Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
72f2c759a14e3be0baeb8cc45db9d880_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72f2c759a14e3be0baeb8cc45db9d880_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72f2c759a14e3be0baeb8cc45db9d880_JaffaCakes118.html
-
Size
151KB
-
MD5
72f2c759a14e3be0baeb8cc45db9d880
-
SHA1
faaba6ad0c639d63d97bc573275ec315aaecdf68
-
SHA256
0a13c49556f6fa2eb7664a85324f19989b383de2cda901e285baf6cb7bb2df37
-
SHA512
e98b1bd37514b1670c295375d1f3530ba48d5e5eb6954dcbc6a6c4ced1809cfe6d3eee9446ed0333300e825f5ce51644087b7d7fb3c517c2949879bebcb45159
-
SSDEEP
1536:pAcMk8jlUAzMdp87a2m6Z9YLHdCvWW2l9OfUN:pABk8jlUS0ckSs9YUN
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b0ba73d6aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000464c117a5b66d91632d294399d4616c3d4cf47ca82fc3391bdadbe1d6c5e36b000000000e80000000020000200000004cba38365a67450e9f9e2952391fc3f53c631e1d33856747ec7a389c785a3a3e200000009e0e9affc17f6da2b07a053beacfc2477785e64aa9d2daf7411d54457a54231e400000002755e38d123f6b30a23cfe5f8b744c430aef4428e3b5aa00b11f095797f46dfa97275d3a16197c54d89ab7875cd0581b7db2df96e2e01400d59a7b98c8ba859c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a0ad16b3c9263e1d9ef024489b1f6df6a495f8cee1393767f079c72bccfcff0e000000000e8000000002000020000000339acd8c0b75d4e6be7e10eaf5ebd9c78f08e633e7d6c5d071acf53fbc2a9cb3900000005804b9caae92bfa4c37a029db93aed5fb8326b320efb2922e66d0e143f1341371c8d4ef11ab60e1e815db64d57cc775f0ee8b0042f1f25757f227fa9a0ea2ef05af7edf770836fc205663db2ed48561713056f043d78b4ba398a17a20964322dec90ec94f67c573764723a08a09b6d47b0d762c498993542dbcc1c1001fc84dfd5bc4be9d2085cd1ec9991044eaf262240000000de782f1c9f241ecfdc69e67a2f9f071115a6106c38a6b1a78c34586c50427a349dcb3e317973bc32f11d871000cd91cf4b276c38ed2fc2389316a63d2a98824e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C364E01-1AC9-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422825737" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3044 3016 iexplore.exe 28 PID 3016 wrote to memory of 3044 3016 iexplore.exe 28 PID 3016 wrote to memory of 3044 3016 iexplore.exe 28 PID 3016 wrote to memory of 3044 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72f2c759a14e3be0baeb8cc45db9d880_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5802f2a0f3fda3d11ef79b4dfb214bff2
SHA1187f496f0fbc3db3cda38a908b6747f436b18b39
SHA2569b501a9bcaa3ed8b4aa92b7ee518decac159784c6e17b075d39f3c32f2dd00ce
SHA512a7b1b33169a16f9a6f3d68c531eb9da1ccf5cd194e65aad57e33a1488c9e90563ead95a0f9f0fa93db7a892142e0578fe17e08a5ba2c629f91ca32d4dd05ac6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5315718c6228910511160244474b602cf
SHA1e5284c08703ed681aadfef014eb3dc9ba4b85c8b
SHA2563b69e763ffe2201efbf73e3a28136d1e81c1524645fbdf172d7641d0f3764ac9
SHA51211fb53a0d638697cfa2b06bfdeb37c1c798369f401cf8154c3b3db0b3b0c24e1b8d4fb8a7bf5f75a19a62be4a1881e69aede38ee27c5f9f001e036cd59537f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d578158d9e7c9a32d8d8a25b6af0789
