Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
7cecd5122e404534df74ac08f3f78688_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7cecd5122e404534df74ac08f3f78688_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7cecd5122e404534df74ac08f3f78688_JaffaCakes118.html
-
Size
3KB
-
MD5
7cecd5122e404534df74ac08f3f78688
-
SHA1
29f79fff449e20d9420ba217e34ae3848f2cb14b
-
SHA256
66add32a4df3a5bdddddec726f64cacafc517ecb419ca050e8a790145b74975d
-
SHA512
11029fec0dd20fd3f7d33f810e076f258da0d712b96971e296547179d38266b00d3413430649b9dcdcb801e9f17de51ebb00351adc3e121e001809fa5206d500
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EC97A51-1CEF-11EF-A2CF-6EE901CCE9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0818343fcb0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423061883" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7f52d054c5f4e4e95756bd1e40ae184000000000200000000001066000000010000200000005ad7280d929f5786cb33b9261d8f85935d1cc726b66b2d1543aebdb81fdc7979000000000e8000000002000020000000a08df46383bac721ad19fbc15deb2294be67d80132b1c0583da44eb5fcce59ea200000003488071b9e3dc34af1bb5e399d523b0c788ee87b36dcde2aea618ac498e5119740000000ca2d421c1e78fd99256d6b2080ca7fad028ecdc98586726ebc3a77f6db986db791a0ec9f0bd11f413412dae456a6bcbb20ae02c6226122eb66965c64f767b442 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7f52d054c5f4e4e95756bd1e40ae18400000000020000000000106600000001000020000000619992ed76dc9c96af7f1fcb84ad121939cb68d60e7b5c1bddbb7d79b163ea2f000000000e8000000002000020000000e58e7cd0db12d5f4f14cce6d9e2ece0069cb1a0e1d149347a46741f1bb3ad2f19000000057fd4855c300e584d56029cabcc7b976c48d33a0bb00daba75e28ce2209a9b996aee33d7406980057c3a02d9212cbb105e0d2efaf0580d92962d27f727d462e3735be546861babaea3042774ecbab668d99ceddceba96ac11a7311bbacc9649e712fccc66fea12bca35e49a5d2a5d60fc3943e7a4000700ffe9c509ea42f8f9e01791a2ef7e6f4e4bec47b5ca475b6d740000000f803a33435992e5a11a6066a692ddf2ef44c629699d51da1d29dd88957fb5f3db7a2ed0bdefdb7264fce0be11438faa21cabb0ed438af856f7fd7218efe2e4d1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2312 2404 iexplore.exe 28 PID 2404 wrote to memory of 2312 2404 iexplore.exe 28 PID 2404 wrote to memory of 2312 2404 iexplore.exe 28 PID 2404 wrote to memory of 2312 2404 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7cecd5122e404534df74ac08f3f78688_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a5dd4b79e66334b70a9922f310b18d1
SHA198d6a1268fad73b7bf82fc3dde78febd70e25a00
SHA2564e83049195be5feee957d0b28480c9f01ff2688ebcbeabffefa0bef2ad4044e5
SHA5125bf33d205ac224c675c54e6e3926cd34c9778c1137fb4294541e6ae91941d0bf20d6409dfe8c9ebc45bdcfdd30be6dcd1628c75ffc199e8e6fe9e9c6ded2a3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa800179bb26dad97d881966b43e0de
SHA1b38f3af3407145723fc35aaa5d5203f9f82337ec
SHA256a7babd0bb98c3ab3494675ddef2be118aae102f26c133727efd326f25b8be12d
