Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
27c6e3b5bc4a27eac76de47bea13caa5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27c6e3b5bc4a27eac76de47bea13caa5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27c6e3b5bc4a27eac76de47bea13caa5_JaffaCakes118.html
-
Size
53KB
-
MD5
27c6e3b5bc4a27eac76de47bea13caa5
-
SHA1
d3eefb5858e7238423c41b6b31682330c1346a42
-
SHA256
baf1759efaf44edba7632522f01099dfd4397023debaaae229cd22a3bd9f1c0e
-
SHA512
02c80edbea5496de0996cb85443b1950de6603006d3aa7c9b385f7926ec48f0ac38be883a03364650c9d60eb1f5d29fcf04ddae149087fb1357613dbff2ed1e8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYQ63Nj+q5Vy0R0w2AzTICbbqoh/t9M/dNwIUTDmDV:CkgUiIakTqGivi+PyUfrunlYQ63Nj+qm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434621287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c5b79d6fe370dc4118093cbd98871056a451995d10415a4cab992d4ab60d4f63000000000e800000000200002000000019151c74e55b695637a619296e1f91aed1aa1ecf9a4a905a3b6d41ad3b177b35200000005aec09539ffcb889f774b5f47aa1a3436eb99342b52a06387eeeca73aa853d1b40000000baf979dfd76614b2261b067a9de20973e5c4f5f4ee0c983d85c732e544907af419945e5abfb817d5e6cffe8b245a8966391f5e7c21201609e5e627a669da2815 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1008552d1e1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{447F3C91-8611-11EF-81B8-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2372 3024 iexplore.exe 30 PID 3024 wrote to memory of 2372 3024 iexplore.exe 30 PID 3024 wrote to memory of 2372 3024 iexplore.exe 30 PID 3024 wrote to memory of 2372 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27c6e3b5bc4a27eac76de47bea13caa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bef3368b01ceeffcaf10aa33e40b094
SHA1036a659fd69e9f890c573705bf9f07ce0da362aa
SHA256f3e953caa906b1fb2da8188888e0bd8794bfd5fe8f6b41cbb059f3ae7263a42e
SHA512ca97cc8589f79899d9c1422c3e6764bb92c85fb3389aae201e483df603204417f7f586178e4f49b736f923a5fb5cb40166dd369ed0e301e34a5c3f3b957a8a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c98f859fa993088dc7c25288578bacf
SHA148416c7238f7034ee421aa4248b8ff04064c8c76
SHA2561c3215f018bebe918c16e9d459a1fc8caea1ef4080797428c16d4190a8417c31
SHA512277072cfbba8132b2dc579e2fadf7ae7d8e43767b4ac28718b9d01aabf659526a077d19f86f1870cf3b4239d4c77a6913ebc0495e34a97c82174c6d338994744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ba5e5d8486e9d868023019258c7610
SHA10963c85ed05bf96c3b37d58a8fd19504be831f9a
SHA2560e5f99df3b37b7c2e2361b7d89db7e9458a18a7a57ddbd1fd9ee6f2a914ec9fc
SHA5120d618a2cd4e7e13f7da3962d7102990f0fd96bb10baff16926395997a3edaf1a42543e36294146ce1370af75db6e6ccda9345d5d7ba4861e59c50b2aa6f654fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab850b51af840d28a2c6de35db5f1312
SHA1b4ca36fd6f9f5afa32357625c7215999c3524374
SHA2567f5bf592f92f2a5d8346c6c07f8fcdcae6d0a0b5a643fc90e4cd7b2f2fdbb54a
SHA51206ea48445958dfab34b89f6d6e985a699246e07f43b54e5a6f685047a9853e469b1974999e8355a5b25858e9c4c9227f1a6eb994cc8478218159465284dc6a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1546b15ddbf63970f53aa262e2dd181
SHA1f8f0425765db5e085a9d66c42442fb1e4bfd9526
SHA25667abcb412521330691a4a4fab3eb0b8fb15f4212b9390b63a5c24d71228e08bf
SHA512c78514d457c551155db73075146c5ad1dbe8e3681c66b2bd75585420f753600d07ebad8e102a673b3998f9344e3032f15ce74771ff50539ab2bae5e461fe0ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52807f5e5b4d6ff0d9a904f8e07295d88
SHA1318c4a18fd8c42f981ad37a61bd9558f9f95da53
SHA256d9dd3a0ec8121e88b72ee547b8be53a67fe5aaa7617bcbfa1d53129421d06841
SHA5120972fffd49a3c5e117a0b5b67238fbc45aaac6b6ac9cd8f08ece33e9c67c7a16d407ab9d11478736491d0313dbad41481df3b812acd35e1aa72288b943f3177c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dfc02ca22eff5adec2cce7cc18b0ed
SHA1c9cca8a2f38f6dcb52841dce25b6e699e4bef200
SHA2564f7e45bffbdf93ce893899b96d3c2b9b01753239df33dc7375ddecb0d380667f
SHA5128db4c1a0f9d39a5c05590bd6bf35b306f9ed227c267f65e895831166b00f27d0214cd550b9d7cdb93a6c3b33fed1e6a17878335dc606e6f01871ba0725d81497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d48ee326706d660db2a3fcae55547e6
