Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
09e5f98df78db3bbe3ea939270b021eb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09e5f98df78db3bbe3ea939270b021eb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09e5f98df78db3bbe3ea939270b021eb_JaffaCakes118.html
-
Size
26KB
-
MD5
09e5f98df78db3bbe3ea939270b021eb
-
SHA1
ac269bd1bab0e123f45d155bc240f00a4d69fdac
-
SHA256
8941d4c5d07aacaba27d4f1c9036722a8acea29f44add29947a1f46cac16c567
-
SHA512
6ec14ebcc746be37a879c7415309270246c343098e8d60b37289175a6ccdea9c404ac823bba415309a7202031099e50da66ade359c19c5c1bba22335fadd0010
-
SSDEEP
192:1/cPoF84b5nrnQjLntQ/MnQie+nXnQOkrntCVnQTbnonQ7kRo7St7o+EwrAvMynq:1kPoanQ/Ci6jx
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB59A141-06F9-11EF-BB01-66D147C423DC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000693c52c765d445f9fd2fad24571398e3d5fd0b327e90de7cb1be388ace3989ee000000000e8000000002000020000000dc032a21443cf033ad01c3b7dad6a60d86f15ece33a2f82676bbf609b64a7fa5200000006fb7c578707d310d6a74dfef2ff8fb13a91fafbaf3b38e8ae06c9b98b0f7b9e4400000002f19d079c3c8a4c5b8282df68fc37904815bc0c82075d53cfd907bff67a85aac4aa60b68a6b9690b43f6c9fb99a6b74fe5f2c46d81c93ff745b462ba632caf0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420647353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0864e80069bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2212 1688 iexplore.exe 28 PID 1688 wrote to memory of 2212 1688 iexplore.exe 28 PID 1688 wrote to memory of 2212 1688 iexplore.exe 28 PID 1688 wrote to memory of 2212 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09e5f98df78db3bbe3ea939270b021eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51193fc86bd17918a4d19b096be84b88b
SHA16a5fc2ccac349ffd3f2ffab756d0e4d156509a4c
SHA2568000bee88ca1cf4cc4d5bbfbfee82a8afa65b51d893728fa3a8527500c09f5ab
SHA512db4c932ba70ac2fd4b0aca81cba83f12dab0d2101a83a6717f0366b6e523ea847bbc74b24857e6114136f5057ef9dcfe098b210788577ece86623104e09439b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733fe086a3e3a28c0f3060c99dbca753
SHA162b0c56b0f403a9a255af35639d68632e4ed0210
SHA25683f0257687281baf8fe803528218dea4263c5440ea9f8cf5d0a2c83f9f362cb0
SHA5120c69c891d5293814c09a98f35245bec4c6db4e05b242b33c63b31a5848cde10db5415f1e28a983d35ca1d193cfc650b6482e3251dacaf960ab706e3a82cb0c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d30edb6d6a8c14706dffc70f0fed9fc4
SHA1efc6d06e4ef5e75e71c2e44bddf87ec294a8160c
SHA256a4228a1d1ad3d193b306f9dd2a7f48fe2cfc5eedbddb60cb54cec8f85d94c433
SHA512cbcee7ce48b7a2d30bbf51f6bbe4382f90d01206095061cb61e364a8d028bd79d855b76a168132f28a2f48a837612fd67db54318e4253d5fa643d0121e70532c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40013ce05acd43fbf7b4e5aef33f37a
SHA1a91792cdc9dd152a9b4e5b446de3ef4cc06e5bb8
SHA256c77ff31ebcc2021cf8be6c76a4a25f4f7c5437cf1e454738665df7890670bcce
SHA512b9a14458df0b4cb16c53e9086270dad559e7e8765337a09c80dd652ab3de2fa71a1eea9c05410541a735dce6c7a2356194f2472f84251f32d1761cc99f8d4b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c5d5511a1eebb526894e9269ebd1c9
SHA1c9ac767cd4d1b9599894fbec7017ba08f8615c52
SHA2569e1dd66f0742a676ee42045d2414908f5b881f1ecde99969b9458cde1952a567
SHA5121696874adab86bb0589f75161a07750c62bc0ee289341014ca40589fb27dc2b4662bac819ed7a7a0ad59a313da6d3f92ba8de204b149bd1e7cef291e09cc9d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e9e2cf97b873a0ff9665445317d7880
SHA1e4092d3c9d4ba057700c11743ebb27c5a1614596
SHA25684a59c3708d6241d9211ec0e4f5b927e7f2f8632d2b3936365dbf59e4b3f12b7
SHA51299c89b48c507c0cabd693eb4a603a37540b338c19358960bb1a39233ab123e313d37196d126e4fa7eefc7383c3e3913d837cfa0e68c58b563f8fcec7585edc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab8c4cd635e87ec0147b7aba67a5fb9
SHA1b2f28741e723b488b7f73b13df54b04f14393dbe
SHA256bf5d9b3d267621365b9f2f586e2cc86b0932b5c86d853a757851f6f38a4d9be8
SHA512c23f24f44233bb68894ab03b663fc7daec4af9147f4065fced8971c3af881f8ff07204130498f1b6f017dc385d5f3fef167540abce3d12b5822bec01e50fd537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588cdef4b222a55829459f60b535abb45
SHA1c7fb4cd3f6ceb84da3e1453df0d16682a171cd14
SHA2562387eb7780057d1b60b0f116ede911cfc8b549a4604d0d24275e87aa9881fe46
