Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
44e09f84866be6b2e3c949c88e15be8c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
44e09f84866be6b2e3c949c88e15be8c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44e09f84866be6b2e3c949c88e15be8c_JaffaCakes118.html
-
Size
23KB
-
MD5
44e09f84866be6b2e3c949c88e15be8c
-
SHA1
efe1b2d8f79eb8352aa8ebf283d67fd1d6a9dc4f
-
SHA256
5209ac3eb18818af85b8f4c14228e69758f15bdc9e1aff487d5c1d6d9dd13dbf
-
SHA512
d0154dc3e91e5c9d2f0563474864b1d0187a69df62f8472957adc13c7f6c441f72e4b889a0df81125f6b553e6711d57beed6f15a9aa4d05cd47d783c4cbc6f18
-
SSDEEP
384:SUqvh0eQBpjLamPe1WD4xSWSIWLXhspgTX5PMSfsmb/DiO+SiM8HHmcFh2DVl0rt:SX0e2sKRhspgTNMC9R+P0VlgFfW+Z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0041721-1283-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000060317c724b255cd6eff404a3a988d06157b8f423a1111e3bbdb3b01e8fc8ba23000000000e8000000002000020000000bb7c1b6cb16e859a762a89bd729760f37fedd84cc54e777d29f08229f407bc7120000000e1f703284efd37e240f035fe5f266fed3256c9bfefe60fca08694b4acae78354400000006770acff8f2be15a4bb7832d69b9248d4f385acea4a18a14825f8403fc2162e79646b3a90d4591c8ddda09aa186ef32d9096d74aa156145b0a51a70f0adf0fdc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421916122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f4d19490a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2120 2156 iexplore.exe 28 PID 2156 wrote to memory of 2120 2156 iexplore.exe 28 PID 2156 wrote to memory of 2120 2156 iexplore.exe 28 PID 2156 wrote to memory of 2120 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44e09f84866be6b2e3c949c88e15be8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a4a78f91d3400cb76581c558c7e4a00
SHA1241377394d3059b9715233173d450d1ecfdd5d5c
SHA256c3a1442e25ea74b261109002ec608f99262ee856c86c51a7a6780e08afa2d106
SHA5125d036ab445f1846addaff5779164ca7d39ffcbfe4d3fed20ad3a49803b91f12d19c3098166b4b42db1d8108c4206e29fec69572c2ff7d5cfa515ede193f17185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b023c37db06bab2e108d1e51143da2e1
SHA1f4eb601b69acd1635f7fee34320931ca4cf9deb0
SHA2566a500d8565c29f05f0137beec02151854071ada9d09a695544400bce253a455d
SHA512decf1fdf1716c1cbe38f1a208e2f0a30943199a77fce0ccd8f4b1db949d45326e1bef94027f2aa2b49b07a09b652e4efce529c3df7503f12a48ab126951f5fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d12b927cfbadb16b519c669eda889ad3
SHA167a769d6256d9c3e652c3ea162d6fe0b5e9c8433
SHA2568ae829beb0f46cb6bd8992091bd1f8cb5d50cdbc8bb7c24bdea5a2b78a5dd9e8
SHA5126d29e96eb6f8a869333c89528a412eaa9547fdb1ba1283ffd3b7b645196825f87b3404aefa3a61a06009b79633c36696a5ad810129e96bca471902abb236b1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6862c13f7c2f42d9983b8b0b87ef68a
SHA1c3f713101797000a7a7bc5b7b339ba441597a4d6
SHA2564aef56c9ee801e734fec86ae75f7e9328a30807e2dca1f31d10d8ee50e28af24
SHA5121001e7fd6f123fc38f5ec03033df9d29c35e0aecd13188dcc45d182fea8aef14fe603d142878a617a506bdde4229934f4147e54f955dd06b07de4ed629d9f14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c43818848c06babc39edf68195a930
SHA1e021c21e747184f090ef15d4c9f94cd0624749a5
SHA25622eb96d0b39639a3c573a26ef7d0a1eb1c5a6b010f484efdb9663e06658c0e2a
SHA512af5b84bfe033f566579cc56da4fb6d5d50d9f9514e673f9d47220d4e05c0a750bfb77e7a7977878172579b2b4a554a9d8742d5faa2224d9467c82544c32bb242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5f6e442930d45d4e9fe453ec086f36
SHA1d4611c91bd256e350f0a7dc14b38e8e84588eebc
SHA256bb6a3db20fc32b047b32db5965821616a24a3fd397ac9c4847e8f9a0427d5c02
SHA512206c8e0062aa6be0ad9892a7701626befb75e28a395d1b091fccb8ea0421d3afd8faa50d2f155cbe829a076211f9b4e6ba9637ca2f09270fc8744d857db71a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5334067aaaa80611f7d0d191443b34eef
SHA10b7f07177ef5e1b6120c7a53dd3dd39c5a8b0098
SHA2567774afab8494d6c9fecb6735f2b734fc806dcc9499ba9770ec3397d83b2c9981
SHA5125610d6b7c34391b9e68fd7760f5bd9906a430b67dce551b2631c57349c28e25c405430f99f5213e65125c54f2151c1c69e77246ae6beef7dfc709f5f578e1d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516f63a5aea4d3a1aca54398e495da21e
