Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
0e2e23d4dc2f40a3a9716af2d3cd81e5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e2e23d4dc2f40a3a9716af2d3cd81e5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0e2e23d4dc2f40a3a9716af2d3cd81e5_JaffaCakes118.html
-
Size
4KB
-
MD5
0e2e23d4dc2f40a3a9716af2d3cd81e5
-
SHA1
49c17ec48d3834161f74e75d8a392e3af71c212e
-
SHA256
c06228dc8f3ffe27184f9c097f3d94acffa7be80da9e6880218f9599fcf364cc
-
SHA512
d84c00da3c32100fefc9cc5e902e58563258c1f11fda1626a2c756658f364e75f5f1c2d23dd9e78d781b0ae50164b5ec503e799f97bbd0b06103760853e3e864
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oLA2Ied:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000647d101f199b72f093b6c743adb64890d5f39c54b824b35c96d2be2d3fc82f0c000000000e80000000020000200000000635ea8d3d35f78398b345102ba0e1139bdf5ae4ebad4bb71fd8daec39cd5342200000000cdb9ddef50196de332ecd960be66d9506dd764daa5d5b89f65cda587358683240000000f4acef62fbb47397b7503189dda20e4b35e600a3ae1324e374be7c49ed14316501be01dcac549d237b09a8c8f5bbfa6730c5b3e31dd15cc822f789372e459172 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900e1c41779cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C8E7631-086A-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420805733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3012 2124 iexplore.exe 28 PID 2124 wrote to memory of 3012 2124 iexplore.exe 28 PID 2124 wrote to memory of 3012 2124 iexplore.exe 28 PID 2124 wrote to memory of 3012 2124 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e2e23d4dc2f40a3a9716af2d3cd81e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f984bcfdf6a5e4eebe8beea30d153efc
SHA1cb18c37a04903680df9c54d31e1001086880c785
SHA2562a44ac5147e25b375be22c0eff885b215ab35e9f07ad0668837ba102045eaa91
SHA5129b22f5bcef6332a5cfd2379aa8d138f6bd59be37a04e42e0eb13fdfdbf31f87ee2a790e00b6d7323dd86c7ca8ea594b28a5190b53499d50a9f6cfbbdeeacf41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afbf87f26ff5c1580d6a1fac0c339784
SHA12625bc62f4e79441ac06cc4b4ebcdf1e400d7a6d
SHA256b1deb18e01a976dd424d6a2c69174545f69243698bf76f17788250e21a41a44b
SHA512d44d826aea064e2daa7391ef2d498af7d2f3f0a8af8f4500c036f42dc15da60d57658cc1e784176b9b41485781d6402bb44fb0159781412f18ccfe5a1edd5794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd2b4508c908ce6189dfa0de7744743
SHA168137227bd2d9e6abc123bc2050d6000173b42bb
SHA256b3fcddc9b0f94ccbc94dda83302877f8448a699deb845941d9ab7de4d715c35f
SHA512e79358609e35e6d03a9bebc7424feb75e135dbc234fe538d7b78d074cab22878eb71a2adc485c158b6f4c5f81eedbd570c804d11d2a07afa3382e102b6e77203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505877ebf94b1f8711dcd7473a7c49ffd
SHA18feb490ce35e1362fbd17953348ddbb23296e391
SHA25690e689ce5e68514ec6f6aa68a704e4a4d10bc34f4ebddcf046837d8f9326aa48
SHA5122e33d507a4eadcdaae83b845bf1532a971bbf7103243083b897688fb3ce33c57cb73178a6d6a56242c77c43a268870040c5d3a0f4d05c5fc88e074ca67b106d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596665c0703cb37da841a0fe4d498f90b
SHA15181ee4795316654a503599736c00a280f9c0d09
SHA2566016c063cc23f60889b0d9c2d7aa76da99dd52115b724c457e386f460ce0de41
SHA5129c0b908081309ddeddba233857f8607052d425bb776e95de912e1b24a2992f092cc17aa071493b2cc25ddebda694718771d44eb3dc9f896840c0ae2f5e4dc28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1f110b7b4ee3a560d469cb0282df3e
SHA1c14d0f7950d390759364e489251f40c6aea0a99d
SHA256fcfeba96f6db30a47b04866d5c3a73b3a801f22869a2aba89796bdb2650b2696
SHA512e40eaea8073a80da8198bf1cd2e41daf23c0f0f37caa29a136d5800bab74bd6c0a5559463e18265c94e0901449251dd2e290c4286c16f1311b42810ee169815b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5287d8ec27885b727954dc11900cbac49
SHA1a1b7b0072c587a16cfb6cf9b2f26c460b9370330
SHA256ef37d3eef868dbaa4aa0692118656a078dcc407ec23458e19b51fef6985e88a5
SHA5124579542425c5958b87e32d2eb4b27a8d0f0dc27a5781f4e7b387b358410299fda92276f05ef45b025fb10610d459ccb92e55ba895c348a4ed50441ee9f51e3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d243ca4a7cc251a852c0c91bf53e544f
SHA18eace188aa48eea5c02636da2eb79292d69e453d
SHA25688928a3837a9e08ee52d94e133bd9978db7d2ce3d480df9731f11c17c89febbe