SHA512d21d03de3f8c8dbd2f35c02ab1287327891f434f6067562a35f37e9b32e4015c737320c1ea688cb9a56ded0ab16c1dc0abb612aaf16b89e4992476bbc7b1f3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23913f4338580460b3f6729ae4ce520
SHA14d10f1ef7ab5bfdc62be2c221447580200d3209a
SHA2561400d4a6e3ee470908bb6a8a786f08f25daa3df28a042ed1fdf1702abda08934
SHA5124f4fbf12f91d630f92cc7a2c8471b642cac0f3a9a488052a5685023e48c24e2b5b7b38fe3d1de6d036aa5f65e8986e6f0185a05e608aba4c0e0f491c67136722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7aa4622e83855c970baddb08034871b
SHA1aa015b202c03a3e05930ace5a881aae0673c289f
SHA256d41e5f96b52225b7c67a7951436d9b25c06edc4b604a67a6f0d4942316a76f02
SHA5120aaa1a1d4d67f39d5c691d70d316f36ca94ac02e03e5a45810454a018787d967a20ae9092e320681b2a09a2445e9a3c3102a72926d660f348c9fae8f2b67c4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc66c62e072a8c862ddd1192c358b831
SHA19c08c719ce589606ca2885b14de895b8ad36f826
SHA256cf228635978945a4a61bc45e615d4bd8ddd6693f5bbd15a63c434f60ee618070
SHA51274b02638a79445773275a68593b17b1a1062ba18a97af4e6fc132d9bc428d8ac966caa7816031221f09bc127d09da558327fa5c590b52b1421f8898f6ca0e9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e05f0000f1415da9eadd56d99ded612
SHA109ac8ab04db6f77dc709b6d006152b461fcbe8b3
SHA2566dfa6a44f6acad2229d47420a28294800f864bae1e8e08093b30ca6baf75c1fd
SHA5122cfb754ab311ead725e25916a036504c993293e00ff09ac612c577377b1f4aee16be6ba9a163ffe28e4e1faa148625dafdc3ececc0a2a99120e2aa06341074f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db36ae60e90a59be89159f0f7b7dfd3
SHA1f6c44bc9315059a315334bf96bfc9a8d762a5644
SHA256fa49a7d468c92e52491784fa86a8cedabaab80c467c27fd570e8d2e82909a2ec
SHA512da2eac37cf8edb615ada11b55717208516ab94454d782ddc7360e5c1fbd1cd3406b65bbf5828c87cca78eb61b6742dc77afb42d86a6e475a1cf6092b9d37adc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d5b01f629807161dd4ca021996d307
SHA1b35a44afd81b68991b6a23a79e73bd144dfb6272
SHA256f31fe7d229009dd852f51cd7ba1248455c470c62c9bb2496fc0c9c0b10166366
SHA512d7794feb02625eb34a7976f8c47d7535f5443758f33ae9141031b8c63f0e6000a2526c8dce38cff265745c8a32b136fa1b8bf21d613d37855b1fc2ac0702c236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02e641c227b0b46159540a4e4681c15
SHA1464eb1b0e2702d370893642c24617159b65687e2
SHA256327a94cbcad48584788fd48bbef9dbad8d79308d20baddbf3d2ce29a90db5cd5
SHA5124153b4fe52fa4cc883c09dd96a1e007b36f3dc80af0a9657d55b73ea6b79aec131b8bd68b4cfff12bdf0c1d4f77ccdeb84fb88070802088d8f7947c9a9b059bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569bb3ff9917563b7ab4ecf649232c154
SHA118fa2a44f35e4247be79561c0a62ad80446c53a3
SHA2567281c5a72fefd6d78d609ece703e1f20323ddb5e66a107633355ec4897ea7661
SHA5126e752d9977dc04e9faac2bd9b9520a736a413126186193df64c5c93e8b7d9a611fe492e83af6600f14971c9d6d5d4c00d7d8917bd136cbcbf8e490579d29dd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de30c1a2c0d56a217131f478d18c9a99
SHA1392ae331c6c99899122e305afe382a87f503169d