SHA11d97d34385f6584e67f02ec088346b24bc0c4cd6
SHA256fd7f35c6933552f6f6d4131b05a28c1d0a80b474ec340d86a651ea45130abdb1
SHA512e0e851c75afbccf1239e73d68c94fa1e426d0e4f91cefa7c026d5a34de5fb252e169e63c4512c7f1559b2bbf49a3dde417830b63a9b4b45a7ca7f42f1a730c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b80b3778dcdf3d534c11ad61bf2162
SHA18333e9b30733195632b9e0d6a2e03cf216d9ba53
SHA256e48b89246bccca5478bb4192336b772fd322e0badf36083c2d177df17d0e9b0e
SHA512f275c5ae41c3a3d47ba38cc6e68bbf3fca39e5f5362f1b302f109254621a56cb7bbd71d37d5962f8192c94f3fef4bbc5ff09e5f36095645c1f65514841f4aca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5135dce83837f692f0b7463eecfa526fa
SHA1a048cb7e40e34c0d0b534bf041bbe859b0e04887
SHA256eafbfee643176c84d0e838a09129a99e8b486d901bf259bfb0e2415ddbd8519e
SHA5121094eefe7fc4ced14bb59bcb24c451b2b951aca01f82b029c611db7d3b0bd8f3a610fca8a5d02e1dfa31174fc70e8d66664e93123a40c54b08f85cd2ad5a04c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1afa8117dc6faf6cf30c2b4f49fd43f
SHA11e01d50b00e09fe4e7b028a887062600ea849682
SHA2562d21dd70a7a15cd4a9532359b497ac28568a41d379a81526a81cb19e26d0653e
SHA5122b937df70ddfcd190ff65fd3c91bf4a12c2fdaab4d7bc7386d3283a66d108b645fba3c07ee1a40b5fba05f518901947738cd5879fc91b839303d5e59b84bceb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b30326c5cda696bbe4b11c91b0bce316
SHA1c4a9c486644f13f4de74e72ed6687500754c8f47
SHA2566340fb0aca93591ab85e79327f52203dac36efb2caa7c889bac35664fcbe793c
SHA512418e69458484f059daae864c1a5af1b7f40c8034e9b9ccf509b7fb8cca73deb9aed8e5bee8bf23a4975bc686346b48d9a401c1c150b118bcabcf9b7569836eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9c541210a3544f20360871e1589a417
SHA1ce89f3c61882def93db5f8009a9af969e5b2d371
SHA256344324754770863c0785f51c694208f17818dbf4064c6474654eda3383e7d6eb
SHA512968afe328d4726c10cc2052900bc46fee89085d8cd2519d30acfdbe0c96cc13cf69d9ae73187292d329e93a9f9ac527c4a9532aeba01ce87366ebb32f16d4270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517b30b83f7720b3115221442ef761003
SHA1926b1cd604c802949f550150d9e131cac243b22f
SHA256cff221424adff374211d62a0f57895845bd82bc112e5abac81b6f43586432b96
SHA512657bdadddc6ac497d10dadf0b718e8d4f6814f02b41c56cd73179a0728e521565bf034d5eea7d00313a86cbeb1cbaf679bffbc7ede90927259ab1cb81ddeb4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aee937585a7e75a07f35fe234dab27c
SHA1bcecfe2beca58e5c18747a4800a35ebb8fed64b7
SHA256749456fb30831740f6d94e189a8b2c1faa1080dcbd96b39db06a6c927813ab80
SHA512ca65be52dd972805ec5e37a811ed6dc580d2da1051934bb20542c647da23aade3626c03b2087381e30f14c6454d8f21ddee93c2d297e20ff82f6759b7be212f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a930d07ad23b78c7ffe7876fb22693d
SHA1bc96cd4f525fc6494fc03ba18bd25037bbed00eb
SHA256876d0b47376eb4000fe3d516c2851cc0eff95116d8f8a3ee726ecfd6a279f815
SHA512a5004ad3f6a247e1782949b5f5266872d4c464169b1e96a662b729d0bdac9eec15c61cd0ad530d7535a0eac8cbd86e2535a963db8b1cb93db65666892f0f6297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fd069404fdb838964b689d97684509b
SHA1cb471eb65a3055106581b17b601d5716c6993833
SHA2563bbe488a4ac2ab9a8b6ff0ea604d714418d0bfa4f713ad58ecd09f9af5608f60
SHA512840812af55257271291b483d45755ba732860af6b475247a94041ffcb5e295ba16c5f317fd161cffd2ecddfd265edc0ec8c1a12a49daab15577d7680dcaae6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de1fe08ad5218f8fef75fa01dd6b202b
SHA10851a7bc01c652e9776cf50735cbc8ad7f86230c
SHA256b5c33d47dad1da5ece3e612a3c85868fdde3393e09195dc001ba9845230194f6
SHA512235e7699f408026ec497ed6136f4b6adf6a1ca2ea7408258414a37196de6f3a6335274360ce80e1ae2eccc4bc8cadf92ff2cee9e61b270a1c4f7d583eab8c31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742c831bcf6875011f3869055e9a18ed
SHA1286a2135b10bedc47857a939e0f9096b5eb4e179
SHA2562f62af9016e07ee4b845e91c043faf72e7d8ce71cb65058c0be72d525add513b
SHA5124ba2579928477dcdb2752ec9985eb67c2e4070e4fe42cc11eafd095def7e2ba3ebbadeaa2bc349dde920696d218f5e99e26614c70da747a76f7721fd476fa8e6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\yuiloader-dom-event[1].js
Filesize32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a