Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240226-en
General
-
Target
sample.html
-
Size
16KB
-
MD5
14a4b52bfd962927d828b4a58caa52e1
-
SHA1
89fd665f2c6ba949439d0795cf3aa99afee79432
-
SHA256
d15fb21fe52ca873db129f84318a5c1469a13ef26b7c5b14074a7f175ff14461
-
SHA512
6a7cfc318ede0ade36ae2be04026f0e931c040216f0555bae2dcf424da74c0e3896e18d86da89c6f61082817153fcc04f77ae533d5fa67383b65a559d0d1e904
-
SSDEEP
192:PNx5Ssv99qXoqTJkNr423eE0J0qsvM1Nvx95VRyZTfnIhwU61zK414lYyq03N:5Ssl9qYoJkN0PvvxbGlewU6JK/fN
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB804351-ECA1-11EE-9960-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900662b0ae80da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000a768cdf76e1cde62ebb9a0cc2eb1f250dc24fa81224d50276c7015ef84be7301000000000e8000000002000020000000ab4148b946f883bc3db7adcf7545f6ce0716cc8f3b0d038fbc8e8db27431e590200000008606216513a4b453c01fee300ad063390e97fe1b61372e3afd828d8119122f804000000062a9834215f24eefcb44fbc3197ac045f96b0ed67daaa8e29a137b27ecf9c1c8f1da7459f2dcd09b65243bc53253c681507d6fa183fd1165c2dc164617b658ad iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417750910" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000094c386d239d4148ed6407e1e4df3590977c5276736bf550ab24f4a38f7543fe9000000000e8000000002000020000000283e9c65490aa1ec426eedf70e2e66a3c82857ccee39f0bb15d36440a2262c8190000000ee28870329fb6e57bc314f8174a608751fb060b253a3fcf83c90a2be579984d15f171c239331dba7e9ffafa09d6332aa631cea5087a7cac88dd4cbc95067b76223ecc1544a29a9c4a377ebc9816fae621e76e8e1a0dca959ed70f9007ef17490c5f2f25bdbb2a749de2efcc72439446f5b8bf24750d703fe797cb2f1f5f6049ae7e38abbfef2cc5f8056c6761219691e40000000a5113c5150a155f12824a55391c336005b6d02be3761c4b4630a0b20e7e323776136a5f8e39ab7387170dfba320cb0dd9a0875897a4499cfc1082364dbb28e95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2900 1532 iexplore.exe 28 PID 1532 wrote to memory of 2900 1532 iexplore.exe 28 PID 1532 wrote to memory of 2900 1532 iexplore.exe 28 PID 1532 wrote to memory of 2900 1532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529bb5e729137d0c4f8395df04440394a
SHA12baaf4c8fee4afe72cf891339513f2b688a25bb9
SHA256a1bb7cfbc4852f1e431f7b19cfebb750dc1528fcef6307aba10ac8c67b912b60
SHA512ac56de1c4c21874681db52c88f953f992893e59bda9d30abfe08207c9d3bab052bd0dab6debc8bd5d2a6ab837c41b25a85ad63957fb3c5fb98c028751a1f6ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c47d691ff6313c030cf1b58c2dd8d999
SHA19853a497cbf59c1c8e95ff978b807fa8e283884c
SHA25636cb4b8a8ae6e4eb18b8846678d5bd67072f849ca80d74b8fe5a18abb8465335
SHA512078c2762fa8f025665d8f71ca535f84c47f7f618d77a8cd95b0db4f6965035e8d63613d5a3862b9f011fbd1c803c2dfa6c2be241c4df18c4af14aeb369a14d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bda3852ed05eb1c1050c7eb8d658112
SHA174338a561df00fb58a0f4fa24613cef89dd83aaf
