Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
154d5e92d785a74acc8da21167f02570_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
154d5e92d785a74acc8da21167f02570_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
154d5e92d785a74acc8da21167f02570_JaffaCakes118.html
-
Size
3KB
-
MD5
154d5e92d785a74acc8da21167f02570
-
SHA1
6420014c6c14d90399ee6e97acc67b96dea55f0c
-
SHA256
611df3608b50661957d7c634e01b32ff62db2b189b39201e56f0f78ce4644fc4
-
SHA512
ba5fbda1933f714bcc3392782c356ffd1586bd6d2f69dd35333d3f43a3959a0def9a8b196108962df7d8ef31780d0b12960fe38ff865386ef0f08d0a4cb8b1c6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900e0c0cb516db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434246312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35EFB811-82A8-11EF-8673-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e92bf7311a1555f0b94583e4e9986b929a7ab3c6756956388cbda1a2f031d95b000000000e80000000020000200000000eb5820abcb7ecad7e45b32016c7659ebb988ac069621c6ce6e1a180854b3f0420000000e74ba0f203c2f7a2a1a614a655791450d83de5c11fa81821cf5182e5f79c6fd44000000010dc19ea01029d2e62d61cfe47d1fdf59dbb2aa0bcf291660900425e975a206b1100766c0cc305c5a9d7e11350f4f466469ee2a0f0391f7ef4379727f5bc06f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1860 2136 iexplore.exe 30 PID 2136 wrote to memory of 1860 2136 iexplore.exe 30 PID 2136 wrote to memory of 1860 2136 iexplore.exe 30 PID 2136 wrote to memory of 1860 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\154d5e92d785a74acc8da21167f02570_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea4b5e3b17d74552ff49078ed562a82
SHA146b7cc2b843bf5c23e54848cd0a6d2f815df9881
SHA2560776afafa323c4eb0f681842f4ead78635b0a4468d2df19b63277c1b9d2df6b3
SHA5124c9d810eea9553517ed1c45a7ed69dfb570c9c510b3a9191a7dc4da8a1012c414b3789f6844d52b327c2886fb7c29d0436bca59b74dbc3f21d88cfe88d4e9723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59018ac03280d25dac5b66220feecda47
SHA1e6d9555a258cfe8aad4d643e748ce8c8b2357b2e
SHA2565d302db786a6b7997d286df667f19ec95de703027e90accc1419c9dfbf8f5a01
SHA512d8eebbd1c36358d02608c3e6edba18497c4dc688758b14220c422dae2e5979e0ba8fd3f18df9ecf667ab7c782c960da2bac3fc6528cba56774cc805463a9c338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6fa61be7f94095255d847b4d16630b
SHA1a233fe4b44f1758649778d427b4cbdcd53e5451c
SHA2560b00c086b9a5fb56ba9ca456c8a13d97cd47f041326c3deba2ae244d53a86ed7
SHA512ef2350221797baa708de13f9256f84ce9c6278159ee39e4075823bfbd377a55aae756604294c9889988dcaa49d6befb12e2a25a0fb14e11f398a78b37fdc23b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a68bee19f56d11eb300761c8e1f2ac
SHA1cb3c916bc856913f05ca4527c4b9ef0b666ac02a
SHA2566271ee744e1e8c888d2487125b9e01ce2c6a3d12d075bc2a61d4b3278a4296ea
SHA5128783ea9277c15562e6c87d2a260c9d340730ae74f13479ba93eae974135582f21119de9cee3f1a781a5b6ad0b3e59661d0c25264f15674297bf959b015f2c294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541813e1b86ad3c112c4d38c352038c92
SHA12a05028ec197109f8d235343b3fbe0c377725a17
SHA25681802b03bb4a2c08f47e9afe14cc61443376cf3dce1ac5cfdf77107147ee0a2a
SHA512de5796372b765ec35fc8c76e18a51217e96fe2a66e9ac8d1292ee68ea2240742ab42996af8977660f2a261972abd5a5b1642447d1fa6e931a4f19bef2e08b07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7124e79e8e90735db4e8c83e170dc4
SHA19ca671894ac906304d994a57895800ffe6ca5d8c
SHA2568fb65c0b27c151e2fb0356400ad627ab7c2801b5af6917ddbab84f1d1d2d62ea
SHA5126d170e2e6bc9687f79426f96cf9b4beb4d002e9297b39019f9e960cbae7c790b19302806d78ee61010efe495fdc81b8c29f886c0c39216956c129462c667f7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812f27359705f15f7c491685b9d32e85
SHA1886ab701f1d095503039015313e64efdb69fd2b2
SHA25615fb148bde8f41eea20fc98380a49a56450721959966e69376db45ac09f40564
SHA5123161ff91789e27882fa3340be605f40b19dd3be393c511c92e9bec33cf58c686387864e8f06f4f7eb7ba7abca73bc1435dd8af70c96b4c91bcbded843e63a687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5c9ad5624261262f929e4c8179af42
SHA1fa11f6491495c86cd3b93ad4f7c008320bafc5db
SHA256067120c071817baeef1b581d1090262b980a154812f638725b3b2f6d65012d24
SHA5123790626e71338a79cb23c252d5d2fd77452732843474fb95098c5fbdb5498191b69d01de0ab852492818460359903d2cb4c6b034f74db467b424d540129baddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0e47c792ae38b124b63f2a45209e09
