Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
0d4f461887a0cc51c1971c107048e619_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0d4f461887a0cc51c1971c107048e619_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d4f461887a0cc51c1971c107048e619_JaffaCakes118.html
-
Size
67KB
-
MD5
0d4f461887a0cc51c1971c107048e619
-
SHA1
8904bf0664880be81052f9d5dfead0b40deb0993
-
SHA256
87e173bcfca4d9f272e04e15c6e1a8bcd2dc103e355c8225c5e28436e91cf46e
-
SHA512
3c948e021134ca27c42c338264174ea20ebe6a8f4bd030cb6550724a4a51cf28ed94b194a5e2714dcd4b3817dd160b1bf27a6d7a0c5bbf75dc51b35d798c78b9
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6sQ6FaoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdPTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fc620c3e9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37C5FA61-0831-11EF-90CD-4A18CE615B84} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000039d94944038b11d44cd3ff6aa45b199d9ecd63cd618b5fa5ee035a584eb1f4c3000000000e8000000002000020000000369dce49922fde46dfed485b9d6c90f5e33938b4409629b363b59ab352ae91cd20000000629c1ced3bb9c4c2376a89ee7fe53cd64961ead62516494682415917f49b0552400000001b7189744af63f9c0868be1ab5e95c2978257ef8ac76487e6ac64813b858a37b1ed06d813c85eb55570ec31214b38809be7b789e83d9f3802db5ac1377a22b83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420781162" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 3040 1992 iexplore.exe 28 PID 1992 wrote to memory of 3040 1992 iexplore.exe 28 PID 1992 wrote to memory of 3040 1992 iexplore.exe 28 PID 1992 wrote to memory of 3040 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d4f461887a0cc51c1971c107048e619_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742915ec9600cf21ba6e52482d6b8fb7
SHA117481b9712e3a450d477d1b667479cf8249c33fe
SHA2568766529bcdff09c59e0e26229fe94136f111db02c6884255a6f62503be8d12da
SHA5125f3533f0788ca5ff3433916d76520718dd552734446b07d6c89bd199510df750f917979b9c84f57d63da790b3937c03fbf384db67535d0b55beda3541ac3a155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5530971115b4de8d46c36de73c921ec62
SHA15d97c867c39c98a75ae53cfb45fac28f3672b944
SHA2562c0d034260e4202593cefad8596520a95abfad2a11376a188392e304e2e1a0da
SHA5126b10c57743d0b2b5f0a6a4af504125c86efa2f76182e90793c3f97703897395f5789a94cda39ab77a327b29781214876ef6c9a21a4e73b08da9409351e6d1bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d051d001fe71e47115876070ae5118c
SHA11ee3a575fc21a0b9b3b440053c0cae3dbc89a700
SHA2568fd80d787a897182038a8d040414246b774afc7b21187ebc0f48d96dcbd0d07e
SHA5124e775117b35aaeeaa1e6a8f08257b6faa6f62c6be04ec69b82598458ab072e3e75bf54cd81b902e4b7c91cdbfa86b79b0925e124b9c29431e68a8e46a1b29815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535584a999c542df2b8135985de999b96
SHA122575523ee2fcc8f45294a6b5d5e20a549217be7
SHA256827de31c307c22655f233691028d62b7e3166c4ba3b4a210464e8cfe827928fe
SHA512583f5a3a1ab92456ed1ed450eab1da4529c46f822fea79cf2407bcce8e124e598d63ac47af25746b2d0746852656bd95cac453b0af13ce7d3a7f0dae7a83f0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef2ffb8d8730fcaa934299eed41a017
SHA1e0ca60896d38dc14358a6a8fcb311e48c8732132
SHA2565e70fd969b4eeab93dd18bcbb55d91ee9fd7ccca9f56713c2b7d2438afb221d5
SHA5123f4351197c57751d91b947f6b413b7d78214ee652f26acf8b7820e41d250bb1f62521610506301d183db164c428b1f412df29103d5f9c09072c21607d7bc8057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9b4d5e9e14a444c58d79aaaf99c6be
SHA110b4d740a6c9c7bdf51e5d02006d01e598ae3cd5
SHA256fdf624f148b4b3c3aa795ff0b03f16d8141bfb75f90327b3602786fe2190f2ee
SHA51238af770c4711d124495e1f482b6c3ce4b13654512adc7f76b1ca9a08820ad5321ecdbe59d2d8ebcb912446662671ab6a7c304ac19497c5af3936f2edf9ce584d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5338b4535845464a414a92ae20b810b9f
SHA17239ebc6113f57813be223165640391c20359f65
SHA256f630c5d99d644d9b9874ea09fc97689c182a19a3a412e833ceefb755fb9f2296
SHA51247d273ce2b4261272a4372386d4f7802c85fba2f3f7e8d8b7d8f08d42d717a78be5040ba899c42e6d3deef169ed74d54d0377f8bc433d19c87f87608dd6ae1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fa299a21984cc02d36e46086bc7df9c
SHA138aaa025551b8a34c69d386c7404bc44276e842f
SHA2566b55ad66145082915653560fc559084fdb9b03462bae38668559af8abb1ee6e6
SHA51282864721f63fce8c37b14ec86bb57ed31222c2e101cacff9be8ad595961992b1e0779b2265e12b4503f62088cd564401ebcec203a05415a7c0e9f60f8d0a97dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd79ee87aa6ebecdcb50fd68da474c84