SHA256787cd9a72399360468f0ae28806af0f5040aa5550f5db21eb834e935e8f81c1f
SHA5126c503299b4f37e1dbce504408f12a470cf9b04b3a7ede362f6cf4072a440565565fcc86d689e7e9cab60bf647ad2a637b9a44c983fb3a78f2e010c1414fd8c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c5ae902a076f9605b6c44a471f4d8d
SHA195a3e222d9ae66881f9e242aea04577fc8127bbc
SHA2565f38bbaf975e6d8c2c4e91d233302a35d9b44cc06aafcd6d76498f9026976579
SHA51255b31b9cabc5a18cf9472180d5d23854019dfe292508a545ba8260978fddcabf2452e6870c772d115c6571cb2ec3bab3b60184d73ae23107a6b29f2a53696d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c98701089e9922ad2ae424931ee62a45
SHA1fc886123c57e469393ba11b23d97178b00dda844
SHA256f75f8da8b2481a1291397cafb80bb03ad44ac8d1cc4f5a92353c164668c90153
SHA512c2050fd269d1ad6f60eca551845c8cd99139f8b5467201ad122b6d269ff5e046f509f2536e6094830cea7d9f73063adea0c95f631287e2712ee917d15de554f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53457c15c03583985d9d9f631d15be3f8
SHA124b5799d5f3f0e20faa50551f059cb5c8cc2aeda
SHA256cef9d823c22423b75b383ac7d50b0333ad79aeddcddfcb64b4ee8781213dd71c
SHA5126c1c5a236a792321ddf90212c781169a7ddc973251d13d7b2490276aee15f2cf72c7768501a2a71a27fda44f9e2d4afbd881f987cc30c25c3345f52daa080c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56deb3e28e406709d19bd329eeb8bf14e
SHA1468c8a6c3cf9b41901d811a6dc8b4de8f1103068
SHA256fc6035cd9cfa3d825c53f40d64946dfd8827f49c7f2016e3bdefb49e37b8dde4
SHA512f4c5b0b5e496a59af30ecb277650e7ac9a794a32c0b9c41dde6aab0ea2b8518b6c1152c1cba1c2cca1d8f530bf6bb26e761d70d1b7c8965500d1df2c921265d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08ef1555d7b321a9fc42cbeff4ee226
SHA1fec0b215b88dffc5fdb48c2cf64076645c3ac264
SHA256f581bbc93f7f51286df60b49775067c296e9307f60c341c38cad7051548b2140
SHA512eabbb2d92ca923a26fb61407ab76f52113108785ecf2255979f804b10741e5ed2dcbbcd3a60b013a32f840b4f10084b69dbe5d2e2656777c71fc8847b97ce72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a47c1441c4764903d99a45c49a6120
SHA103c99c3fd1e9739924d76764bcc327814b960060
SHA256b2620244ef58c15bd87fcafbf36a8f94dcc3b5ebae633ebdfa23e47aec7aadda
SHA512d3bfead9b91ffc54fcb4b522826a909b3135cf20316ae95ca0e84b2e1e98a9a5ac7d6bf80ad1d6d43ee2a32d21a050e3427b9340e400a4e4097a0f940685496c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b1f8cb0e793f96dd7feac99c38b58ae
SHA15e0c1298d4642ff52ded91ece62f974e039e73d0
SHA2565c6f037e3e05af83c12215368873d8c87c9adf9c0adb44c01a5d4be55969f186
SHA5126f207229401053320dd295703a96727974a50d737f0ab6e298e6c35beca9f8aaf7fd2bf430f518bd352f3f199eb3308c9b7a54235a37373743e9d5ab4dbeb26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c283211fd7e314cc31921de56b9ed95
SHA18642956f80392e17023898e673cd684fdd0a16a0
SHA2566e413b59be22a3b756bcc5f8e073b4f06d4cc693aea0b0668218a7940f4fa5e4
