Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
0793388ec7980df14e1111d2dffd5680_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0793388ec7980df14e1111d2dffd5680_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0793388ec7980df14e1111d2dffd5680_JaffaCakes118.html
-
Size
825B
-
MD5
0793388ec7980df14e1111d2dffd5680
-
SHA1
0f8f249d3a0610bb8f12ba6b3c6a89eb1a94bb88
-
SHA256
6f08b6adae7c16cf2790bce4d205ce6245affea298830a4b59f2a55f46c08221
-
SHA512
477d399306dc7f00d4378013474787167b431a1aea24ca64bc01eeaaf3e252728f7f3c44599ebededec593126444b355708ac6442f174bc8351f30caf89791fb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0664a7f299ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBE29B81-061C-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000057de3f15ad7d448eaa4ae5ef6001427d5d057c37fbcf5fadea009e4e2ea4fc56000000000e80000000020000200000007c0f3dfa0f685cdb19ac25c94afeb8d41be461807f4bfb71f8b4565a9204b9f2200000005214236a6a0f43753bcdbc0e4a63de228ef2204b45aabd93f13abb9e3e83bfb7400000005c723bb01a64a5c91e3bbbf58442475ac59e8dea934076efcc88a6441f10a59cb31b21ce93dab718fb91f634f10c43895c7e1ac5bf276e8e49679910fbe4649c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003118f93e374111c6cc6ee9eb72a5e26c8b08387bd865c796ea780fae928587f1000000000e800000000200002000000041fcf79b9cf290ada50245ad2d5710d863707e1378d1698d3a65ea159973e08a90000000f9243658fdb228e6e03ac08aad871429fc7ce5c380f73761dacab8392461ea7a6d39487cb1522533e8e9e7ead65782c3060fa65f9814355520b592099ff9a60d77c2dc144c128d366187853e5b4456b9f7c75c3b2fa659437153b2487f33e51a99ec591b7844c56781dd959d30dcd6ef18c7352b94bd0a2a341a71d786aadaab15c75cacaee3f7ad9de9472ee22d8f0940000000be60794524db5fe2497816a29859ef027afa62c63d06b0856a31231e273b41d1e694e56648bd2350d863f994b898132fd98254d49f0a163f180da44a86eb1d6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420552462" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1952 2524 iexplore.exe 28 PID 2524 wrote to memory of 1952 2524 iexplore.exe 28 PID 2524 wrote to memory of 1952 2524 iexplore.exe 28 PID 2524 wrote to memory of 1952 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0793388ec7980df14e1111d2dffd5680_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d24c458bcf64c6d315def9a05405c6fc
SHA1ad9809b9aea891597169f66666b13ee0a5d5544b
SHA25699dd7cb68df53b446a4d1ba8329259786c6a6a29f07010e00383205c19e6eec6
SHA512840830121374d8ccbbe97db40d0a04c1ed16e63e9c20e15713c388260e8b2c7185583a8aff43ed9a36125ceeca3b2edf1e4a53d662c90ea95ebd3934c3296d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a63493ccc30eda5c86cd2a0e488a4d9
SHA113661693a5ecf7e00e4e9e94294b3b08d28ef466
SHA256241e85a48c035cc30021730c0061c9d3459aca1057a4f001c3f9f28f23039eb4
SHA5129bce2fe0ec460e7e49179486e225616291130e200c65ef8aa91176021d9941a516d7740b06851cc7939eea4d0de5b75b64cf73754fc33ef43585f515d7f7ad36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5455fb989d4cbf9fb70266b599ff0e9a9
SHA18a99f0988c0f84c946d1d30af7609585ead6ace5
SHA25693b35533372043fb962e1a94beaf38203c2a9f3564b0d6ae86b343a563fa5239
SHA5127f20b51b4f1f951e1036979c248f6dcc65b879ed8814797e2b4f6d8aa90879f30f0751ac8570d86bb1d1018eeeb321aa17d8f20d28479715126986c8aa394ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e8db79b92205df868cbabc0b07266c
SHA193eaa56ff4d3840d295ecf1e0af2d1a4d4c675a3
SHA25662331467488fa0dbb32b8f7788c971b18186c2e31530466ea8ecef3819e7060c
SHA512cdaeadf05f81566c19ac85b2f7cd1ff66d6a7eee61d2af025ffd2903bef3d72dfba41d088cf641600a452610b42fefa751044d6609b41c9e11357b7456ada614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e4c8dcd3115b45e4713957b3c245f0e
SHA1874a9191a04c0773fdb2fbdabdfd74b555af31ac
SHA2561ab9455028d139d86600a9231dd95fdd0f4b3430d061134df90624075541ef9c
SHA5123259b3bc3abcbb57b306e78b464a346812091aeb199a212c2af3e95adafe37548f732514edf90d9326587b50a0dc057cac4904a705ff116c20b7c67fdacc9ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e0c6c92294246a599fe2e38863e44f
SHA106ccceadb3fedc92a4bc57c31ec676e7651fd2c0
SHA2563e89533791cf003c7a19233c3f16c10a5597f66f764d4298dcd51f881ab8f02c
SHA512001a1407188b12c350dba313927a041c35c8ee16839f85ee6c7616c31b2f69527f222a320984cfcbba35a4890871497566f2a5f7758b8e0ddfe8ca256ebdb688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4a161b4adc3bdf66d7d7309f694abef
SHA19656e5d6623053706d5f546f1c147ce1ded9ac48