SHA1a165904e75299c21990295177a4d6d8afb9c4bd1
SHA256ac38592e6a8dce1073f327932b0be0d5a9a81f40c1993165e65eafa3ad7d2f12
SHA51284363c061d6936615f6474f8919ed23470f25003989394f460362a05ee4b7da0bf21e24b1332ef978a595a42b4ff3c4f08478face26b8fcd06fd097ce60d3b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ef941e7ad44dc0ed74f9bc7231c69e
SHA1f7d1ec2f8577cd84172b8b5c2ee9ad49d5aec992
SHA2563f11be3e74bf5f1e2423b4f87c6c0dc201c2626ca268cb0f0d5fbde0a4376c67
SHA512a6374d3029ecfe783739d2c56fe4e89165c0888b74aa6394e31678a295014b0603242c72ce3c387e7ce85f54bb48250ad721f95537dfd65ef0bf897c39363325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fdbf4f20535a180ca498c8825cc5abe
SHA1ae9ae95f2a03c6b2c0b8d294d04cc007cbe9e233
SHA256a5e8de73c2d84de89a5611f0d0e7aff9e819b3caae357d375fe434e7eda8c1e7
SHA512b9667c23568bb179b8e175b192992430874644d8f09e269860c246c13b33c5cceb273d71a48ae7c9cc23aaf3f9dcf395494ed83acd1e28aeb2c1018c9b8d713a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c934a76d542a585b8e920a9ffd8c64de
SHA19a78ae6f24f94a9439b1245e4feecdce3191ddd6
SHA2562a406c6eb26bc59fb421d8a15f595a88a3533af5438e305b190ea765d3a22df3
SHA512fa56ec1e018d88b67f46d56586ba63921489986388e663930e06fc840c91fbf14df9f1b82e2f61ae883a66a4fbedadb0a4e7ae907c4c83b80c5c60dfd70ae441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573afdb20048c8aedb430aca00a1b1b8
SHA1e0903992722f79f376bb3cb39e6a5190247d5cec
SHA256949b8d5065b3f374de89f4342c4bf31ac67c70d2d4639a61d771dd8c7a365644
SHA5125e8d28f689bb4f4cbd55c97f8d4291458896f1743de46b039aaf0ba103d71c8961eb5735ca3178096275ca35c590eec10e9888286244e7ac95302689b35d6eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297460396cc76a5485eda81966fdc219
SHA12dd2d84120134dcfa20fcebe5b03627ba9866b3e
SHA256e7dab3bdbbcdcf3fde99c75a69fa5ab5be10e90c7d54a4462bbdf691070338b8
SHA5125a194007e43e59d3b02812e1e2decb32dbfcf3654c47cd1a4cc10b26042df8a9fdc8ddeccddcae617f818f44e10ff1acb0a90902fee29068e095bd6a2a2cc203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3397f45ad6016709814ac714260b5b
SHA13d28382749c6f9126183f44b78c6ee1827517337
SHA25629f212c501c639569db0e854f8f40c84b128c00d6b3087c5361e45e10b9ce1fd
SHA512b53c59a48ec30b6d759f4d3634f18bdd165765c09efdbb190e4ee79036f5a91cb179a6848ad6682b768f1683f25a44fa36d26b47d21ea8dba6be4df1a85ccbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5039ba078a974e5ca24e4f36a9783d
SHA1a0c6859556640a8aa1b2c66c8b07581ba61c061b
SHA2569360814d296bdaddf028f983b508201672cb4d21950d960d9973440e41f197a0
SHA5123e4714d988dcf6ea94f41bb4d4fd6c58849dce6ac917ea062a822bf9994552e0539537a3af61581e08ca764a005ce1e92f516f54449ca0caa515f8f45942252b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9c896de1873679c3277cda7d4b250b
SHA1f9f73a9d0805ab1f7ba44b0b5fdc9c5e725e616e
SHA2561eb7b417b189874538e6937188a74446bc659e5d6b49048bf9ab28f400ec0c90
SHA512f5e84d37b7636e4d45922d26163eb519af5006460f259ea776b55995f91f90ca282ab08b561a07a1d03fcfcc8d7ad12c7f2c72f6b4384c44d53262b141a59ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57034bd8d4b7039cf93a9fd36a44cd214
SHA106c350d6f7ac76d31624845700712e51837afe21
SHA256651f8a0cc213f00e1a804e8f92f4cf8930adfcdb4aca018b759d47b6dc865f2a
SHA5125ee8043fb17b00a3606412f0350747e8f93b6867bf8fef0e1e3d436ac07a5f7ee071c01b293661c550ac6fe88a0d7f52c3e62e79159b6bc6f2b56edf2d210154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db020779ca679b6948e5cb177594cbe3
SHA1e46b13a178d7da8d132cf17e5b2383778275117f
SHA2563bd66aea504f0177d87493f2c83ce3d8d1d878c9fe47abbe86d0376731bd0da0
SHA51235528002d220249d4dae08d75b1c37c017e54b49d7d109f86ca7a6ba2ff7c61288712945c208eacac569890eb584e545ced6c1c9bcb7bf1e5ff0270794c2ec99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043cf5673b61d8b34027f43e6f7246d5
SHA1b67564cf935af0a7e9eb4ca49ba7d4a725aa9955
SHA25630711a3f0f5f17fea8199916adc7e3dac7793ff7f87a5784ead42a00d79118fb
SHA5126d9510d1877b3f89858c32915db9d504781c13743fdf6004ecbc44f29d4a1633a839e78db8e5c1ac8af2ed7bc3bfeeaeb7fcb32ab6e60540474474d232788ff7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b