Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
4357a2d16a98d9df20e319329f7b0bec_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4357a2d16a98d9df20e319329f7b0bec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4357a2d16a98d9df20e319329f7b0bec_JaffaCakes118.html
-
Size
19KB
-
MD5
4357a2d16a98d9df20e319329f7b0bec
-
SHA1
92f34304c3aebb7c6b6360b4612c09f1755e6c77
-
SHA256
5f7ff8308a409534ca62f31ea6cb6f92c9c85459914943e415f08d108f3f1777
-
SHA512
708999e8d689576a09f9c416d1cbed9d57b09ca5ce18aa890c6ded62608faca71fb9f57595f11d8210dc115e804b06998d5a00c7fc2e4a6f8f797b9bc869e664
-
SSDEEP
384:ziiK9XPVBD8c8Q3R7HC0cnqRMdR5D4QAmccfIk9xherq1zVc9k:zi7gcf3RHC0cnqSfdOOIk9erqtqk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7091f64f4ea6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421887659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B563C31-1241-11EF-B290-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000dc7be527dd9041d8b4c3f714786de838cc513b3d6a78563951d992a52163cc12000000000e8000000002000020000000d2645bf6c7bf5af4664a73167c478cdab94983804cdad785b1c4e3ce98f5626a200000005086d247ace810026766b0979649f7377c096bb2114e45db0574fe49c5a81e9d4000000054f90337971a0b77e38e741fea029ca77a1d7cca91d422e3907434bfcc621cbdedfef60b485903ff6591eaca2ac1f8856e150dadcc44a95f002ec125110cfd23 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1960 2432 iexplore.exe 28 PID 2432 wrote to memory of 1960 2432 iexplore.exe 28 PID 2432 wrote to memory of 1960 2432 iexplore.exe 28 PID 2432 wrote to memory of 1960 2432 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4357a2d16a98d9df20e319329f7b0bec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201cfd2f761e9043fbfe2066c4a2150d
SHA192736e25a9c258272fd07e1f61bf436de133def8
SHA256819b797a76b2adc05959c9970f7678876f913f15ee7068f8903f3d2c91764645
SHA51253af1823af1a8b781b9e4e2fe294b413fe04e7541d92393c7ef1c75c95e6c489dd94c15efc2c7de0be040aa778ccf7b9a1d60d4669c45a06c55a2ef2b90b7cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5847df03967cc4c0aad2bd021302c2767
SHA1555fe7e6d54b7887cfbf0b373e9be38d3e0b5609
SHA256e5a654b9d9741324578ec44a6b3ccf26b89747530fad53c09fd15f377a228ba9
SHA51295c91444e4a8f8f58fc7f5d603ced09709ffcd8b58eb6e6eb1c34d2194120209efe1ecaae182e562805681c248c01aa15ac1435dc5f2feaeaf8da2633ef03b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a4cfec9183f1c69921b5727ae099643
SHA1ef9d500acf05497268579ef09c4ac842888bf0c8
SHA2561d0457e8f4caa9cc0d55c2483230f31dc926b6309b70802333e51ba68cd4f163
SHA512ec06c904184106fbe5ce7f9ecc16dc59d1f853e1a2eac74f13e430ed07c2e9d9ece21518190e682a290d54256b88606ee3750557f3f404225a5b02a155dad170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5066f610a310865125afda18ff50a22ab
SHA1bbc991f12cfc6bc3fbd027fe2169edff098b2b58
SHA256610bb43e86225110ca8b129fddf8cc024e62b03e5d9afe76d9221717e666bb76