SHA166c5196b8fdab51fe1aad4e9f9a5f835d6c17480
SHA256ea212877f9c1ab5e8ea60f2ec70c3b1bf9003a2c404ff493566029c40bfcdb09
SHA512087fe749ffb76af8537fe19e79e1cf76820a34b3d60a2fc5a410e9673db006a203b8833723e850c3cd8fec1482a8f1acc819e4224d846aca9a7fe0ebe077b86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f98e59b71821a12e120714a5091fc77
SHA1e2847bdb962ccfc7b25a3f8d4dca6c5bd7fbaf82
SHA256ca73f41bce24bf0fbe007f88b980fd392e6f045cff1c9246ce5933d76328dd07
SHA512a82413dca6db3a5901ff520949bfbb413ef219cfb693b276ec3e0fde1bbadca2080649ccb1071f5fc5eb6704060847db031ec5826a7e176dbbb71cad891d1e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e87f815a274b258290c67d0ffcbaf7
SHA1c03cadebe9e044a5bcb614c8069b2480f46c7da4
SHA256f8705eeee97d1759272859a46663075280db4068f41c7d9deeb062cd83752704
SHA51201da0603efad1823dd3f5f14dbf48c068db8bd3bafbf115de0f9cbbbaadb92628898b8ca78d556c08c7f4f8b4f993885a8d87f82f4da0baad931f66e2c32cd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df94ddba1b8537495bb724d229ce76d
SHA1f14f184032d37aff323308f776842ecc9631a7bc
SHA256c22d37862800e2af784c30c403a1aae84c24d52844f46dfbcbb534f907b4dd85
SHA5124c4134b3f12691d07a215b60aead3ee5bd779943cf84e8bbad353945be030af7f7673c804286e02ac33ba32d2e2d2997fa68c56eccaa2e7c293678e2b6cadaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3cc5dfe951616b614d7a9c53ae8bbb9
SHA1fcaf85a23055c209683994413c51fb3eb8393f3d
SHA256295ef7ea5fcd0ced05dcc33f616acd8533ee69f5b97bcac6f56add00fd064cef
SHA512bb1256332492278008416f87bfd68b7964953def2df6b90b6c82c0211c577cbb8c39a6c1ab2141539cbb0103f57a2441b0955a36c95437728366d7d94c80258f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bbf92746900bf7a6fa636b3b138d7ec
SHA14deb5e8a026855bcae26cc6a0b7661e58a9da028
SHA2567be8efddcf6c4dcb1b8faf847240436c53d8d43fd01dbbecf5c6cfcea448fd91
SHA5122443f9d1d718424e748200eacdae88523dacc19c8b3990baff2e13e192e6d191aafc02cd67142f5091b80e29a9f8b21d551759fdfb55685c553325a4c6cd8382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed7060644fc54ea8df560fb03d9260a1
SHA16bc52b389516618f747ce5844d8e0ed49a5cdec0
SHA25643ab25009cc24fd23de639efef098be45300331cd0df25cab32b128e33186bac
SHA51261d4b7bdbf5102fa26ea9f4f3021e444d31b4c3e9c745704d73b47790ed6a678cc8e7a2f4181d31c84031b758cceadb914a72e5d985a1fde7f7e00ac6d2a4e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2cb2d7276e206ad8741384f5726603
SHA197aa01dd7e5248238fc58be1e7b759d9a2bc7e48
SHA256fc4211ece91f34ee446e1830024a8cf442b5d7a0581f78056899fd7ec4b05080
SHA51238be3d8c558ed302ae9072ec834b6d694f6f5b1d01afa70200aeda17239f526cf46bec99c7d049004b5553406710e283c1022485ed8fbe7112966fdb51b388a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595dbe22929289005b14294122cb1db9a
SHA17eab6893e28eba56b398c1d3557ddec4ee78cea6
SHA256302b751c686c739184e1270487a44a2834bf6fc937df657ad2bdb16afc2683bc
SHA51238722817621871088a76c125b16cd602fa5e0801a986237efa4e292d9f429bc13ee1c828f60a9ead30d445be0d1d5a2c28b4ce27d447881130f59cf82c1bc7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f7a394a0a50277dc379ca90e64ffc0
