Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
53348c9978f2cc7f52b9f668cfa0ab7e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53348c9978f2cc7f52b9f668cfa0ab7e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53348c9978f2cc7f52b9f668cfa0ab7e_JaffaCakes118.html
-
Size
53KB
-
MD5
53348c9978f2cc7f52b9f668cfa0ab7e
-
SHA1
2aee23be67556575ad43d30706283071905172ec
-
SHA256
752c0e13aa3812307184c2c62f7ab45fb42923e708db86b161838a594e323817
-
SHA512
e242895fdea22a8c567dfd2072d87c7457fbe73fff3ac96047715dc3a1a965789072d63568b08d3a21fd0803661d9b84d25b1f7d4b2e2b4e5d3ac8d8a0f1fd03
-
SSDEEP
1536:CkgUiIakTqGivi+PyU6runlYh63Nj+q5Vy0R0w2AzTICbbDom/t9M/dNwIUTDmDk:CkgUiIakTqGivi+PyU6runlYh63Nj+qJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435353439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000c3f57574d77497c00eab01874131cbd866a402ff04097e3c6bb6446e51fa5643000000000e8000000002000020000000f6662ab0d889c510c62b96d3db7c915c44ce168fc21d286209cb9be45331fbc5200000007b34d907fcf2a9d199b96424843ec2082832164f5fe1b58c67805739abfafaa040000000fed6d848ff9fe2fdc209c288e4ccdbaf94c3dfb60a8d28230c25b767b634c2acb4e1caf59b80688d987f8d8e57a4251015a4a7fe08f8594fdaa23f21253db058 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c6d4c9c620db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F11B7E61-8CB9-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1992 2532 iexplore.exe 30 PID 2532 wrote to memory of 1992 2532 iexplore.exe 30 PID 2532 wrote to memory of 1992 2532 iexplore.exe 30 PID 2532 wrote to memory of 1992 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53348c9978f2cc7f52b9f668cfa0ab7e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843b049a971f85e47f48e486f5c0d97f
SHA1299ce2560c2fa54a536989cf19dbaf857e27cbe1
SHA2566b1802b96fd1b24687a6bc833d3e0da3d41adfe2af1019ca2d01a3933bd2ac69
SHA51250eac28cf2e9ca1a752e6511b26c526dae6a22979fcf52fbcf42408d7b79e3abb07741721369e930535ecf7cefbffdbbc234fc1cbb0f3bff3f7c44533c158e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad4de02b5d73f3dc9fb78caa196a2f5
SHA1a6149d2b051601de7eac5a09aa0afb5b7f814600
SHA256135351027c51ad97f836724ac3498a80aef5f87d0c27ec12ab0ef778ab25f3e3
SHA51229fdbe4f60b5253f3324baa471790ad9e9affb39d4e026a5bfa43c084bfe6b03c1d3efbfdb00d885206cfb536b440aa16709f535b69943b83fe2d7d8f402fe9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f06cb8622b463ef3171b821b79b3c07
SHA1637f2f6af633dad60cd0fd18b58bad101234e6de
SHA256b8682bfb6ee325370aa77949c89fb6409f202ed4d2471eadb0c970520a3cf86e
SHA5128f4af9aa22740bd595e851173a9abb567e274c4772267338783a2eb930bb3e1e3a7214b7d375ce6668df736eeb55e93c31343bcbb5f0adea14c34385b03c349b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4fe71449402ece99a854c58f8c1a501
SHA15adaf53b3f016bf3c8563971ee37a7655b40de44
SHA2563b7f0a963800015e89b71be0356a5f5402835ad9c088b97d6cf0617cd7117a5f
SHA512cfc15df5359f7d0d84b92934d975ab24df75ecf69893969abfc24b840f454befae0ce33e40dc22823ed706cdc355ab60c749dc1474b1f733cf8eb0b26bf5fb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6843aee75c57b884ec33fdcfcb3952
SHA199de2f38a16a580b429d0a63a73ce86a95d43fa4
SHA25674752226427ffbdef168f096ac8aa874e92d622b006434d718ad04e4e6043718
SHA512dc215b4bfade884c448a7aa84816cf5b235e16028476bbd782eed305231ac23ca77fe1fc80a607a91fca6a2830f27e9cc78e0e3e6cbe90c1b0cb62185e45a696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268f85a28bb4e2f48bd16fff7cfc76e4
SHA164a1c4b335353a14c6ec304dac750e38bcf4e5cc
SHA256851686b46f2f1081a8977f9ebdff1028376a5a494d75f8eb05ceac4c91bb1722
SHA5128ebdb84addb2c482fa444e923ea93535cb3f3adcd64a9eb9931e8349e5fbf617a39bbc9ea64a54a041ab12c1f4bdca1a884a10ebfd866c98dad15130585beb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589298e8d978aa6e1147b8080eddb6f03
SHA154cd4a18ceb3e2830b9767919ead592adf50f663
SHA256560ced1bd35fbe5f1b5fbb1de514d45c21023891b916caf144d6359517db0922
SHA5127920491969cbccc404c69506ebf0d7b573ffceccd0686a837dc8428071849683428ebde848fd6f691ba3c034e19fec5143db5116315fd10d045d122c79676ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f22819255446d853f4afae06c8ae57