SHA51233707e34e18dc9bac65423d8ab243363efa49a445d6625fe2759874ec14c8cf1b10875cfcb132cdde33508ff8dca42056c1a765d1ad4d24357998d76247816e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4167401d1b3ba1c2cdd3ef1bf4670aa
SHA10de67d8dc113977b5e1479cff01aedeb6777b0d7
SHA2564e6ce3ea75dae67f7823536094716c078f8243a9f83393f61112d7ac1887df2c
SHA512526bd5df8d804dbf0dfba79c4838c0a0511aebff74ad3150fca2cf2d3cfcad9771a4f3ed594700516c2c502c8f032e0ec679c8efeaf56b01b5e4acddd39ca8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33ef8d6c0222c444b1dc2062ec03cf4
SHA1954e023c56aff7c774efd9a78a3c5ad29f507ee7
SHA256035851fed8f906901f0e3e10f36007efc3cff0d6c38c43c24d87589c8be8f3dc
SHA5124c58412e651a5648e2bd859b048c7afef1308c9bd7aa4d1a05f3a4298a6d8be28b75857ffa2ce69c97b5d1adb7af848bcad5e9e42f5369030bbd71288cdc26b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd308317703188d3c96027391b0469b
SHA1dc307d1ede605bc8d7900e295fc52e559c9a70f2
SHA2562ed19a5f56e2eaeaec5b01d67c8348c8a5e05e9bd8b5e4c40f5e9c7a5464bdfe
SHA51226a4c0461972b343f31528f61c6c0067623a43dc635b204b2a26bec23a457524349ae68ebb2bc928f2f26df9519cc38a8c87131a0da25f26cad66b73ee89fc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543041575c39acd8419a1833abbe0bff0
SHA151ef8628cd31ac51a8a7eb82857ae2d9173f05d3
SHA2562e20800c651fbf6a6d8ff5743b0e01ee9cc30566e7ed8a095ec676647309089e
SHA5121883c993a69f7f96b17051809d4f098c41ad1e87bde12e94423203304ce4da12bf980cc077d63f617b807836f4cd3941ccd7c0d4fecc4e21d6eb4ba533d1a8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585c9902a767d4d6cd807cd060e9c830c
SHA17cf50f47e1503382fde0758c7cd0b8620f18c2f7
SHA256ea0e8499945fe8b3a1ad60289acbc9a5c441e31e0baf313015eaf9cf6e2e30ec
SHA5127614fb40250fc5654e9bf729291476d2390a82f7b9c8a44ba847c6508ad44c7b9ad81e8e913d99e31ba73c044e578927262f4c20ec98c2d39ee025d0cca65ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9d1d8aac5ae51ce798d9842f07a763
SHA13ab46b6f856be8fa9741bae687c5a122e79d2544
SHA2564fba5b5e78c1781c6221f9d5d4b58638a030881b9307a0d3506e2534dbb53e25
SHA512a3cb7614c6f029adc723a193f29840f34e4b7eb5939b373f1103e2e681ba7089b0503e30591985d5f672062fa2afbc71b9b29e52aad1a1eb7c76987276a5fd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e69997c1f0410aaeb5e2547452529239
SHA153a269870645db3a2a6dd98640c8272a498eeca1
SHA25605d2b840a10cb621bba9bdf55152e0105749852239786433f7a87c42f855b74b
SHA5126bbfa372d6d0efcd3102ec77af89d5d186cf99a1801f423ca28e759fa18e0707009bb674d6cd6fc5e2042222c63ace96914bed12da55c52720b57fb2b5168b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac38e9ee409df4ba99e57ea7979dc4d
SHA12e8e043858f69268f93fbe56947684ea00cfaff6
SHA25627d1e80b777b008f56cbc40b07dcc5ec49c6078c8a666775d57383982d5e424a
SHA5126afb25b56b5d0afa79c8c573f57645bcf646c83b85abfb3b5ff40f046936b61317737ce26477acaf42f5791bb8cb427978c44dfcf3aed958091605a2753bca56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0d3c72b3b61abe0e146078f6f060582
SHA1885c78413c4b1b8529be8aace32a1e5bdc1eedaf
SHA2565d730b9b209f892a503eaecf46c328aaeea3af0f3639ffd9c7c501cabbeac1e5
SHA512d50abfb0c6ef9de784d3b94938c41f2f457cdbbdeb8578b24f47d8aacd923c73fcf93074fc581f151c676b55669311e6e1c8e82cdbcc05a3de63f058cdd9776c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5764fcb2ad469b70e3d2f95d64368cb42
SHA1531898a0334aca8f5dce39999d37c98952434aed
SHA2565c295dd1496aa68cca05c87b638b0931027186e8b294a9fbd8aad247ed60d4f7
SHA51296ddfa744dd40c599106ada9806988765a5edd4680029d586c043304b47b68ca3d4b2dac6ad97c0db2eee769b5b20173a7305bfd149e9ee283e0522526a87831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ebae7e5d13bcc6af89c8eee63cba0c9
SHA1c661ab1e09b0b6545ab50bf4120c8c929b34a6ea
SHA256c247a0834ebee844dfca17bc9409fa953bf03fc04839b227190d03001f7c2d75
SHA5121fa3e538707373d0e40a2805dd3a3b797928df9e2d2f321a16f3ea194f52e69fe225424d3e98a300fb82dddc8a7775061cb072460953997d3798e1e5bee45e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543420f90494ddabef3ff1118263a0af4
SHA17e704e99036cee6af6405b51ff7fb5dd5b6b5408
SHA2561aa0d14ddb2edb141be587c65ef39a44949a64df94dd682d92ec7408868b693e
SHA51248750ea9993eb8e6e6e024bf619950732b17ef3612bf77c4030cba6508ba6ecd4a3e7e6b7523e878536abb42f21add42dfc75e8deee43d5a08c3d198a1c67b41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a