Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
307c1e2b200fa9675d324393ebdd41a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
307c1e2b200fa9675d324393ebdd41a3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
307c1e2b200fa9675d324393ebdd41a3_JaffaCakes118.html
-
Size
139KB
-
MD5
307c1e2b200fa9675d324393ebdd41a3
-
SHA1
09f982624b3fb30b1464c976718ab0989edfc17d
-
SHA256
4739275605ece61b3434d6fa3a620958f8954835fe411874e95363bd73f1c3f6
-
SHA512
d99bd12c63e2e5deee0d0397ee33f22d5c7e1817bae580216837ebdb9ced2a81e765b456bc5e8253f97f435fe406751bf563102b593f83ff93af39fefb737e27
-
SSDEEP
1536:S+bpSKhTLTeM23lTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:S+bTOyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305bb7cc251bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3897671-8718-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d6d72edc83e5b040ad83f58572e04e536cf6c31fcb7b0a8211e64f3ecc59d32e000000000e80000000020000200000006c6ea77e64a6f654b395da91f0d42377e958518c43a77e13ccab7d6d11e24f64200000002cfa34e5cee80a23e6ac3653f62908dd15d9a78ba9357f490f38c9873124b142400000008f88d8f5b285e859a164139c3d6bd2161ac42a47c0bd3395aaed421b6a6cf340ce77eb2ce8997c2301d31cec767e8e0aef7b4bd8b4f8cc748316da8f6cc2af0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434734431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\307c1e2b200fa9675d324393ebdd41a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578eafb649d393d6cf110c859c4831cf1
SHA1f05287e6ad0e5933d221e5c64f6b4b9efaff7169
SHA2562f43d74a8d6885a5327365775d6054f1f5a532b9c7ab9f4255c38483b4297fba
SHA5124da9409e2f81b138e4b1efa68c2cfaeaa6503cf91dd33fee9bfb76e7a30fb6efed8270bdf2d099d6dc346b2f3e3dc70008e9df3f0640e0ef907e885afc69e55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac2f0ee75774d75fd083f3eb82bdce9
SHA15d9a2928d08c3d0d1f86b6d0e2167461e95f715e
SHA256b36691ce1da600350091116ee94e383297204f577f945f9c3e60252c99da60c1
SHA512f79c72e802ee3e26b9aade20bc2d1472900974e5628061c7909a685fe01a8180b45d4245557ae19d417ff2bc870c04c82af87961d33db556fe199a35e3b63d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ccce345c4bfdc27db6634107c03bac4
SHA1434da01a0b044f48c6566160478ca2d6bc58a840
SHA256d6aff1b9283478bce2a82dda965c6de0679bf3d2bacd9ad921958a1b340c244f
SHA51268433ea1a123a8c7a75c8ae721855bb8c4bc27d36f4b6fc8954be425d3b53145eb226569e75d97cd30fecd6184d9e5b2afcf3f91988d58103fb24dc08c09ef3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fae455f25220ae689581960fad72ea1
SHA192f1d412f7fea2007cc44789980138f199509c17
SHA2561d2cf233cf8b3d0e4f09f33f3a87a219dadac7e4998cc9b7a7655c0f215a40ba
SHA512b46619eddd842c0e80c48486cab850b07429f6aacf07f85bfed5bfb17c4cdf259aaac1b7f33e641c50ec395e6cc8c96d0b6afd0da5c3bf91c465e44aaa8e1c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2c530d4540933132e3ef12ab0a6506
SHA1b6b29e37142186421509481a15dbf0ae010e3d41
SHA2560bd0aa4c3a7372a4be5edc0bf1951e547a44a255ce2702640a37fd042d77c50f
SHA512085a5dd46b46d3f04c713239d9a536c7ca49a3570995d211acb4b362995c3cd5a1eed598b3d74086ab30211b91444e0bf14bdc128d147b501498c8f4842a707d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597504766537967ab2e2990c05d30d55c
SHA15555c185ea8523d2d1509b84d14b3d15762af9e1
SHA256d06083ea0be2fec4494c9fdb3e0719fd738328f883c9bdd2a33a365af029b7a9
SHA512528987221c068d5e60cc878c9de76d96ef3c684b83688fdb454d241bd6f842d4dba8b22f65698dfafb1e65dce4e7c011a6ab4cb5081d076055678aaa562ef681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620d85c822a2c6be3959381e7606aa44
SHA10cc58bf400dc56208cf68aa1a06a462bf6f52173
SHA256118a2190e277e139ed95714855a258a261cbd200529d6920d7fddcf916aee7cf
SHA51213b6c5da5474debec900576e047af40d90a52778a28b6a3dcac750ea2abd325a9c2e48765970af61846ec32954aada2db8df224903fafde0da492abcb4208053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66fda04266b13d9940c4b7ec6c9cfb2
SHA124c4f551d60ab99f6ff7561377889e80f68abc12
SHA256b0155fcf5dd2105218f617a809440f5602ef510b3a83eb859afd05a5079bb3f7