SHA14d200a07dea9881c1ecf71e6a9db8b0d28847da0
SHA2567100c922071e1bf4a0d16ddb35462e437c2b0876c2fae994c6c42b746261408c
SHA512b2a719aa6987388c3ea6c2839f28db193ec9e3a68132b4baf4dd65c2eddc29f675b3f8a4f63fed0f602b6b30dd56cc4e17abf2b5a676a6a122803e36956bc35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eacb07447135f49bf4c45a7a715abc37
SHA1e46a5e36cf3429cf6cef568c0ab15e62bd570dca
SHA25620c67b57c8dc8e808e55c353fb2069f20a20f2c7c2852923829c43e354cf1006
SHA512619f1653dfe40cfefe739890b6f7682336781d6c64d313c3e14c409d46687accbbd844f0ae65900d079e73bc8e729af3c4a5234068c2e11eff5081495c0f2cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520936c43fb23a49003c9902c3873f048
SHA1229e8614a12c84b2384a5c6a978634048a1093da
SHA256134ff51ac8b3edde50cbeefdd0b678d37f810809f64fc0b58307b0d07125d691
SHA512b31af21306e7209c4be60f251ea8ec40f368828f68f035ba6a4f19e4a9382756f30e8a6c22f23a1be28218cec11b8f5516c89216858a2dcf74c507bdf836b805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ea05b1e43202743a9e7d4ac583e79d
SHA1435699c1937e7a3e0db76f8680a61f6d9f72bb5a
SHA256ffa6a2f8a06483b3e3f96af5cba0920c09279e6b0d88a61e6798b40adc892340
SHA512716037ef946185e3f43e8cb123dc5709a48bf43d5d043d9297fee684516c7b355d8bba795c2e6f4c5862f2289bfd03b81f3c1ff6a06e5e53d9107c8c63b14d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35b0e812b4cff62718d7b31288343dd
SHA17f1f2674a5e3aaa8cf26cb789348fb7f8b449477
SHA256cdc219623f573dd8a90920e559bd772193d1fc4d82aeab04b8e0ae86fb86fa3c
SHA512a4b362002e70281eadfcbe5c9ab5e37d52185414c38e89b8e78a4932661a7a20db0b89f20423f898279e264d2620218a30f9495bff937cab05fbe5e9887116b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d5d207cdd65b81b9a149994022fc12
SHA173fe128a789863f6fbd3d463e31212397fc4c84c
SHA256c6b39a8865be3b850140bed17ff31df67fa45a4de1286d1023c0ec1e9c3bcceb
SHA51260e917d151344d84de3c6c4ef85562fbdacfc34780bdb34432c9de695160384c25841d3aa8fea7489b115ac250e1f8947e2bd20aac749dfeb311ee2ffaa07bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b3ee8c0a0b37322ea6818800fe2d76
SHA138a9ef49a1abe3b0ac91717472da717f5ae87913
SHA2568a1f87366f8473b7e931660295204c37590d704353b7029175d31c1eb4bcd0c1
SHA5123f4d3438ebc578bb188024850e5a1d64813d714c326c56d6c52770520b97720553aec07bd0700ac78a82bc46731088bb66ae71c35d89cf56c9d8e31cd11b9bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c05f9d0a03fd0832e1cc54096b115d52
SHA1dabba66a16a0188135374c84ea8fce5d7b931fb6
SHA256914141da16170f443e27666ac21a1ead98610998c3e20f82812bc0a129e2df4e
SHA512ddfa225e2b12d9673ddbb9daed0a13ead8871af73719496e31f04235d5377056c646264de0fb2a4e72da2d266e83bdcd5de0656cb93bc735222c7248143425c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b327951ab4bab51344ce12fc3dbb99d6
SHA16c8dfecdc0ac9805e6b246963c9711ec8a456f14
SHA25609e9cf207d624899e65c7cd50b71e6727db47c72203b8571bcfeb05638860b5a
SHA512b1aa8e30df3078c8454f1036efd0e37ccc1e3290db4e1bbdac735a4e7522196ba06710492014e413cb1ddb79295f4665ae2a41d5d9964754874aa148a1a8d8d8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a