Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
02cad800cae4dde47cd18c5f1b429080_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02cad800cae4dde47cd18c5f1b429080_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02cad800cae4dde47cd18c5f1b429080_JaffaCakes118.html
-
Size
448B
-
MD5
02cad800cae4dde47cd18c5f1b429080
-
SHA1
90269cfa721dc0852c6327788c86962ea6c071c0
-
SHA256
fa07e2a9ce4a9ea0fe21183e25f4facc7da3371ee466f092828077c432b35070
-
SHA512
566d574ae76fbec76ef9d31408c276fd0882af7a5add997ee513a93a6f31fb28eded4f251eace75d73b253099a14d2d2436cbc4f58b894065cdbd2c576b8b46d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000007cee05047aabeded9a634397383b6d27686f8052f623346703f307a6fa7b8d94000000000e8000000002000020000000ff1ea1afcc5d501117d61609bc1604046da2bdd12bcf21d03bc8f83a23d0aea920000000c3122be4d5f329fffe6d5f9588a763ba5847933e7877f8f890b8392342c0ff1a4000000013d54fa59cdc72cbfeb203db2b59f08ffe403810ed81ccff17d5a749b75ec8d3c5dc3a6fd6039b35524ef8783b1fadc809a85a9b77e475d22e4d406ae9009d97 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f090f0ea7998da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000b80dcaefc419396fd4e9c0c48876b4bcb9d0af4241ad4f57a42dda7ba38c60ef000000000e800000000200002000000045e101700ca7036a84df868f69cea02ed646f7f4b59f2e8862d1fae3d47b7cbb90000000fbc687356fdc5e5fef6faefe734d5048de60e939d4f5b5d8727f1e33c63e52a54a12046610258b5f942723b827b49e9b2547b379b96607ec76178f312bfb86528483a84bf893af6c3e298925d9240fd41f024c17d454b12dbf0c65ac286ef54bf599ba725533d70be2859de14b58f2e6b88a5af1ddfda19c1770ab2bad2b3e123fa1b243b0a53d6474ccbbea01d6d4f0400000004f2e0e6c566583b959876315f703b54ffd70775a643b92c632934ceeff63526103a67d238970be7bb6d6fff0414b1a268c41c665c3c0a7bf48ce89f551d51c93 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28237731-046D-11EF-995F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420367102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2976 2760 iexplore.exe 28 PID 2760 wrote to memory of 2976 2760 iexplore.exe 28 PID 2760 wrote to memory of 2976 2760 iexplore.exe 28 PID 2760 wrote to memory of 2976 2760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02cad800cae4dde47cd18c5f1b429080_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c109e45cd9e15966fd95ba967fbad36c
SHA1e4296ed0ab888bc851a63d67b4d077ad6fc9db20
SHA2562b553600a5688e0c190ca74607fff7aedb4d5955a0217deda681ab5ab01b0908
SHA512d5b43501bd6cfe117e3434c393bec5c308bb57276c5f498bd39ad6a14e2ead70ffed667a6bafd8f68fc947287a6878585d9bb21fd09e5e15fa8eb3634a3c51fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56caf05e29d913d05210f55e40e32cfdf
SHA1f00d415e51090641fa2a5b5eec74950f46064d5d
SHA256627766f0afc604ced0d1b3c4845397358e198822d4a91300599a3cf4285559f2
SHA51222537e334068ec1311d1257a4b86d2f0cc5488e79b6316d75910979437712286252b8edfb974d0136b1e3289a4e3e1dacc43a3273697c84fd16288cfb167eac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e24d73072fa80c37959876c82d88307
SHA10cc59f4296160e89f0544f492f4e31c8b35fb3ad
SHA2564cbc60d2da1dfdd8b387eae1155305f0dd7b62c8c630df27fa3851f4ae58e18c
SHA512475eb763b79320862bfc26d267a27c5e34ac4a3312e3cdbc42d33a178adb39848bea61ff7c9f35db2ab16fb1594f030b3576fdc0a04ebf892cefbd8fc2e08ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40b4e07371e70f620a787bee7998f26
SHA1cfb3d30b4aee08a211c6cd44b8a4b99ca6edbdab
SHA256bf7ff7c6786d8e50eb76fb5392703536bbc8567afc4fe52150617d247fa5f645
SHA512d83ea02d24eacada8a8aecefd334f8e2c842dbf1d7d8be368e1c733d5c293b1e84b6adb349f748375dc7142d2bfc00e5fd2d31f7e8dcd29ed0cd4645e1f4ac39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5684a91c65976df016d4771835fd3a26b
SHA1f8f645755d1fb0f30e71d753be98eb886d85649c
SHA256d2f91232df1d7a7460cd4cacb235e3a4a1a91f10c3bd5065ad21b6e9c632e276
SHA5123ab88b27606ffc7f5fbe313aab97c7d43e6c5fa05a928cdd16fd925af1d980e725065049ef3b2beea40f557b4eb1da70b797acd3ec4701714a3a27ece64d643b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac3ce2e3978cd51591440b593f3fb1c
SHA1365966cff802950b888ccaa292c4bb74f45fba94
SHA2568e348a7a964d919037ed34d0c4736be11453a5cdfc66fc3952de626bcba13d5a
SHA5129056874807505bc48cfa6136062485c581d4677d719232d175a48f6e7f792b4352363c0471bf33531dc8c1b7b6610050e46e817494d38fbe8c588289f4ae9502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a05ed671ea9d2b286b59bd4f15aaa8d
SHA10251efa934f5961ad02c589a3474f071c7210622
