SHA15ce69e2cdd918f282300de57b4e932f76bbf7249
SHA256cd9e502e3bb0a68c34e029ae15d8443ef422c40a37e848f7f5abd6bea3a75224
SHA5125d6586787c6a17921463f4abb2d3e2fe7047dc6b42266b8985d28d117107df6f10ebc1aed6b26bb3126a9fe3e21b2ae4c173ddde715ce33c04fa8a86c3905d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50482fdd6021020c3d06699e0509f6d0d
SHA1cfc74f234c9d2529bd715e8c621cdb5fab9ce0c2
SHA256aea7b1d3fb5fb7bb07409f2226b3de06388945d989829e415183af2ceb0d6716
SHA5121bece3de78eb8c290595b87ae9b95bd6350518eb52c423ec99b2553158b240e7facf63e7fa9c70a27beb8570c38f1ac1e2793c4992d6d8d9904c0eaed58d6e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6b001f26fb84eed6395a602a57a3b1
SHA16716aa2cd3e7ba54a1d7766fec116575381159a4
SHA2561226cf973ab5bc0fef45359b480f74886307b2820d5759d21c56be6206bd6414
SHA512d487374a8c68b2114cd8e0fbd7c5a178adb32cb2132b32ba8196070a820be3983eaaf04deabc5a01aa6d4874d231e11e2fe72e9c4af82d3a31ef71853509c9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b935a6d9ed9d53f3c8e317924b7ffdd3
SHA12fbfaf6bbd635f5ad5702e733f8b0071d3324208
SHA256b2e947d62b6d01b65358a1b9cacf64d97b71f6ce33c04f13b6200dc9269a339a
SHA5128de7f1f9eda4a3cd8f77c0335e878c7d1cf75184c65610defb87b5fbe6f91a11d46c722990955f2507fb3d3a1b8f9f6883dce0403ca668c310981afeddd10d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8dc16b764aabb4b64ca4373b84847b6
SHA1b487bbb00426e0677eca2b7262a020c73853dd84
SHA256a94b687a8ed99ed8699e44de9991ae0eafc0e5ecec298b99d9644f039e5e2b52
SHA512493fa4b629cf9c1781c734ffbccb4ae8432a96f04798462f901745e41e5e0ba8b7a6d38fb5dd414fb068283fc25b24f4a02b31adddaa6a290925bd4c01400b85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b