SHA5127aae5b3892a3673e01f302232df6fe476ac9cf47aab130da6f6da1b425fc3e36b6c37c4ebb27fffb5f63bc09b2f20f4d095d9646a09b216a87ec91e91e86c406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7aee1bf1998593e74155746faa0ddec
SHA10ad35ece90b407e6938775adcfc94591a2803d3a
SHA256d953ac79456bdc1a24736cd788585f12a18759115d2ec74a2a399b8608d14dfa
SHA51270643b7ff655cd6c43aea26098a8c73575e075b8bedb61bfefbb4f963fe97a43b4e69472aaf2eff17d5d5f4633e1c729944db2ade0d5f2ed10c38173df4e0dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56678d73883a8e570d94710ec7f54eced
SHA1bc66579cc47d118d1b058f5627c322080ea1b949
SHA2563f46233e58eacb1e07351adadfd736c0e5588613d699a549a04e8840ec0c369e
SHA512a0762dd4bfc74d43f62d7c194660685b08bea58b88c8739413ebcf5e3ff4e677c06ca4e544a1e60f5215086760ee78303eb683c7c9770b0e3a2d0a9cc9f49193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3512c8935221ef67bf936b36a57610a
SHA120d98186c257b1cc858ee4d698d0a62fa8e47c0e
SHA256991dc1e4c283fb4a9fe2b310e60cab10c369ac89221250033a23b09092c95431
SHA5129f3f785cd55a4349509661de0e319d8da49e33f4db7c060261d3740082101ddac19cd54b211f4a27a23ed0f99041e043556b683f3088d26e564b5a32282569b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5927b97274c9fb4e34509d63cbf8aff
SHA1f67bd6e2c1d2c77543652652681db6237bb6b254
SHA2564f3e7b042221464e9b40ee85d702fabac6150d7ff866152f5f9ea03823a80b05
SHA512b14d337547e95dcedcae8ff7b34dab125763319196160de78002f07043aca6950c4f30ba56642e6ef9abca34b2aaac6636a5c1b02e343cd62ae29b849a8465a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519a6e8152b707ba73dec93890db0e0c8
SHA120af07b4010f20cd2a554f5218837fbac4993df0
SHA2567e0a647365805e524b13eef2a4e595c65c8cc5f51ea5767d4f6afe19f001af45
SHA5126fec069589fd5cb33cd625f28b55ac5e0b6823b26332b286a75a70d9b1bf23798ce6224fef04e3667c5cdb2ef4e43bf027f761fd7d9ba6ebc81995baafc4e0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543fabbca63c87a2be8d9826378b1045d
SHA18d9985c5da37a608f28e5f74051143a89a3561e0
SHA256192d39f93c6b9576e9a968449ce7d16b59695a6563fbe1d0008ce31581aa3783
SHA512ab918b8a59b1970a37f9d147163f05510cc1526dfc23196409bcc63b756535184f721874caa0b1e110408e9b5770a4f02fcdf865b5e1725682198e9b76c2019a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427d2f20459b9420e1813c129e55e229
SHA14648c44d00e498318e7138a819799dd7a6a1e722
SHA25603424199421c228eaf2676923fadbfc56f24c836279627c00c7bd1382e8c729c
SHA5122b250c36fac8b9f90449cb0ab9dc8d0a9dea00554004f05b4b4b601cfe0d3336897a2b8ac4669cd44ed40f720ad3e99f1c2bef6c668cd1b15e109c3b3fed7205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed549e6417fd65538ce32810ebe80b1
SHA1ad411fa701937246a7b4f387725b40c3822e9124
SHA256512aa82598fa6bcf6537b2dcc0d7e3f28ee01f16072409e63b1410acc1bcf38a
SHA512072e6b585e332861742236aeede175a7b6450e6cd2f12e7ba3dc7564ced53377485fc1f1b6920b651d10e0607264968296c72c99de71b8ddc908a0ffd2e0395f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e128734e5e4d58e30823ac451906273c
SHA12d586fb1994b216ba12641ec3828417ce6b0a190