SHA25669a58df11f464d1b0c167b0fdc12beca55b262c1df56b7aa324fca851be13d95
SHA512ddd6b42ae0b4046e842ffeedfac9465a78eec79b9b69d8f9e2f9be4cbef868d949c5fbd73cd415d9994cdfed01543e0ea75339e8a7394b759ac73444d1db979d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5783b10606256a5bf3a7d00267ba45795
SHA12dcefb13bc6d7e42aa174f60d18a3584d99ab80f
SHA2566afe3eccddfbb860da7f91317c89e77aa49368e44dbf24446937face3864074c
SHA51210ea860c95a15778c9d7e943478c6d4189d976500e236326bcc82426314726c984fb82f0aeb92d7d13a65af02d4c6dc5b72ccd1b39d25fa6c4ff4ecf806c0e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566fdaa7b7ed174aa713cf58d6c3d052b
SHA1ec570642b6230f0b477861a8e1f9f27edeb9a0e4
SHA256f41675d90573f032c35bd3e8ade69ac02a0f7b1c20809d2bd25bac51fa2693f4
SHA512b5b26774bd7ddc9ae8f824f7ad82b751e6c173052c2e1bbf2f500bad8408767cd58c6777c97f85cdc210a17e99de70cd4245548f195285ab80b8dd0ed414065c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5345b5a2c4a426ae5efb92397bb2fde91
SHA1d73d8ec490b2126b459b69c9cd62074e79703cab
SHA25658fa41c9f9655ea45f79fde8782e902eebfd29911840ecb74a3aab3907340b38
SHA51245692bc4694201c3e5acfc131472b87e88d96b6032b8151ba5c51c585c9aa8c05c25951d867d36bcc42b20426b2dbbe1c3e11eedd9a6c5018f9f7b8dae706cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc442f822dba7c587798995915b18b88
SHA1466c4b17072bd8245b3507ef96e68908d4cbaa05
SHA256c1e70c01cc21e6153d2b6062f15b10d79c7330de72475031f7fca811c2d6c607
SHA512db10e4579050255455109aaf1afc5dd00a37be0177eeecc6866bbb3a0680d676d9cc03c57e93c0a3bb8274057c2d6103baa2f9929e52a770eb420dc220f591ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2a7c1319b29ff803179928a81b68451
SHA1a90f04ac819b4f478a86c6c56f7b8bc1e0cff6d6
SHA2566143192f2b28dcc6aabecdae4ba45801f552f27f823e70e2ddd78a5343a74f26
SHA5126ebcb7adf03855e58fc9f91d1fbcca5db47180fe17b719bd923b930b567eab5177495d4a5f313c81b8d801586fff1e85c26a5ea91cdaae9f6a3bf9b0d88ec262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd25afcd5148681155492308e6d50c3
SHA11664850fc640e5bf2f3b48573c616aa6943eb3e4
SHA256610cd364c605cc879d3aacabe4e6f56996a5bee52d59c3715ef8a97614bee476
SHA512523597d5d8e016524ede1df6ed1ca1c5c1c449c4f8d89b80df85ddb8730a77a73bdf78b25b418557572b946064f00651478f4d9c56af6ae27802c347d6a31d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9342c574693c4c54775cba3f6480c07
SHA1f97f61c8433c38019dbfc384528806443c824e13
SHA2569d534c44ff5baa09f760280eca031efbc12afe67e481c69829182975df94723d
SHA512110aae8e23e866c65fa12fc44896504e9f8b89fda83d5bd0499a3ab0fa89eb5fc66b003a78b3d3554a20d4b5818800113f860b3b3126388176fae981d69791e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59340315e07d28c4b1b509ce73c43b9a1
SHA1f8023516c6822a9625c3486565d413942459077b
SHA256c02d521b19678eab54244827171e739e581ad8fffc786283788a8dc7679a8ec6
SHA51246843999361b186ecf870b041dd1e2afd2bc063305899325fbd50cbf470dbfbdd23efecac36925ad745d5e026aad5d999f34b298a184725914a7be6ac9d72da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a33d6ab20c76084830a75acb9c904db
SHA1edf8026beec0414ef670a68183f7daab6a493076
SHA256a55e8c6f66a96bc955eb7b63763276723bbc1d7af5d59e2bdf71c89ba257e528
SHA5129847e356892ed2a9667e981272561a692d2978fe5b112ceb3e21b28882eb1c7a952320d71050885a57e494d650ace867bdd4dfc8957ad933f5ea8e58913833a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5226ac879f31c3c1a974cd1e2aa0d51f7
SHA14a674feb95d7fa82ef8cb248464af6e6970c1fc6
SHA256b1efcd4547b6c35a8da005a407e94b1338029b3089ee83e17ae75766d53f16f9
SHA5127d0d87a38abd50cbfca067bcba9bb0ba386392e26c07fd58d1afeb6d18731ec88b89c43ec037c84bba1e06dbf640a6ffdf0dfa51c223f2cf14bf4e4682abd318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d268eda7d2b862dd622712651e20379
SHA132378272b45c796684c6d82a37fb4a40ac18a120
SHA2563d791dab9761037d0da0da8cae5576b3edb35eef1e76d0a78e3e0aa90775e2d6
SHA512009c9068a7b2d40c7e09dbcd63d20c9ee119ec111278555a0d28a1cdd0bbbf655fe06608d7cf5ec538bb0a8a1ca5118d02a551926562a915e6fca5dbde0e7894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7942d67357e0eed4f5bbe0f445542d
SHA15ccd1bc411a86930da84d4281ca3d706ff2126d9
SHA256f10b3d6f3f275ce49b89320ea01570bab6e715f511e829c7ea860bed64a6f668
SHA512f1f453aed42759c52c824661c4bd49c4ffb3422fc06ad01f2276d2581cd3c69c0eb59aef3661b33c725eaec96ef52d97012979cd0224f0093fc5e83a5a979f3f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a