SHA512f960ccaed744e12e471ed6bd4cc3c0630970fba1991084a4ad5399e86f7946956082091530476cccf4e3ffd0c05ae690fa3890e982d918f6f74ccaa5f5c7eb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe813e78f6afb1373531112b1b693a8
SHA15f741db64975c658646bddb7de7801ce81b25cfd
SHA256cd566965e0417f67cae2b68292d1db05474f65488493eb74fb0b50d80f3a0edb
SHA512f2b1ff29ec9c9426953fb966240c48d1f7a5cfff563a9d0eeb0bc745e86f7fb09f029d34acc45c7e3c72ec04358f8eae6ff05074c00de3e4366a6b4ecd0c76a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56376b0feddf423c29b995278f88e37e6
SHA1cb403e57e9c20583a1000c66e26e7e31b15261b6
SHA256a260f08d6ae5fffed643da29cff49aa0f25e96dd5fb8708756076fdcfd572025
SHA5124b6029e6f04081a708bc92001e2cb2c55191b3e4f0d1d7120645a8e94dab36a643a87ecbb0596eb6cfe213ed268d0c123cff87e74f65e2cd18f0932804dd5709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0ac41ccde9f264074c2b58628204f76
SHA111f095436bc355ec3d445791703da5025a6225f6
SHA256e099e898c165d461e41e19fdbda757058d63f29e08cfefee90be2c6847ce809d
SHA51266102107cb1c411445f813902c640467319192b6909cef1dbd19276eecc26fdba71a7afb575daee0fe128435f43c1e289e7ee362ad49c489cae08306f1e3b0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51094c7d907af77b1bdab99ecb1305f9a
SHA16d798dafccad3f75cfd745f8078bc96d704a92d7
SHA256cfadee6d03220e31bfdcbd1e2aea360f3bdfd26867edb5c079397cf670dc34ef
SHA512c18fd67db35f74546c6e99272905cddac741db1f7bdc98853829edf7dc426d7a098d10abc062c3289981da0f334628d43c81bc018cac53ffaf42ba6d104168dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffe187d71ef76089ca70a7bd734563ad
SHA1344875b52587e383bd49a93788f2b339eef8106a
SHA25604394c097f3a4757db62dd481756af7d4934fb3cb95d72c881cfc1c6c021f35d
SHA512ee289e942f60dfb762b449b8613ab4e611e6ada39e432b48d76b73563f3dcf5a3e5304190d54a7ed3013349e249ca5b483900ce9b801bcf5fe9bbf139510baba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6fcb0e998b513b01bb253aecffdeac5
SHA1ed407334b21fd3a0f0da41f025b492fdf4ad8ed5
SHA2566cc6514079940194991aeee334f99dda1d5f0a7f1825fe02673f844ff12fa3da
SHA512dad2226f4ee56b2b133a67042c46087157f4360dd245ebf0caa7d3fcd3dddc8972637fa4de4f3a73285b7437a2b1f41010501dc3fefa7ca450fd647cdc7ca79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bd1a030a9f4338568bb726e059ab5a8
SHA1b31a3526618f872fa12cf09b3b2c64c2ae94b808
SHA2564c8d4e47a4377bdd7dabcd98e849305e34f33cfdfb3852ed58daff4dc9d268c6
SHA5127743297f39c05129cfc1114a1ccaa23651bbfe93a2ee52d98e29176e05b6a100d96c153a61bc6471521db1550f43a89194449a80823fcf8661becd5182bd9dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3909d12d50a829b354260f1904c3aa5
SHA1d36346e44172368f08c64a6eed309f5a63db190c
SHA256c03117aa995e309291e58d63505b478ee2fe8355c5e1ba5cdb2092fb37fa24e1
SHA5125ee5ce564c937a341803dcb1c1a64ae696dd1f9f7aab5bae7684d2bf3fdf96b058cdf508e57ae2e7bcabff07914ce64477cc56b09d912ba7e10830f69eacec4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0f42eede16c54fc763bf28177d3824
SHA16354ecb853c39e2d9dcf984fc6f6e7303f3ebecc
SHA25645bb7f2ec0db8ce1ae1ea795aaed4d222aa9f46d347cafb25a832d0c6ca044d8
SHA512f1a3f9fa073d091e9cf65161102c9a9d29221339163bb61d8861acc89732d13f9f94fae04c73894dd2f4f97a9c2365fe910526156e9432cdea9ba6a69009da1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5181f5734bd2d6c8ca4a84d6f0d351ce2
SHA1fb59ac6075179ac454ff257efaabe3f1cff4bf64
SHA25641523ffaeefc90c32918f2803dc22de6b6fa55d31fb406b3c2650fa8a5e7683d
SHA512cfb3f12584d1ab19f138ae01c33479a87c9dc9f904cb2b178df6d87722f5df6dfba29cf2feced9f4d4709c594311478c501bde42d5bacf9f155150189bf1d09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da8ee64ec648d8483f2f090db69bff8
SHA1b32e858078305ff204b5008806a320748fada053
SHA2569580667c7a6ab3edc955b4d9fbfbc07404e6fccc5a96c041d464a1b05f802425
SHA5129f0ff32b1f4616e9fb1d538b7aa89511852fe23eb232b59f77fa1d8479a2295164d9ef060cca5e40f7ac219346b16889be55d06cf9f738c7dd2a8c25906ed7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d47469d0714073c7962ac7be0326a1c
SHA143410007f7b797441d7be3697e1d091420efcca9
SHA256d2d27ca5248fa8ee80c9cc6614cb7dc1fa8d2c802af99d1d1944081ae3e1a212
SHA512029335ca960b8f86a19876b7fdcd730203a6c579488d0a6e511df646ea56155ee2d36899719e834225e75243dedeaf605e83b50d776f125590fcf5e29142ffdf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a