Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
6d0954e7b67b10a36698e2a4af75cecc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6d0954e7b67b10a36698e2a4af75cecc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d0954e7b67b10a36698e2a4af75cecc_JaffaCakes118.html
-
Size
21KB
-
MD5
6d0954e7b67b10a36698e2a4af75cecc
-
SHA1
10b8b18caa8ee6b58587cf7f036a04945e05ccab
-
SHA256
b5a31c44dd7ca7b79dd9508df6f8ce057f0bab96f0e41e64bfbe5e99a90a2232
-
SHA512
aa5315c175ba8b3adca24d9c23aaf3cf52d1333eba61c713600073bda3e48384fe7e137f7f0a409ee180ae052ba065cfbf0cc17ae33d3f482c6b6848ff46e9e8
-
SSDEEP
384:8SlzUUAiAoTtX4LIKDeW6U2E0G55EULfLrTGAoxqWyXVpcvdl:8ygUzzTtIBx70+/TB8qWyXVpcvdl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BF57FB1-1973-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000091f7aeb63602024f829ff194a7f59a1700000000020000000000106600000001000020000000126df66640ed266d664f939645d343e7e7cfaa86307b114a3931907e5101769e000000000e800000000200002000000082941734c030ce60a564a8ffd5a9544da5140ace9493df1737bb8ea6aa0c5098200000001433ff4e74a061b55a586c5ad782d0626521649d94f7fe1971b5853d09478ab1400000009b3efca9eb18761512d435f6676caa51c642fe696c13f95f9a915be21e0c6525a7d9a6feb95a5a0f2a6962930f644308705dd418aad981328cc7493893ba9258 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422678632" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b984f17fadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d0954e7b67b10a36698e2a4af75cecc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc945a7bbda029739993e14a0b97063a
SHA14f1f7fe19d6fb55c81fc3d9045fd1cc08b8ac0c7
SHA256163654dbcb19f48a83d522032fc9179e7277ed0356d8436a0b78aba976d3c09d
SHA512dab03c03ac988341025b9df1e6518a3e78262104581489d4a3cb2a7c1959878befe514e0d3b69fede1b3583ae889de688e3e9126947a67f81047c030d169c128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553a83ad144332c1de943d95dcc7af63b
SHA1e7caa609b16c4b9b39cfb8834b8ec27cce605799
SHA2565d2ca3c102fd7e1cacb73ffd3e686eadad0a111a65921d3cad0b0b3634ed7b7c
SHA51293ebfed3470ee276cd8b79bf54eb026020c3814b34be2f8424f48de9a73a07148577c2daadecd2288d11d418981c0cd958461ce849f070a51ebc05bda27d2b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555b75a5fbc3fc53aa58e7f813b46fc08
SHA1ff55fbd913cb872d0c2bcf55b32e585e0be97dce
SHA256c43edd20f9adbdf4f899bd8b7385723ca1a110d827e094b8b37528de3ffceea6
SHA512b69d1ef6a01b6cea859966f2cb2db7216a4cf8abbe8cc67d3e38efca5988b32585411ef9bcdfd31850cb87c0b0d8a46c6435c4be88d7180c74cd9719cde3cb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd46792cae2ec3befe19a6b4633c2a0
SHA11563f6370bba39b791e3a42fa2d8f24a2e199621
SHA256fd3fbd57490b06098cf83b60492692e8c912d06f870bf66dc59caf30d13344aa
SHA512df4b2bf06516003ee8ac8a0ede73cda7344b000282fc5dd387c17bd60d10212e04437c6628cb644b0ab9e6c321f01e46155f11732d6b2a8487541f892873b31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58744978fbb0c65a3d56ef91109210d4b
SHA1fa3124b3e1f4ac8e96d8c343bbaef288fd8dc3d5
SHA256480c959deaf2fc73617edad7a014a7b81663dbeee0f42f14c330332760f8e934
SHA51287d25575fe2c548ef4fef542ff51806c57edc87f7c6a1dc17d2c6d0242293a58cddc36e9db32b3425433663e320fdace3f4c6c3c00044e26dc9de57b74f5ed7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be3194ada1da5f95dbcb8ba03b08f0c3
SHA1cd66a14b0cc92ad375a7be3cad402f4084695ae6
SHA256ab249c91bbd84fb61daf5e1b170d084328dba32fb8fbdc0753bc6916460bf9e4
SHA51248acc5eb4e7c09a80191e5db248eed995880cd1f3e575e2fcd3937a5533a96ac757b379a552bdaebca30d991e353e59e25f10e03fdceb4d4b28a77ce3f7472bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce77460c05cccd1b1ad844e1db503562
SHA125cb7503f6e26b14129a7a4244a97f4bc79e132c
SHA256da874fc88a83afde4aa461ef5adcc1a6fb7626d9318272a8f6bb3bed47cf6a79
SHA512d7c6995d96650b4118b9dcdb4f318ef9ba6ff5bc4bf158949e9e25586e56894731e2d720cbe57d93d16e7b02983f366b6165dec97f03655a48d1e5da669f92e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56589bf3e735989c895a8d8a76f01c9c4
SHA11c4e93f161f628458fa2b846ca358de4a09c5d78
SHA256929f72ec2457e2c676078c6955abed4f1540e583ff6c94ec3cf66b7724f928cd