SHA256fce23f2c4ad81675fd501e2835fdb2ff53e287c5cfe05ef9e31b32c37f9a290e
SHA512ddc05f32481d12fa6e4130ff784eba937c1e002dc7499541d7bae3f2f4052d888d58ccc8ee052a88e4c6e7ed535aa449cb2354daae3b7b0e632356a57abc3cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500657acd6b17e7360178501cde104613
SHA129b75334e730ebb3503ff48cc359e650cc0a6902
SHA25637eb3bf02d985e6bb8c2d6cb0246ad0d23efce4a410c0478b60cb61e81e0d26e
SHA512a8d6f166f7afa29e409ef336a2051de9d78c268173fba01b89a0bc4553898360f34d11368223f8dee1f8bb7559ea7d460d5e1b8a789f858f9778aeba22c5cb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549896a4e49842b51c6e8d4cb152f428b
SHA1c1110f7364e54053a13d385dab877e5ee523ff5f
SHA2560964c35651fa1c665c9e9d8c6f1873ad63638b74b39a9e569d9fadd7267c4330
SHA5120d849c5db7d7d3605dfc78d575c59d114d430147007abbee20680dc3d46ce618c60082b4c2dd347b5271625dd38b917974e1a1dd4ddf6ff981e14f20976eab89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e295f3448dd95fbd61cd95dee9d17414
SHA19c060c54b9894d731e2224dd26ec2834e16c48a6
SHA25696b2817fd4ab80846298ad7dbc8615919daf968a007338c3fd04968309159736
SHA512f912df8a69c86f08cb38aa43d9e38b079f69d7144f1f479829815b724f11c0953b4b415b5aa43a34f638a147916d7f246fc234eb7ac1cd53da8acbee94ea1ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb78e91efbccfbdd10238bc4355b764
SHA1221998fc3a90cfac7e2ea3514ffc927902cfb6ba
SHA2563258b4bae181a00856ccf555d0d9e91cce60f63a01b483237b80257ee9a01476
SHA51207f071e051878723d520a556f5d52d0be0432f200c27acb64f9bdd9bac1e1c9b127c5241e4b4fc4712753fec8206eca7db1c297c7c868a2bbd02be101a50438a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a05e5ad13f9a5eb8a4d894dbbf7aa9f
SHA13ef70961bada999653bd2f0f33e7aba6bf27f75f
SHA256b70ce421838a36d957c75f5d5544e3d1cc78409a07a58e268143395ac3836c89
SHA512051f57b2c329189b8b86cf4aa14196d9ebc958a92c774ace1032d22e40a11acca3f0e17f92b9165289535b17d336c0b19c4a18d660f8c1e24fba9162e95daabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb7dcd92c8d35b0299a7552d9fc65c52
SHA169993a220c827316c6a01341d48f8e9fe059b53f
SHA256b8debd518d0ed9e9200a2e87889f5f1cc7722b601f573a6d8acab5fcd21adbe1
SHA512ac27cb2dab84d547d1b826fad783489fbaef45f91c81114a9f001df37ddecbeec30d622efcc42fc18d6bb7d1c02ee03d3deafe333df0f3e916d7d52b8b985955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf4546e07a5c83afa6721b196e58442
SHA19cbe889fdebad7bd540eef6f8715dd345447e72c
SHA256792cef447fe67576bcfc69b962136ef79816f11274873c283f4047d8776526bd
SHA51201a11efb0b6d7cc2e221f3e5a756a1a9efaab3ca48d7a3133cb1a6ede49324cedbc37ccb56d58ce4813cba5e241fd103bd151d224c842637d048cd3f1ae7364a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1ac8d491f62a9064bd7ce652c99f69d
SHA1111cc2910cc706b2bce773ba04e96c6b4782b005
SHA2566fbe083493de554477e378ed90fc529e473e53e9effc6d0dd4b2af5e31af4f3c
SHA5129d50ba709df8355f7c31ffc45cf1900355b8ec4e37d29549ecafe7999a27576095efc86e0860233ed80b7c0429203503725afad9df945444623008f87c8f9563
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a