SHA5121853c1fa9630bd4b06fdc83d7e701a48f40ea7a8014c9bae89ab8929a1ca154ecc4e0f52edbb4874b376a7ad3025d38f9c2987e65bb0cb96b3dbc85bab9dafe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcce62c8729d1defe01654c493c2d07
SHA13d0eafa761234ba999e3a9df56c10607c4516d45
SHA256f991e50e6813da9792e24e2eaabb5cb01cc3bec3320fd82f51f734b645b8aafd
SHA512a7ecaae6969372a2b74f1493881437a9d9534b6dec6b9ca31fe8eec7100b93be6690705a1176b943303ee7e51235f0272f409fa5c980167f5462ecaabc4d5035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2600953793a0f5a7f219467b0b4125
SHA1a713845c8ba68931676e6ddd8383cb2fb9244532
SHA2560be2ba2dbd0665c9601621b031d1472a23d5ffeb04f08265bda5aae84938f502
SHA5126c7e2cad9fbd2a2515161048604f6dc1162f0613b094ab01e36284cd51588959967d0027f759e86c9f4186164f10c188b623fb26d5a335c036e58355fa1ddf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a678b2c418737907ef5bfba5780a0fd2
SHA1184a5df24d473e4aee452c1119217334f4c013e1
SHA2563b96d2aa740821c243f759d5245de7b8b6294eaef240c5953bda9e811299a3c4
SHA51234c9768bb2deb063ce47c5e931da225440eb560a8c09eb7ff62d2876b0bad007c4aa543b21f0c557145782ecab7d88db94d4ab524370021d1f830d870462f405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f47b6693cab3bcf9ab1b989f67822bb
SHA1e781fedf828d1312ed2e494c796b6a3f6e945e26
SHA2563f59dffbd76e9326749c08f375185c5236e5bf8c2a8a79a1c998008d2fb9a5fe
SHA512fbb2b8aa743e4c1fd94aa2dd56ce8399e9fe04655aabb9bd2181cda6a38e29c5f8ec8e74812506f578b5f0dc2a61d062401da42d117b29de30ed46c23aa5250e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3bdcc396ffce8a919870f807b2a9c3
SHA173ed78d003c8d8351ed463df36bbb22f98be08e5
SHA256084779abfa90e1259cfd336ba2f18f93a6089f30c692e7168c2659c5b3e629d0
SHA512e87bfca23567bb718208c7092282dccccded8654eba8b014ce8963a6d171d5901a229918c1d071dc8e980f82866ee40809317cd093e39cdb36751e04677355e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064634e1b4920e750957b3fc4a59eeb5
SHA1f49683400e42d628453f7e8c7e26d4e719b8226f
SHA2561ed98aad8bf955b7476e542e9f682ec0175c3b9b1d9ee30430b5e367feed1a4a
SHA5127bc1af1e1f3cabc5d15030a6cc21413cb43a327d8c3324bf0b9ab70523ccdab717c253d16fb1b05e763a036b8e74430da32545bf2eab83b95f278e87be5ada16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906c9cff8a0275ada014643995cd601b
SHA1e0333e0147cc64738907a7058621d824489a0ff5
SHA256fa10a7fbaf79ba358ffe25285cf9aadc193d980e1e63766d37b1d0a519fcae16
SHA5129cecca32075765821f15915ef2695be2969e0f968172ba15d0174121e604348b9f74249b9ac18f7547a9facbdbb6182cb9f392f12fa3d4848009a606db6a8aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d63de32d8fe725d7cfdd5bc1f9a1c51
SHA103f9528431686ea063b5c31dae23dd271ecbbd38
SHA256d94a49e4e26973750f0fff66215106efcfe55a006e0f7287293645eeadfb247b
SHA5124669661d4bcc369beb8c5634876ac089fb9cc5166c560492acba90e210e92088ca3e46c1b6b104b78043fdae0d19a6174b55fd7738a0ca47b786a6c0633763ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8978a5f848c2529f1bd77ee921fdc38
SHA132d4c2af87d9585e7f90e5136d81ad69d12f6d40
SHA25643c0349c95ce82c5d568fd95f2625c1deeb644693e05277214ac24af01d47e39
SHA5126ed6098cc62f13fb0d3462884849110f3ce63c34a72399643b411b2f1a30351ce82fb90561dd5ab6bd97bd62df12510c7100c7722f29416cbfac2a140f2b1307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50131cee91c5d80fc58f2514b187a737c
SHA1b6057a98cc3fc94339fa1031f2ae47e97847bc0e
SHA256be1ccf903e0b8ff250f2c719b655c18acdf33e265f846b8a753d85dec5327e4a
SHA5121ed624ee7066200e97cd7ac608a1747b07a875d0c07bd4538df289274160ccf87bd31e9b67ae1682e0d035d5edbb794bb0144f3b091b84739a58d387830e5a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1936dbbc56ec3101ed9ea1e35e8ff55
SHA174690bd80f681b23e866ece223cc976ba85f26a6
SHA256d814d1adc8a79bd62cc2feb394ea4047845e1432bfb9604eff0ada05bb70c54d
SHA512dff28ec17620d1ab386db7b377fb2ea5b0f869164c8f8454b0921af904251cc02952f787a0ffcd905eb1f1b4b3a1a4370c6b6c03dc2b0b1cbcee264e5a1edd41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b