SHA1c4ccc5049974a3ef6f6620b93537b422d73dd9c7
SHA256a80a382b9a5404433d3cce50f93f13242efe3358a9ba7ca089c12237553c952a
SHA512a39722d70c7851f0819e05159a62271caed4a342a1ea606b7139a3fb292be2ed9b241d99ea960c7a474bcc675d01adb764973dd02700ecd7707b497fbd284f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad2795ef4d6506c9610273bc1416195
SHA1234e3f1228b8f6ac32e82e01140917319da6cc0b
SHA256d59fd6fad3c121dcb560f473d71f496584ffbc8f3efdfc6e07e6befea50f246b
SHA5120d70dc61cf2ad0befcf92a6b33675901d37b68896fceb97060da230806e1f8751bbf22d2fe3b758a613bfbc941437838829d66b28b4572b7635ecdfc822e562f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c60b78dcb606af9ed57c349826f33387
SHA177f931a36ce63e6456172af4b9388ae47e670c65
SHA2560c721884024cb52ac34884e1947d3bf9cf5c511d2a2be3141995785505a1fdfa
SHA512211859828815cc2915875947ea2b2df9a48f46d275f7162a2cab664b687c167c38980e8f50152de3078eb53f66948542cbddbeecad6bce6213d26cc8afa1e33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56412c19a777d6995573f4d9d68e0de5c
SHA1ce25f532d9180474d4dbfcfcf199b7284738ad28
SHA2561f05e6d04851f1b617cdd9ad93e62d74dee4427d43cf0c2830a28d02a7c77e77
SHA512ef3372b8852f35db7a0a323c7ede6b6ce640afcda0b7dd1e33482379b23ab4da4266e94e21b03862d3a61063c27cf3adb5ea97518382c8d9b8aa5a57363fb054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532606928cb8600ea7059a065b87ace94
SHA1c0334a405eee5a59d9b8c8c8154361290aaeebf1
SHA256b822ea016db24a6dedaa8bf44cf449a65a1bb4c187ba23028b905c656b951e4d
SHA51242e59ecf3ae8c9f061e8e3165d4b3775cbea62a262da9d63fe7ce9a21b6ca5f9097df3adad2ad2c3eb15ca72663dcd1fcf4396dd957260d0ef3958a7b8edc439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae0588e0c75de198241a29632fe56bf
SHA19abccf534e1da16fd0770ac142489a661a51f0d2
SHA2560e661af6d3767ab78ae39672697c6fe3e1f22b1995e5af23b2bf17cd30913be9
SHA51234f83ea886c83889576ca15aac8dc4136ebebcce22271a92b2cfe30518a4468c56b2cf9726d5ce6e69ab4e103cd9c930564e2efc716caeb6e05bc38e294a3be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cf701a77f329a90863865f375527ca0
SHA1cb0a61b49fb0a13c03d1f0923b7bd4a8c4cdc64c
SHA25658b7684e72967d6a4ac03e92c16cfe3f467cd21ff6765353257ea20ba4e0c158
SHA512adf55c08a45d52a83c96f6a461f53658eb4b26fc955ea9d2b12f1db9cf55f2834d47e7c43b7ab12ccd2029348867f494240d208617649f09680201cc634ab9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ff628a1f2eb78baadf72ae1c58e11d
SHA178d4c7115cbbf788d6d823f81d635b6a80d600fd
SHA2568367fd8a843087310441ebdf80cc47f852231338a4d3492143c2ca95de0c34f1
SHA512e14bc8c39662df8b50cb963111ffc2c168b9944099ff708d0b81e4eb954e746cea19f3a46dfcefb47067f8109109b21a5aa3d6174bb76943eb449074bb5d5fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59528c34f98ddf1fc437faf40f1020394
SHA10d8563b7cdf7a1b03ec7b90bc74e1177d1634452
SHA2564922580023e99326ca10414786f0deb56f7889d4616e2b8fc50b3c55b4e5b7b5
SHA512b80e7d96fd463da88611bd2b95b710ca639fab6608b6c3c350561d0e8895714c33417d846a82c568fa2ef03f3715e7a7ae1979e9ee7a7c3b924fc5db602c0a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da7669919dffcbc27dc4eb508d8c3d2a
SHA1737335e7d5abac80de8e68b64e5ff29375dc0823
SHA2565f5bb1e204914da6b1a112adfdcaf1062455090236d5b480ad6c4983d52427fd
SHA51254ab3bd1db357ac0ef611986fbb771d92383cf1c11d9c10dba068f5aa65165e55d219101bdc1d3f2fdef3239edf29ada4402a1b3c1d4d2974bda30bc33a2ac17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ce2f7132af5a747d762d4a778bee6bc
SHA13e8a77ffa86e5901aaefa01a2951a7963bd36644
SHA256eb4efdf70a173e96c9401634ed6c75b3e8140c8a71a951924a6513b8fe010d33
SHA51256cdac4dbfe3b1752c750dfdee13f1713dec0b4085c37f02cda008352cbd805b8dedd864c8de35d3ae9c53c81c7e13c4a6355441d636e7b976f56744fd178b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1dbab2fc3422e88b2c76ef75f453a26
SHA1b3ff4f5e92d6a25d1d77710b434d6f20b3b460b0
SHA2562798d3500e4155953b88a8a64a6ed0307da6758307ba4a23a3e2802e8f7f8c28
SHA51243d0aec11ee1c20e49e0a88d511f059d04ca182d5c1cd2782f9fa9647a47061100eb40e4bcd5c1dcd87c5726b1272bc4216179bbc1e876c7e4d9605214970b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4e8ec2200b43786b30361e150e16c86
SHA1c2b92ffcce36c202f6de48c641ee4dfb146c105b
SHA256f866bf30b9d5ae70fb6bf90c826f0be6e485ff508e538d201888b8b96d703ec8
SHA5122537d1cf163b57e3d46212796e090cc1277f4ba9455b03529221b05899955b0025e23f1bd70ca9885f550db7fcc9b62d24215b9a1e3c857cbef5f0113845900e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a