Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
699348d980df18ba1156ec8d7b9aad4e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
699348d980df18ba1156ec8d7b9aad4e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
699348d980df18ba1156ec8d7b9aad4e_JaffaCakes118.html
-
Size
460KB
-
MD5
699348d980df18ba1156ec8d7b9aad4e
-
SHA1
c187e45c79435826ee16d48ec62919ca72933c95
-
SHA256
9d69413777cfdf289cb75d0d66115053e7e5185aa16a38442500b383faf8bd00
-
SHA512
ec1a5a6ef631a3597c5ec6096520d7619cb6287798bada598f82c9d1d9c62c1dd848434505925ef5e5914043db29d6cc31dde3497b4978fa9d2bacbdde460e3d
-
SSDEEP
6144:SCsMYod+X3oI+YxqsMYod+X3oI+YRsMYod+X3oI+YLsMYod+X3oI+YQ:V5d+X3E5d+X375d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f063acc0acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3C48111-18B3-11EF-A1A5-568B85A61596} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422596478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d99d732b87fd0247bd0f06af0be5a9d8000000000200000000001066000000010000200000000e68a06294b9680061fdad710fceef87114cdf3063d3c68eb4e5c00ff58edd9f000000000e8000000002000020000000aa77dd3f98b5c11b0a1daaa2805faa49efa3cc81813862a3bcde78821c21120c200000002afce96991f6e0ecdf4f0c6f5463da46c00e92c32047fc66d423c6d0bd9d830c40000000f6a0b17cece50bcb193cf9f47aa6fd321bc50912ca313aaf78ff7f3e33422bece29ea87c9eacf08a9db415b43db4eccb432947c3bc5a6e6037baf8a39439fe3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2108 1516 iexplore.exe 28 PID 1516 wrote to memory of 2108 1516 iexplore.exe 28 PID 1516 wrote to memory of 2108 1516 iexplore.exe 28 PID 1516 wrote to memory of 2108 1516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\699348d980df18ba1156ec8d7b9aad4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d38971c4f357dd674f62fd6aadaa224e
SHA104294563c224cd16b25ce4219927a317a4a2d0eb
SHA256e7396d97893f829beb41c1f248a8b3acde66f03f33c8a2c56b0eeb826ec581cd
SHA5127288809a542e40c6b2c7510bdb4cc17d03274affe5b6387b38137ef0dd7bb7ba64ff5de57d6783218b35c7e472b393b1c33c4192b6c1021be40b5108f85ad47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26d3a3a63f8f1bc00a4297a1ff05322
SHA105b5f1d3e2b03f4d78752226a5e4f42a0163da22
SHA25625d993800ce3a2921f41f62568430931a9dca3eb88f37ed79dcc50b15c015655
SHA5126648e66eed17daae504561a67299a7fe843c4b37b00ac4fa35d29f057bcd75eef428b4d5e9f06b0b1a6921ee30a00abebcd865fb7ba460b44ab18862703fd856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a9fb78d6cd594e82df023f04668782
SHA12688d02e67c193667c1bafdf1921c78fe9cca2b0
SHA2562237c41de2469f5c5c5d48c2d6807a1ae9d602b1176ed3cfc909b2374159cb23
SHA5127e8c29fb958a0ed5066471e9a2c949a7754da2fb1dc96a2f5b5a379b9265cc597e195812102be40153d6f82520dc94fa759e6e2c8da6b50887dcd0b32fd140e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501600d220cec5bbbee621adc0f486e5b
SHA12b2eb504645b115bdcc846e1e53258aaefe0715b
SHA2569793e8ed986953e925de2fd23a3b4e5c63ce651cf2af6810423365cd4f65aa0f
SHA5120c9ade5441a7b381512058f436124c15960e69acedbf0b1d1326b73cc7421c4531365dcdd2afba413cc5de144dcee633826735b3e63b1ccfa16498969cf33b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf2f90b9ab7326e3b3efb5e949ff569
SHA1a72b8ec8e2c5d787397fd37d97448c25bd5d880b
SHA25681817f65847992adda08656b4c6879a75d69025ef86b29c475d0bf21ee51df9d
SHA512e90bf541a24f4b7e93a95ba1a16d843c65e53cbc136ad327be138107766060de94d9a9ffbf8a928af70a0f4ba9d479f68e84818cb6929fa800f3b2e8d33448e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7494150099a13b2fd0507fea85d3946
SHA1846959d92a03ad49a69f3713d5e2217275c491b9
SHA256d933bb4d2d5b1fea77c6caf2f5b726f10f67fa2144c141c3fb75c1e2fce60c92
SHA512df2405cf7229e68e569b2d5e59c9f431c9e77a7a30f253c959a781d001599e30b60018932018195f2612191b2d922d44a28791bbdcfff15426b4b60bf89305cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303884ff4253b6a989ce3f83609162ff
SHA1bb246719a003973ac644aa020d4433318bfce381
SHA25616e70697182f3bb539125343c9ea49cba55f7ba3445d4b5e4add8b4243f5853a
SHA512c18cb7e5918780a694972792f2ad0fe851b43a6a6cb3d4da291d75a9ee148b03ee946324edb081c57a759a7dd562474f30923442345ba0d226c608a586ab9267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a8470220e791aac197a6dd30ebca739
SHA1604f21049d023a8898e60ff991c64affff704d40
SHA25625ae3dbead1ef63a7cbe518ac92147b43a978669472a7f0cb898333060fddbba