SHA2569f537be32ddec4ff2f085bfd5dd48ad920027a9e64475e7f503b9a16df482ff2
SHA512e3f1a153144e1b4d3d21b8aac4cd0748dc10a70c59f83549828e751dff565a7b01b082715fd52d7362d97fb65698e4427ae906bce66abb1cac6e0c3a76d3eeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547dbc4e0991d77088e31b45f71285562
SHA15edf9f6358468f452f9f6d262305cc24ee5ad4a2
SHA256c6ba6078133a9bdacea67efafd47368fd4546f483068f4ccee64a18495f5a4b1
SHA5125711de2a1d47f78295e06a4479f94a30a0dc78f5df82ed2a277aa38a266c4f4ae5e66b82b73087f90c8c59cb66d2e46dcf29c4f683187810d29a9dde787de4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553446132f764d678ea88bca835d6dd4d
SHA1eeee365cdd8d3b11c460db495677169c160cf00e
SHA25697530ef8f3ac9edb0b3256e73a4527bdf599c1d6be24e6c44730af247bcde482
SHA512507de5c3fcede5b1058d22006a69730ba90797a266dc7846a155b1f8dd8ae4e238a0a234e1d0b0d2eeb584af1732c3bfcbc2b320c55bf59750aba5aaf12da815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbdfef6c2e7e9fb85f0619da59b8165c
SHA12e2f5c241e421f40abfe5d07a4e6f699ef2ba2c7
SHA2567a4ea331e5b21de7345709929ee1e2d2875326865af57a9ed98372322449236c
SHA512ac1ca8ee30559c3df6437d62310fc8dd3e641ce38b8ba2e46f68682e73ab8e0a0beee92268cf351f897fec538858889511e332394fd5cb65ff2f67c533cc0a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f718be50e56e0a7e220d3274920c229d
SHA1fd5d507009ce72fea390606016d9012895a3ada5
SHA256f790597ab0fdb3c1ae222eee45f3f08670df3ec17c0b4fef6082b0b85802fe7a
SHA512dea29ea906e1cd739f07c9810f9e38445ee3ab2444eb9c5644e8ed686518b721c81d86468e7ee12c915bfe7e5ef7ec0d3b6026ff92e0c063026c97843603457d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531dec21ac4b299bb63aab1447547181c
SHA1116d42d45da92237af4df586907ea8b6eb7578e0
SHA25639ac48a2b13628cff5a46e8f73be647e80a0aca19caf438550a05791d940ef81
SHA512e56e2acd608b04f0bea4156718b259b0e7c704c66d7b6f9917a98065b69ba39c5dd6f89f1e4770b66b0f35119941b96b427f2b25563c037e58d33709d978c1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ce40ca266def37e806dcd89c6c2833
SHA14e5ce46abe5a6cfa786cba7550c175f8848e0fed
SHA25662448d27707e1a7049519d6c3c97746da5d5fa5815a0f6d107e26719a2feab98
SHA512cda6e28f88cf6fd897c8106cf59b5e20b5bb27bb498a6b329356855a03686cf3d9ab25eb6890681e3cac2b08ae729278632c5f7e1be1af6265752407b27fbacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c52c7ab8434fc93566719d5048353d9
SHA192622d6219f75abe1d929aad39c7c5351add94c0
SHA256ae064a19088c5b73e6d1b48b21822e1dd4eb504eddc4723763484a7499117899
SHA51220846099c18e19471ad590050d5d5c3571084c02a18a2929d4e03cb37096b1b79725d60020549498520f4df42ce1ce6b6c97c8d2bcc4106f8f3a52ccc5874be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f9dc531f6a92ce9a55c52fc20ebe03
SHA1c038fc9dde822c49370f7911a3da0d1bba5cf52d
SHA256a0b7ba26ea7140838c91aa6fa7f953cb3b4d549bcdad52625aa78f524606b92d
SHA512d0830c960e5582dfacd089853b8b91be2f2242f0a6338ae7835c957eb636c092031c2fe0ae42c2e14566909fef4655533bb024c788ee5a006e337d5f25b3196d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a