SHA256b7f204dedab2ac0d60410e6819652c64d52aeb02e9214462e20d86bbac23f391
SHA512c785f25bba00789303a586ef4370fdf695e7528bd89ba4d4a5606a3841f4cce55f676e58514fdfe2c6af97ee7d9064a7148788a1bd68d667bdfd9892d540bc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e704ef55084197728c354815fd20db
SHA19719f76f2314ab0ec6b2390a3f5befe6f5d7f581
SHA256d4bd4a9275fa027338a43d4fa9b21b253047864d211a2ea62e02d2d4c5a9e389
SHA5122a25b1152ca7ba8dfb1db4b84411c04a09134d1cff9868f6df974e2859507cf57c4f5ab2ac3fa6a256f57327f012ef98a3009732bc8e0c4d2d0d2ef21d5edeae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e41a1e4b483d73199baecf14068aa8
SHA1c72342407fd0510e43bb62a96819b332981a99ab
SHA25602fe502366ea06292496b88fa3caff2c311cd58699df6eff1751c7dc468211ff
SHA512f01ac7fd429ed66902f70e8d7cd2886641f712027da0ee070225b072e46c1b77c2ed5704863fb946577ab9a8560bbe85e5255c8f8a702a825aebd9dd2a4bbb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55979b538fe77539a668f67d96bb6a19c
SHA10422798e9dcbae2c6a129aad5f17c766abc13e73
SHA25657e49d58c95177e2027fb717f44b80b4deb8c8c1c84e7e3bdfe1ce253889cec4
SHA512df19cbbaac54d56e33bed0d4f52be295ec6079bd0917d9cc505f5d73e04361b3c71675d78aee545b8380f06e42ea401e6715a162721975131d62d7ba2c6a2853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537df8e440bb41f898a0ec19fdbecb4c2
SHA174d5eb8b70eeb60065f0f76d9921fb1ac17892dc
SHA25699a3602f048f4c350c3f7e1d17cde2bdcaa18b2b410c542868f07ddb8c1a2616
SHA512ff60c7331a206f064cac4834278e4a00fe73f567cd1c8e747cf04e6bb92e87e2bd5e4c6bae3b17c2c8a9a556141c006f18c0a58b5ee6645c0bdb44e9d099ff77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41b76a7bab4cd9513cdc7fe7b556bf7
SHA1b0e84366cc0ccf69a9cd4e887c93fbbc73d58780
SHA256ec32d4efca2926dc1d1d2de724d3659209698874b694ec6e3984d5079b2fd37b
SHA5126502c60bd96eccdfa6a39e4ecc41fb9205dce77902ed4d9fefa14b5434e8e860be1ae0287f9c2fcd27193269582db7ffb42d8501cea601341ddf3b1aaf83b3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e124053e0efe5f77ed32f78931c60f7a
SHA1329b9ecbaa4cfba1ba2cdabf5a5402178aa36700
SHA256933e864b2f12034cce37352acb6572a43fefd7073fedcbb4e170fec9ef3e5f37
SHA512208e78dfc33d30aef26de0632114a98f9cbbab2891b7ce4b97383d53e7440c5fb887bd39c803d3e698ed134f7d2ae517462c7337279e060b68d70a746640f96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1342861289060d5da2bb56ec58946b
SHA191ad3a710f99c47070a6bf4e749799a43c4fc6fb
SHA2560fe0ffb31f4cf6929c1e6b76deb8f0643345ab743172004a4027be9662f27c89
SHA5121589a255ec058806fd06ad94f4e63a896d2fd5c719e1735440b1d5ac7c3270047b6a2809dd9036df307010fd9a0b74393fdced0a91888ae85bd1c4b09c238876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceec4d58eada420bc18d5451a5ab73b4
SHA148c6ed19c7d633fb24e4c890c2efc8f08b85b513
SHA2561a9851c5ec8928dd18e69b6363e1036a7cb0ff817d26054947d22b00a285e160
SHA5126479172db9f2c00265856636f9600a51ecc23e945e4efd7175d42d32e3fbaf97bec1847777439cfd6b3a376ba83ef00482e464120b867aade705f7cf0e86ad48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b251f5b21634b68c7da7dbfc527e741d
SHA15cb53dcfd7adb6a8073a7cdad5f24c47309d4d51
SHA256c8b9dd3c9b9ad17f95c04d05a54a4b6c4ec4ad070f0eb6d4ef917fd285233e55
SHA512e7a5b3bf91392bf3653631422ed0c7f79e3eb500248c650b1a259ce391812144a1f9f4e4e0f802085f439196e32b1e656269d1654d2984a369e8ac08f69c20c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59891269225fd261466fc99e0177f4bef
SHA1c844723406e291989a11751ea7c1464b41ad1c87
SHA256596bde2de83c0e2a77ebe92cd3685fc06bb24dc333fea747623d33832abea2db
SHA512829544719470d863ec39d95870a56f032acca55da49c8596c901d7211072594cfe0a1cc3ce5e50fbf0cd0342898f92453a4690a71a72252a5c78e26fab365769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ec29810717f275e3f6c35774eccef47
SHA1595b1fc3f1c03488e3a9afb8bcbc89ed7564b4b0
SHA25659b12d86b55143290d74b81c034fd384807399cf05c31bb56c6cbb3526314daa
SHA512091c56278c40eb02e86fe4a79c12750124580a312ee985c8b18f0952f2a50aa1a556cccadacebeaeae61b185a5a144ae83057a12936fd90a9a2b914910ee1334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a50f3ee7eb196d3b6447e5326f9c47df
SHA181e4db5747a2d9103f0f5a415d78e65df2e09f68
SHA2564b1112d9e273476304ed6f4010d5347b2319ef10bb840d47ab19fa366ec30e0f
SHA51282b11538554befdc56c667a9442287958f181c98387c8150aa61ce19133e29d915db43ff69d74ec01ba6a30605e6a9777cf6c41b5bf5169e0abe70656b540fd1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a