SHA512a0a7e8d8c68a71943702d18de2357742da476fb16ac3683eab07cb09f997bafee916b151ef2c27fee7a422f4d0b421420c7e49190630fb36b287967acb6c359f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1be53ffee52eebc2b06a5204299d54
SHA10f90a87578955e97771233e13bd3f9bce065ba93
SHA256dada87ae28c1ccf5c377913a5d55ca2b8514e5708d6446b77fb7548bdf078363
SHA51289ef595601a15dabf9f120b2ab2eba8d06658cee8f30cef5654f9a04cac1b0827cdded95f6c042e73831e4ff42aa763c7e53d8caeb873280b9e078c35ed0190b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5618097ad5d03e850f97ed4ccae469f8a
SHA11b43f699b36658f05494a91c9eb64c8af066566f
SHA256da8869a322eb8085b1f41d076a840f357a44c50dd2f49b459060be8a42a3610c
SHA512e843c505b06587223325988a7ab3c0b2e43a6b292c64c629ad6c84e70e5201f199f545caaea1705883439651652772252f0eba25f737331e667af794e32239f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a428db14e285d6aaaefa964004fbd6a6
SHA17234c16c7fae689b727721e7d64c564f2cc9ff59
SHA256a8f147752f3ff456b307086763a2256cc5e574c1ab6e0f69bd170a68e9a7edd2
SHA5120c33ada138e93d864f2f6593cef781156c49daef3fe4a0fd2748a5f83002c70d0e7ee49333a7c3fe5a56e1d766e3784fbd728a4a4cd8a6959b0f7dbf803b35b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b419f27ca7689faecfec0b17c01d9f2
SHA16fcc5d6d4bcd0a987eed6c92f44e16b78c4e985a
SHA2562d0121f37de22e82e187fe46d4be48cacb736925d38c0325e1f5f6cf63d48bc7
SHA512700ceb95abd4f311c061a8c975ed5efa05df3714d05c3ddf1407b722f05a76741228a478e4762930b368172be981c44bc047c81080f08907652a87689928f367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53718f0ea282502c60e582d7296040320
SHA1d55e6af0bb930820aa32fe117c354819160380fa
SHA256e8d3c3651d14e480b386faf9b47d25e9468dbd517621c7d86c356460da876884
SHA5124c37f8a5ea0af32641c6710bdcd9bf7be7ff571d714f2dca8c6fec624d1bf70501abcd68ea870ff4e49f8dc85bcbbc5f4390b86c6316746615d7860d258d6d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e68e7ef877933d698f5ff341d72157a
SHA1884f229e7b430002a1856953e3c40c20e5ce5f34
SHA25616fb026982ac13c33e21233bf64c44281792a5a3f3cf7677dec223d52db2ef8b
SHA5125d08ea03c32bf4b4df5586cd4a38801b82dae4f3a1cb4e9e8d757e0037c9f69b447bc1c24e08c7a9735d961c877a2f7d87f74e380393631d33430927bd2fcb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541c229e9b5056d6884445cff23aff04c
SHA116e1ae5292cbc4109340d9e82f834d63cc720fe5
SHA25627225dcdc70c03f5dfe0ee7eadc25392b89b7d8683ad2ba22d7fa03f4d39f25b
SHA5125a22e5156bcc0a156859a760b248e65075a4bb8e5569bf29d47a97d504dc7e9de6ece288701b8c46866c03855da1ec3096e9df34b36c1fce568ae5cb60a7baf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281e5e2ee9c3a45d7a8cd44e1118da40
SHA18f3665bee9d282393f6fe6bdd2cd49dada8797ba
SHA256501c6c2b7d8bbba29e1f635e356592056c37ce0877540891a57fe1e8318ca137
SHA51263d4c2f495b91ddd61ab0ebe7a130670c685605af6619bbf7977f65aeb68251dea5d7870a0757278f6d6a12dfa009f0c6a6c8d0fc962478b70b3804f07e3247b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5278e87ae1712757626e73eb75a2a7
SHA117d6339222200aacc803c6d18e17330a64d5b1ed
SHA25647328912691f36dc0dd2cd9055fdfb85ce72af0c676d318efebdc2910b06b967
SHA5127bd288876574e1604adaa02663907ecc4dbd2e68e464e1ff9a497e4166e5144f3b1e36dc84f1326282c13c66cf138c241b803d57aabcedd5f327b33fe922c281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56601352bc7b6f1606edb60e30267a6cd
SHA1bea93e7e41789a24653a579647588621156c3375
SHA2564ba7afe5ee84603e30b27ae3387a5a9d7a092bb63a92043fa53628e0c7d81230
SHA5128c9e0eebb0c487aacf3549adccf67e965a159ed26dbd63e1cfa901b684d067dbf260c9e69ff7c3457cf30fce1bc216c88fa1f1b8dca0be695c91136e6c997cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d0dc49e22d1b897b34918fe767de4f
SHA104fe4dde7919878833129e1a00d8c17fe4628da3
SHA2563279ffc26f0b76c970f6d05685e4797e81d9b1e3512987cc8da9e390d87fc250
SHA51283f7106c6c1e7313eee307dfc42e130aa3952d0773fd977a6409bf3fb1f39c628450e59c1f6a1f96686e95baa05533e1fa4f978bd6a18d4a804e27b1b5923557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57834f9f9ddf1421dc6c6ae3eb36c0bfa
SHA104b6ab88e2d99a7bf2465bbe2ce1646383107a12
SHA2567fc88a2f58f7dd84858012a55b0fa16e1cabbed7b04855f03f5662ae78b7eaa0
SHA512d33d956bf5b4b58cffa9ee2b8b68dd4b8f146161866302f80c9c3e6a5fcffdcdbe988b27f3363d7b98c75373d3f2fe75be98f830ccbc7945720bfae8fc448b30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a