Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
2ca3e3a7f48cd6ea8c40d952ad07d505_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ca3e3a7f48cd6ea8c40d952ad07d505_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ca3e3a7f48cd6ea8c40d952ad07d505_JaffaCakes118.html
-
Size
3KB
-
MD5
2ca3e3a7f48cd6ea8c40d952ad07d505
-
SHA1
0c3d24d6e2232634612f5fad5abd83da34b4f672
-
SHA256
465b8d2e2375ba9157982aeced7a952bfdd4915158a88160f745568a2c613e8e
-
SHA512
0bbbba4811a7fdd6eff8864ec6e9ce79a169cac489d9f8e23a8474547b804883c1dc4c25d46730f8ac6dc990e2d429e27d5d7894a7b69016359a97ba349a1f12
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000712c05622105af408af5b04a97b3e16d779ad1bf72d9e321fca5953357f2e937000000000e80000000020000200000001b46344150b96661c11866b8216b76b9b2cd3acbc2155670cbbb140259b4d32520000000ef297745a39fd2039f321cafb76fea2ffcad3b9189938ba75c5b0b7857a9975e4000000077a1f4f0dba78a8dcb1cd66e3c7caf1297f038c1a47a9b1314e21042d1bb5471ef35c868854dc8b102f67963edc5eec08620cd47b0efaad131c972f6e340f4be iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000001c065bd425650a6691d4935ce68ddd583626a2890c63e8beb13094ffddf35cb3000000000e8000000002000020000000797c2f9618b5230e3b61101549a46c3095271cf1718160ce83858fca6fe8f1739000000010c3e02291a312852b1a087a9f149dea1af3508438a5c3398a164983ed511260be9f02bf99ab844f722f6b0961bf6ba860962499dd5fbc46d23fd6d74ad205d5ed594288317a103717bd735f2199b98920b271c3e0e1e34e0e89aaa283f5859a749248d62370b9a27a18b439fbfac821ef9abd792550c7035d4d22d23b1d5d6df8fb41e9b6a28b5011f0979ed33216e640000000d1750efbe49cf5477e7ce69c2db57101e2594ab1c759324d7315d7201d5b17a440c333d7239f3eecc280c9b705079f873357ba1c9697e7ff824563996d7e1bad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62258BA1-0E6B-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fcfb3678a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421465852" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1624 2084 iexplore.exe 28 PID 2084 wrote to memory of 1624 2084 iexplore.exe 28 PID 2084 wrote to memory of 1624 2084 iexplore.exe 28 PID 2084 wrote to memory of 1624 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ca3e3a7f48cd6ea8c40d952ad07d505_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5235934b377e63dae12139998b468f1b3
SHA12a7fd9261cbd34c5377adbbecc0e2e15bf1ad90f
SHA25624963221fc68503461cb9afe6fbe352002affdc622a9ec2819cb1febd161c784
SHA512ed2c63f3c77d4fa818233082f5d2e5b668782f140c83a3a4ad971a6e6f05b224aef5b2f25fc3eedfe43258b5eafb5f9a08766d036d76856214cc5d4a77acc45a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bea2f5c6199403cd790195d0721fe43
SHA1ceb02cc27b945b95b0d68005ec6f6edd016d3c0e
SHA256cf69d8e8fa55765c5bc9f0bca632d5190e846990555072a45868ef77794e6be2
SHA512d26fdcc03b9a9993e288b6dd43358e4324f9426fae26d29a3abfd97856fac4b8b850fac106b92eb3153d41e9f8c94f937b57ade4639f8592f6a09183ff863f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adcb344fa81c2bf12187f9d9165e7e51
SHA10db028d669edcd5260e8aed5e8d26f0474b809e9
SHA256163707fc5cf6bd4fa917ddd9a6127878db2fc476fe8d5a563a6bd853b14ffa08
SHA5121a05b7cca9dd345641323c1fa88c91f72fe033d4cb1ce1e5244bd7a63722dd7f7521aca7166d40067b01b6c51b8ded39b0ceb0fa2fe1371b74ab2f356a9a6e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e05376759f1156281c11c78abf60934
SHA1b3922915ae3ebb4f7c2ff09e657c9eecc0313467
SHA2569434cb4e75ac1eb5d6680d11406ed1ad5f45a27a5dde72dd9520054506f6e594
SHA5125dc9491a6905905fa202ed3249338e10be57918d80bc132683058df634032e6e08eacc14ca211cb0ef9a13f03fd158a99aad3e1b752b19831b46840a6a385ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb178e4e36acedde2a58c6a82939e9fd
SHA1a2b744c719ad8d24e039fcb35a1eff3f4ed1951c
SHA25640072e27031ac0b01fa3690eed48a9c5755b1601d94eba8070b5861718c54566
SHA512d8e8c2662e515e3eacc90bb1d5df7c5ff656dad5ab31e91b18332582fd6bef118872c1ed5e0088cfc66c2f160aa97cdec21a6da46d10f54a28e03b9edd3382a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c468c9239eb2a4ef8647a518bed619
SHA13fd4b1f9d8a2155859a79c7fc3ef2fcfa8009f8a
SHA2567130003e9bfcf22feca295c59d06154abec38f54ce29b37ac390a3d855fc91b6
SHA512a42451b1e47fb10fc252c9df9e9e4b41f8dd632145f243d2fe9aa5144e75949ede082147b9c147c678a06a891b476deab169258f9ee57cb16675cc5c008af9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cddc6cca0b84ffc869f3f0a4f683dd0
SHA1c254a4f5e1dde354f3246672943a32ee0de3a4cf