SHA1c1df09271265bbd083181ce5b5bef1f8c50dcd12
SHA256d00b682571facef2d615a1a7fe5fcb47fb069d4cc26e2f2705038d6d5c8368ad
SHA512eb40ba0faf42c7cef69e0ae7b10c17a1472cf618bfd49ac5426fd6801a3f77b50e1caa32ad31efc806f7cce67629fdae6aeb08fc172da213c825f7b186a8d455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef789c540d8a20eb45a501777ebbd5a
SHA199d9b1b3142fb093c1ed9a7701b35517f25ba650
SHA2564b303cb5f463d492cc804f6d4450a9d88f4541a26b6302759783cd7c3d8a5430
SHA512fc42fed3df0183f019a0313f5d33d736a755cd24e9d56a43d0620b32453c001837299780b6c5ea4b458f2ca5dc7af9eb55cb1623b080d64f9314ef33e9dc7614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7aafbbb385880784f8c4f91f1a62656
SHA107da6f3dab45a6d3a1c007d079127f0afe413506
SHA2566ffa6cf76453913602fc4940f17945f54f19c6c68164a18d4f2e376059e1465f
SHA512c3b703c9bb13117a1e24ac9cb191678b2b07cd4fa42541f93da30473e1e8aa3551afdc783f46fe6ee624579fd16f87bf194ac9b9ea8ed31221ff4800c337ab13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d64ebdbf1f816d8196310882d90cb98
SHA1babccbbac5a866bc712efd33872077ea9c841bf1
SHA256a00db8b03c593d3c396427a2f5ed4d1a733ba869ad59e9632019cc9be186a528
SHA512b11e4d87df5bf1ffca2f7508a53df1ca20d392cdaf671af057c48a55e4c10b5078b23d4e04bbcbb6d90112ae8dfb60e88990326d41138639903cf1e808269656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d8a7f4a88d14537007eddab2e81e75
SHA1625c22984b6b2005b3a4225fedb49b532c0d37fb
SHA2567950677dc7885fee2ac0de9c2ab2b4307933117c4851c13c3da2b3cf2d7aaa8d
SHA5121f18d49829b2653b762dda5beb58ebfac8e316eef56cd602c39fbfee32fcb5f8705a379ae54b2ea9c3961d05baee4f483c2a7cb8d971f47624df98c4e9133b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf07952de1a128e4e44b01b665feee61
SHA12c3b9a9095156d2de7b4ac03e3a1801e7147d740
SHA256f5c0824d4fcd76feeb49ffd94ae900b6508e532911d01e01c016e00906ed3cd4
SHA51218e0043a455312d425a11ec7d004a59821d7dfec9ffe3c98ad1fc7d8b600ff428f2072c1ed35e3f5fa490bc21fe280ebf8201384b3f4a9072441db6593f0c1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554943b8e0db7793a743ae4739be43315
SHA125619e2e087f0fc35d1105cfa7e6e19c8c39692c
SHA25645ad3a09100907656344458beb6516a352feebc09f8b8e0b59ae31e07a3ae326
SHA51289691eeb7b802ef4527513e56de6d8355bfc741f6f37e8765d4e8d7c85de44e1d7cc959cbbec6a7a1127e7403d44d057712ad2e651ee47442b189ebbb21a8835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9f1ca0dc7d56679a51b3a9d3e1e6d0
SHA164e42443183b70d1cbd097e136508bbfd604eaa4
SHA256e3177ddbcf3168c0dc3dccea498c8b365402729241833ba6e5f6377382c8efc6
SHA51295182bfcc852f9ef9fe6d2a7a6418b095222e205ccae31ea0ae5fab26498c6f93c314c9b2ea7b0a4989cb295f17a8d50f68b50f9a0609f51b2e3e3fb2c23c695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567164639cccb8e5a85660444fb4d04a2
SHA1d0d99eba7306edc5bf36d35e5e5c4fc8cacc53d9
SHA256d05cb4cec919fffb99ccf6bb76ad78225656fc05f2163f542e550fca146adee4
SHA5129d646d846cbf381a5667e21002740cc595e77bf0e1f64452e5f49324f2fffcfac6afc0da6a22cb1f9213aafa1d8ce8a9e75a1418bb8f731e73a138c7484d5f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50238e165b030663f5ef866c66f125448
SHA1dac874eade4c80d1e40c8bead3bfbb7f83ca7cf2
SHA256849bf8544c5d867c6d5b020db5639dac8f6eeb105c4c1c79b5cf049549c1a8f3
SHA512a0db387b7db37a6eb912620db20c42b32f29d8fbdaf42cad23fac38dff938c6e3aff7b7f88930d950ef9fcce21b46b9bc739444f3a71ff8ee32966c01b518b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f73b8139e308610deed70d1f2df376
SHA1f61377027bb594cfb04383329da7149a123634ca
SHA256762f26d1e05496881b365a604b43221f4bf962900c6e35bdaa1a841e229197a2
SHA512b6f87b8500f3a3c107f09aaf99dd79fcc05ae801cf087f66347ef49d61649366d64601a6e95d0a11984bdd2404d98cfc526ff582d484aa1a89906aa957acdb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df928325482f51d8f5c60f667de083c
SHA10e57e4775dc84a8ac83b02a65d1d0cb65bea487b
SHA256876dfa741df64377e3e934582c068b82a3e6f3dcb92514b6779202cc631a9ce3
SHA5124ad97b7d5b302408930d1542fdecb515ffae4d6f59abe164979dcfaaff8f38908535ae792dfec129327941c2c6f79166261925c8a2d918cd84139a5e7d5d7842
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b