SHA5123f99ae6f3f84467996a74460dfeef948676f33739f29e3bf3ec94e45e2edd2fa1910b10e32beaaa34e3d5a62e7503e33203aeae9cb431fec4a7201b962019a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5417c389a9837dcaf2f7010d3d731dfe3
SHA110e6e0fe9645100f9dd69d614d4836f4e16ad31a
SHA2563de4e54ec4405f1558110d3a2ce52efdf4c93424ba2eb7d61830ad2c3206902b
SHA512dbdca596de75967ae4fb8f6aa4087f9a2262497d2fb5a4179968379ca26831af3dfa4e42e519cd56c919d5006848e447c04998f0d2c2a301758283bb3f11b40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55056b5bad87ff8fceac76d9c4e24ca3a
SHA1c8d12ef8b2f3a22ffdb2355d1545a6d03c491e3a
SHA2568a0ab70086be5b9173b00d25bc97b3077d3043811b133dc202c86a307388d6c7
SHA512f04b56f826634eb30977c1fb94d9e1dcd1f4c73d6218f45cf9e4025c1bd025b82b92b74930851ec067749824ce63e3885101e471ae850f8b389fa1bd5bf9cea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae86ac3dd0eb141aa8065af1919905bd
SHA1ffee0f3df7de24b14ae0248d7a760646d63b1617
SHA256c023cffed08a1b1158e7462d20be983dc192d3a002ef41cffa1c889a08c49dea
SHA5124015edd3f5775efc2206696b6cb72dfc30b76068a2b41179ead4b7cce6b5e08abb1de5baf54e08819d05c9d58819b84195cd196170477708412f02a9490ef60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed9e207b9eb483c78822bd9be3783650
SHA1bac09e4723b8afc730aa485a9d6d8f1ef8f78e68
SHA25664407e27c86213c9204c2b45a0fc1de18b407d3f2f148553f51d131f9242df7e
SHA512ded7175b6859af63a0d408368ed28045b5edc11eaaaf50e76d749d0d12b6e2afe5fd7c4fcb801042caf0bb866ddea4d771e7c850cc361b5a482ed2983c09be37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282cdbf9bcbc542f3a8cfa81d2c5d8dd
SHA162d33ce47a0dd23e32fbe1d82cbfc2036bc86a68
SHA2567eb1621f8c3cb434742a2a33e9b0ffbe7553c2ede385056e22fff149fdf6a0f6
SHA512b078b74228656093d07bda5f53dd4236ccebcde8bea62e7d684be9c5a3a2492620dabe56a33dd14962a24d1d5ae5eab87d1c6ff9f6ce7ce2ab36f6fac28d7917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523f7f73fc8b4955de136f04d8140214
SHA1702f0ae9d7b6c1b3428b988a21926258166da35e
SHA256b9d65d654c15fa0e04d16f2d513794515abb030593836e55484fa79cf247e5f4
SHA5129a2b240903127c90c99ad4f1dbcf8e52a1a58c97fb2ec41c48185df1146198ab6b710c80aae27957d83bd869e779ab12019cb5798cee6c2c6e64676017827812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5901e09b8435856966084a2b80f994405
SHA1893a01bcbb5671dcc70ca58ed8d555e112aaa967
SHA256e8549f20901646b89820cc936f265e616ddbd64ce27a47ae3b7ff3eea8dd5683
SHA512ec8f55f0524210c309e66260cac44adf9b3c4ce2a30e654f91f3cfc674c99a71da3426e0abd05236b4929bce4b2b6decfd2cdf6ff46bcc6ed7296494667a21cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab5a67c91be0a418a1ab0ac644ad9c84
SHA125448ad842c12127d1e3ec7f0ec1ccf62c428abd
SHA256f48a6aacb97a11dbb151f83d10a7555b3b8f634297aca974900cd3c10c74d392
SHA512f496d075ad02bdf806b1cc2d270edf32a5cae1bc41952cd73b8221607e0a2e39fe17773833d90aa6b0927da82b87f936673b77b3d93e60012550a206d1b316e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a