SHA512e29cedf9ebb11b9a3cec876e49239790199bd276eeae3aafb85d4a8a48f74349fd9c6dd468b26e420d2d811c16eebeb1513c24bc2cc0eb845248bf18d1d083f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af48a86b2cacd71b21f5adaae6ac224
SHA1e62ee8925e7e2fbf4d5b1d673cdfbcf3fd1149c3
SHA256f95326ce62ddec37d50f131b381c3131dc0da91a265716de1da71c1930d21c9a
SHA512cc3a94ccb3426f9f928f4253bc405c24d9521935315ac307b40dc1c70a1e39d9cb0890e88bbf60a10bd41192108696996409fbc28876b3bbfc889b80ce3d989d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b2bc5aeebed41473090941b0945b09b
SHA15050f0f4d72cd7146cedaa5af83a88c777ab4700
SHA2566dc6f596c60416956a497f4762ee9124568a1f266a1ff80c2050867ba2e779d3
SHA512fd1e222b8f97f5ea0d2f116a48302309903dce5944811ffd42e2db20151d31c60fd97c69297b1a518d287974df2fc14c92ee295a6d553551a6b2c3d3a8996eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ecc8dc48cd6459bf1a642ce02b1130
SHA15c92fa9345340cb58c3f41e2f2d136ac93308209
SHA2561b150f3d4880139f20c55f770b9076a02d50237d73f673901cae3bf4b1ba0c43
SHA512bbbbb08dabff2c69d0314fb9f66f0bd588c5107d3dfb93e5158ef06e1b863f5cc2b8398f828063dd3f47557de9e091e11345a1833f33b9294dc6d205d0ec00fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a268300a370c07b2dd7999808867873
SHA1a967ceaaaa8ff3d80ba987e20deb0502ecd679bf
SHA2568e24ca338dd0f95c102fd362e09070efc9bbfa67a4790a1c2cbbc8229b143e19
SHA512f4b7bf364519f692e4f7c81b1e5f7d4f4af41aefbe018bc3212fd0cdd667b6439db4ed42bb06eab72d9dbb909e9d624fd64add399dd021921e4bfeefb4f322d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56144b91cbc615b629007967b6b424ff9
SHA1dc0f02ef2d878ede7b48f7d4248764a5258ddfcf
SHA256453406c4b6daeeb7ec9b252afb55681a3a7595f1a7874423703585281de04fdc
SHA512a92f4b078ef1170e4843eb3c9aaff2c52b1dcb4b579384fbab74434a851e81c7ead9de649065185161d8209bf446f3156a9ce1a3a5755eec5852d55763ace4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53549b06e58b97b10a55d5ae39b050bec
SHA1e8dbd2cb220b2dbbc732e4dd6ce027d3084b85f1
SHA256e695526bda72a6e1ca84af0b9f07029223ac27a7ee1362c63a29ccc8cce4f55b
SHA5122cc9e8d4fbd560846e7d57b633f105eed45e3a5013c395bd155218081756623d281c2ab29c2a3b2b38a3792333f0caa3beeec7c51a382dae754180d7f742b396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f8fabb86a89ba11a23baa66a6635542
SHA1beec32ed0ed07fcbc68f3fa6319cb084226dec48
SHA2567e4c50073bc746a8ae0bbf530e249cf78b02e455112eba36de101ff0bd6548b3
SHA5126adeae701dee1663a9d2dc1c8edd35ac9d9e3481e2f39cc81e3e1a90ee94a3f50db6e401ea9997147e16d3ebe443c0dab037ab16e73a966af8fee8e6eb7b73e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ca05c947b8cd31d739a74df52d04b1
SHA11f5a4eb12df9d06dbd9134bf5783fced7ffe6261
SHA25673c9eee7b28b68482f409b7a3cced51a8b210066b76755eec0e1442ff56e8db5
SHA512cc9a0d2dcb47978e1f6fb1d589679867370325ed628f80f2a315ec6dccf15df7dd307086bdcc10b5f0e38145eb752d3cf69a2b8c880ea68daa9e52e35b20add6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521cf3aa5948df44ea033431f39b1c089
SHA16c03db960a060451c8167a2b6f051335d54b601c
SHA2564095a5d7b515dbc2960e3a0bc796f5e34bb744ffbc258d525c278d1faa6f0e93
SHA512600e19580729bcc12aef6df4da899ccbaed64586d252247e0e9848826d90cc2b9d5d431f0f81972f3ade544f6c183ac506f9a2d3a0e7220f3860e4b712e66d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a4b1a6d0b98f18b8d2315d7093b1349
SHA103770f9dad6ae9349e46122fdd2366808c75619b
SHA2565553061fa2260bf86f1a9e6ef9abc54aa93e8422aa8f520c1112d62ab2f7da2d
SHA5120c64ac3432b3f06d2fd669929f37ac0ecdb64e0c6040263b31bae5ad56d870f04581fcb5c8e99185450ffdcce6e45c94a42447883e3aadf73bd093784b96c1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5681699c3380754b2d5b852a93fee739d
SHA1665decd8bebfc2f591b4ee37588bd994f6bc3c4e
SHA256eb5b6ea2e85af394c9e0480731c889e9d671d6d8efba33ea2b3ac9894d1efb69
SHA512929eab9397abab9e69016dd3abd2abf8de2d1ab0211576ce412c2c7e8dd630a504fff5a68cd3d77491e50e0a3b9d9b9004b5f58c8504cef42463d1397b331319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471cdde6501f4af314bd0c98cc0bbd3d
SHA11450589e48058b43a2f9bdc8c1615b4b87e251fa
SHA256cb67d3ab48bba9f8804a3228c2c751899fd4d54dadd0b6af350ef630a930d894
SHA51228448f0321fedd529c35c1408c3433843411d663bb0345b82795578f36afdb3a9562bedcffe2ec41a904f35c27fb8f9c302cd836793d5ad4b7e4d6aa35c9b4d6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a