SHA256b60b7567d8074b84db4d4cc4e22e6bf85382feedeb3334435d1df938fe0c9e6a
SHA5125dae3370d8af2de9f564e754a45251c78bc5b63f29fb996745443e1d45a883a3c5658bf93cc6846550b668f9538a040be6f018bc814a6ff5af41324421f9c544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48831bb58facb37c25e599edf1d2d62
SHA1139bafd77206870b315ad039817626fc8e743ed1
SHA256b7c7d955949280e07cf15bba28f6833147f4c020111c9a43c222b63f6af1373d
SHA51214b0ce330c1d59cc4f9158548f6a2a5d234c1db092efd4f07177bf531b5faa134247906d80f4eabea173cf962fa582db314053439de75baa01e029e30a319890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2c90aeb778896cad743b955e7aed1e1
SHA1756c4e99cdf985fe4d5ab0002953002b63a5328d
SHA256b046063b8eb4e4211f90f31d48250ed45e01f6131a97269b8f5a1119cbe5b997
SHA512d509aa2470d01a8204a6b578262991f7ebc608886447e011d7c9e4f10ad11c253f6d564b367243902127ab777163be7a11edf599d53e0c929529359c054dae19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a728ba0e9e9680cd6fb93dde88787a1
SHA14c9715130d9b79f89a2c823dc7d1b81d4e4611da
SHA256bba59c21b976e0cfb2ffaf918f69e9d82b0c9a2d9b771ce7244c3ddfbe281afd
SHA512c5cdc4c14dd9e275d878f4e826209ae933c6a7b0f61460a19bc2aab159c5d878628c4c72515ff2c9f6e8205f8ea87319cf5ea4544c95b05f61e61dc7174ec9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50744163b6ea92ada6f92742d9bf49585
SHA1c6df2e3d279534db357ce7a650251434e4d58e58
SHA256d3e6df58ae733de0bacc1fdf02552c1f395f7b01bb6ddfffaaa797308278c26d
SHA5126983d9c2502ee03ffe0b87c420a9b58e8ad78290d7bc68e9c08d2a735064a9097d67697e082bb3fd29124b3b32a1f8e81c03086554286b02f464a3ccd99cc5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728a777e372f7c389b9fe129d277cba1
SHA1fe41fce3f6dfcd407daacecefe3f5fa514c2c8ae
SHA2565530185d5a5d19e5bdfa7887eb951be7f5167d9a3b18ff6c1086289a21f61519
SHA512f52d1e0fb0e4afae839152357714c42ac17e7ceb5ea05af1995623c60536a499d1174f1da600a72d56455a193f7baf082436b3e6c1b9fb9eff3ce5516700cb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbc8387f56c36e91e08c0db5b1d618d7
SHA11b72217ddc5b126fcb1a145f5140e597f7f168fc
SHA2569111c55414069d4f49b0ec98346c71cb85a3f073a167de7c8cf8bfb6189def40
SHA512da21b502f24127f82e65b7e59026ad5e1bb52becd4654bd080dc6bf90521980fa4b2ae4541a87c272bfb333230d1ba60d676a7bb95851c045fe9c869e138e26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5b7fd02bb4a6290f95fad2d75b29d0
SHA1bdd182c6a74010bc7b7c93d60da9dd6a4bf3ed0c
SHA2562bab9f60be383227ef3109c0999396495d3a6611a040b809ca7becd71178ec2c
SHA512be1d4fd60ab1ff2e1397b46b045cef9d2d155f69bdd47738c753645e832ecfa01abcc991a50f5838029b0930a02b580b6133501310d04065e154d26c7be4e8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b092766432af9e3b50c91a17ce5259bf
SHA1995b686da08531c002fddfec298bbf3f875db68d
SHA25699eafa3c554d2b2fa18aea731de972bde7bf46974eb613dc8d2ecc7045454a76
SHA5120bad16955cdec055c85be251f7f93b7a2788a24d2353893917ce57148caed0cf5d5c8d496282becaebcabac000dc2a7a58e9ed92c5dea379caf62bd7ed554fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a039f761c4a4353e4cbdeccf01dbe29e
SHA194ed684e579791edcbdd62716a67cfcea04dd67f
SHA256d8a079d50629ac12346ff94f621c7107a425621b7a74f27c9b63378a53cc6fe3
SHA512c9b2cc51e257d4e492343a37687f15d747782bb642bfcd64e03f6fd92a3c17d52dff686a1fd300054804ba46ea94b1f98ff3b3888def3a18ee3bf64c9218c668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed451baa84ec71c4e4f76e4ab4c2016b
SHA12e79c71a5edc05374011d61398612df297503add
SHA256d60114ae93e326ae78c2e52675369b58083276e73d3e393052e8c2c1937fd244
SHA5121ff9fa0c633d91e3b5b1e959e12dae17d6f2bf9ac80e3acb5a339bd47444435b2a649c27dd428a24bcf1acc2a5144961529294734689f7c74989868d3bb65b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f6c198d219bc3d05a48a0e8b310380f
SHA17b1d7ccd8ca65a8a0969f07f1e77c80442be8fd5
SHA25690a7cc45d777cfe1eb4e1c233a7b948db7f884415a4933b5d9a86222a92648b2
SHA512c3ba65d446c9fdef794df264e9f0564cdfcb3554d40399569edbb1daeafc7293565d9c1dd4165529487165a31599a79d67b48709a72659137957ccdb4f5cb901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584fd8e9ec1f879ab730eb2d008730d69
SHA15df6919d79f65f4b9e5aa0e414f8939fa07c8767
SHA25672577b0d138dd0ea9df4a08eb3e3b76501090a06a98b7ff5c606ae5f52e394ab
SHA51268c3285b8025bfc03a4407d91828a5e9bd777b590900f0618418f53926477ce8a96e05995eed610a7706223523e2782d9342ea7e55481a1e4cdfdf39da9d69f1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a