SHA1e82ee43025e90afb5485457ee9afdede64f797ea
SHA256d684fe3afcacaab13014a2621946dcea6a666575036d43976f9df9b8d9eadcbb
SHA512001642a997aecf94fb73e6e4759038e96df07316c22b262004644a6a426c45ef330dfa67572cbc9ae73e4d150afc76954d13faf3813dd9ded48d50725cc01e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdb6bb302336f95954e75a5a204fb12
SHA1a7b6995a12ab222c32507f424c155df16c9602e0
SHA2566ef1bc232631269af666b07b4d0846346dc50844f154aec6e66dabd86e31c24f
SHA51222eab52d8db7e7bd1cad5306563e278ef16cc8082f34831d4b3c4ae5f1dae09b7cdecc0606ccc039786ff931dceec1c3a5bab9a435ff757590a48015deaecf21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b30a7f8ae7a94b379f40bf710b26d9a
SHA12938e8d845d5df62cdfbe3a613b0926bffac2774
SHA25677083cf740a278cb46fddd693a9b3630e8d958ef8674a32bff21e205fc0f2dcc
SHA5126717ac5239655eef8218c762fbccbf6e809df5ed0cd67ab346466f0a8cf8d0e45dbb460b1decb65b5c75af3dbc34ff0cfbd6e347a54b5c59b2944ac4c2672c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5fd02c321a53a8a29b16cab85020d7
SHA112f007d7d8ea54eed5481da40696fee936daea09
SHA2561cba2ac05ee9ebe1e5817e763e9eefd80a47864b81172706ec6eea182bf47ecb
SHA512116dd291acc62f42b6059fa0278d74aaa795b35afb657b31d94c7c7329ee2bf81203c1c4378759060cfba030b0f668e184491b83c172ce5f83b78186c688230d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575816c61b2204ec9a466a095a8cdd646
SHA14b4c9dc7715edc5b72d48446a16da5d8630ede4b
SHA2567b4febdde50aee704392c1a335bb560ae41aa944dc390e523569029ff97aa4ca
SHA5127157a73d1319bf5b03c5b4ab5d394d91558afb177fd6b9ba5d2ae2c17e6741a72ef53c04bb1bb7a5c8c2c0d9367369bec5e00a5e60243e5046b552dac155c5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f19d1202919a8a81125eceed641894
SHA1f2e7a077804b528249ca4216f82d4152809d95e1
SHA256c1ae6c16bf1fc76f91cb99da62693abe506854aae69855a55973a541eb3ab427
SHA512f329549fd437f7d826562c47be7dc5b2f76af1ef21cd4f4e7c970966e41dcd7562de8cc299e57a5ffd1264557f6fa5c4478189cc89dc8fb40a453a1b0615f5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512193cd6a8c7fe4882624b0c8e48a04a
SHA1666449d8acc623c76799b8b6b8f3d388c46cd55d
SHA2569a7bfb47d4ed19c0650b181d8f5a998c06aaa285d0cae53c633a423f37157453
SHA51260a4c9c1707e3da501cda44663608ab17d9faf025e52d6fa1c1e8cf8e61c7a9f963a7ed8da98e8765c452c4c0604ec94f35bbbb82e1d589ee2281e681174e7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a394120b9a60b90bf2b33cd3f912286
SHA1249ac20b64a0d0413025c5b1438e724f1709f88d
SHA25666a29a780b62332647c35c074787734b55ed691e03408fa20f56f29d16bd9c97
SHA512b9455566379a8d17e1041983aefd27e87b0df8886a4f0db384fa8e1715d721746af27f8391f4d59c68cfa08ca2569f07ad344a772ce9356ce055629fbc61cfb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff1880f9786ddfe0cdffc15caf9faa1
SHA180c3e075f28f834d1fe8409dfe2a8a6c8b34afde
SHA256fd4977d901f27801992d8b7a5f83d31ea7543b68d3aa80749aa4624b60017480
SHA5122c8115acd29c5db9735e1726cb27e75a432c7b953576ca02bad055939f84b3ea6f7da43ab438cb3f7f9b08fdc93adc03fb2b5a1e02f2d7c3dcffd56af7d8c42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153f5c1e726cfd7192be28e2f731abd9
SHA160fd07d5ff92d08a1cfc6432bbe852c3a60b21b8
SHA256c1a18391e9061a2761ce9a8e3298362e929d7b7d50858289a76701e4853c7bf9
SHA5123648eaba7dd37567f56850d9ab8a90ea783796691833b44da32036f8f76b4c92b85f8d52b1959083e05ad81842620420efe8730cbd017c6e7d831d103f247164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc7c98418c8fcdbd279204da4a4863f
SHA15b090ff13f6945917325b5f37dfa227d4e4a04f8
SHA256e623de0eb2011d4b82342d456075c460e4336e90aee1079e471c7b62de33e5cf
SHA512d4f2375529470feb4f84cf794e6a6734c1e2fce74811b7f84053b2ae9d983ca3c2b6c2493aed276b748c464c15d0c7bbae5e067b190214f6c56826bbb63b1901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7f0c38c848cc6317c736735ab844c8
SHA112287fa7bbaa975aad9d56fdb430afdd5c10e72c
SHA25691140fdd6ec8b978ce002fd8628a6d9ace0f85a6efe3ed3eb5fdff3de22510fc
SHA512099d42f5ed4278a021852c83e90e842e79d5797aa92ae58d1960272401f573120311dc80b822299a7b714346d8ec7b366ae07ca4545fb9a43d3affd87c7ad650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528ea74e050a97945fa04f68af046231
SHA1dea7a04cba8a008b68a7d4d7a88d21305260ca05
SHA256c62d5c746a6fa364fd07f3e98583c1867235dd20500b32afa5edc474db6d40f0
SHA51276f10e49525ef37d9bb0156140d054e52b46c3e9a3963fe5d08c9acd27468e990c7408645c1e366fd2acfd5abb3f66de8f99e44cc4b6dfdf9567ab7cfa3664fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b