Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
40ed6ebbb6dda5bc91537be06566afce_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40ed6ebbb6dda5bc91537be06566afce_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40ed6ebbb6dda5bc91537be06566afce_JaffaCakes118.html
-
Size
4KB
-
MD5
40ed6ebbb6dda5bc91537be06566afce
-
SHA1
0a36ce541c11fe424594570d84908be5254e225e
-
SHA256
06dd6a19ec1fb709ffc113aeda7c69553be06ba104b8ef5332db03fd2a9ceb4b
-
SHA512
e7492ab604d301adf5b4ffa6d077792df0d2e6c21407ff92be6b19525ce70f0098c0e13385a283d66da8b59c05cab76f6d98b9fdf4d83b3ffd4b9a19c920ed9b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oinPIZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC646E51-11CF-11EF-8DB2-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7046f7c0dca5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421838886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000134687096cc20fb11d580af5d0635b1799235c27214214dc3a5218f472488aea000000000e8000000002000020000000a5f3ec5938ef57c479d2207c50b14dd3f462501eee8e0c5aef54b876172a90f720000000553141bf27018a25932337da27b0d16d6d572cafa6ca4588f1fd6f5051d782674000000067c00f4a1af73cb687d94ac7c57ee85cf4e222bff252f30dd784f076f053d2ab19e1016231f53d0ba50b439904fd1fdd12e92d4c0b07dc965e3c09ceff52cd18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2100 2224 iexplore.exe 28 PID 2224 wrote to memory of 2100 2224 iexplore.exe 28 PID 2224 wrote to memory of 2100 2224 iexplore.exe 28 PID 2224 wrote to memory of 2100 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40ed6ebbb6dda5bc91537be06566afce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5272a2f073af989908b65d7484ce57adb
SHA1fd3c4c783fa242e993f6b35380413d01d7e19217
SHA25637d2c34a1d95bc570a79cc57fd47f4be302e0ad93219956beac2c46ea279b5e6
SHA512e4a062b62f84f4415fe8a269d0b9e21507ff178409a1da16d3ffb3aa0140a5fc39effa1424de48a93f7197a589d069c0082b7ad1b662585e50786da8f617ad5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad8b3e57d8ce71baf9588fed708a7b3
SHA11966016d204c29adff36dc53fe98b79755ec13f8
SHA256b62b08bedab9b574556791f9c40b7c09c094a01fc4678de3026ccbbb2cb06a0e
SHA512ea92662aff5864d2c0a1f72b006019febf61debbb4b429338c77fa813df2e40847aece474e5e19098cd1db8fc2f2ec41826225bb59d0717f17622bd4682cd0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691bcd01a274e25642898d1327472280
SHA1f1b87a393b8c115a66c4bc1663b7c4c1ff3a7f00
SHA256c1060c9f2a17dc8353e0602aad159effa84d4e7987f212f440633a5cdc9fb941
SHA5125bed9f9545ef154a0e7be59195f070c2820cfa26a755717a27b346272d72d9f4e5f9d2b0f91fd2619b06aa45a215c78865fafaf438643ee4baeaa95f8c20079f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733a1fcde8549e63ff9ca5318feca162
SHA1f994c88838c7c368fc3d35cd40390603f352fc88
SHA256f983db36573b3bd09757fd2f52033b24816dc2409976a08a5d380bf894974eb3
SHA5127fc192e58320016f57daef8bc54a9fe2a22746c4d9ca7e14f305bfab457f2a58cc1bfc8d578038f72bc7ed80da057f765350cb7c288971722501b3491eda142b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df996982980a3e14aca0f8de7621b771
SHA13393491d8a8b9b3244cc72ff36ed3dee5cbaebaf
SHA256ccdf28cbe99d7c5c9173b404423c81304f0387bc75baf52753ed4cffa5a02aec
SHA512e12b4c2992597646298d5f792f231258351b4439045fa4d5201c62882573a9b01a3e6152c98e0cfc77ead2285f881dd6cd14135a3baf4fdd4c9cec0f52bab7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56603bcaf6626a7645b0e90629b733ced
SHA1d2056bcebc779f134b8e58c22338dfefe4afd9c6
SHA25648f198c48d50d6e0d3b2b31e97f494c652448f5e9f138e6884fa1820d66eec89
SHA51204dd73fa943094aeb7e14f97ba4086d9be0919500e87e7512245e0f38c5484ca5f1dc875d21b0823919041825704ba63c7af1d0c1b18dfa1a5baa562cf68bb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a5602f7a711711612b0505f2fa3671a
SHA1b07813d67d4018c80469be31c9f252043c5abe9d
SHA25691635ca83079bf7c81ba9953c671f3868b218bc8b627a81866dfd3cd306f5b47
SHA51269a2b9295530e4c9a13bc863a68f50a6a608e272674adefe25f3c16224cd3e50d8599b90f3c5151d5f8728c9a4cbbb27720d295eb57519c69a00e986296fae9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9f642a8e62365e2da116fc0a7671101
SHA1c36d0d3047636c8ec84db703f60b69ad391af788
SHA256f35ea12e2c3de47933f48c59e1242da45445445c8c2da713a3d94db5fa809dfb
SHA512ea1970db2e7e7370e11d017b8efa1e80234af4755d9830aa7319d87502963287c81b886b3de2f1ef04531853147ce8e543331a06e7a14b99c1fad457ec2ad1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c745dea0a9402aba4204627a88a5027
SHA1295560188577c4caabab3077a182c08818a1eee1
SHA256b507fd822e059f76a36b0897f2d02299da54704de9b2b49a05ff5ecbb55e85a5
SHA512449d5e58233a448abf7629c7122b09abf4196781e1bbb2a6a8aca7947e5e68fb074dc427a302a2e44afbd6e3c5e5b887fdb7f11968362aa31b3fa65f1d9ae2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557718680a6d1b7dd0c922856f9afba85
SHA1d6c0aaea939cdc4a4033c3b76d644a3e3c5f0431
SHA25655221411e34f490bebc43e61b34be30ffd7b3d338f9ef22b3b43415a6979fb80
SHA512971e29f5bdb73feeaf259e48af8e67af1d33225ea40506d250c1951d0c6eba157da41314a5c61b1de2daf3e2ab99e883aafd62154577028c06ecd1a95fefe9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf125236055f33143dc5e477cd64222
SHA1dc964edf40d68013199c5bfe97bb6e213aee9fbe
SHA256f6e2b422a09e916f12c3e38a345c1f012803e8f67ba659dddacdb79d0765fe59
SHA512542bbfdd4aa62007f97228e1ced4e518fa330045c9dbc7912e03d08588133fb7e32995840c6c90d88f550ffa5a541dbd245d3e3de0c802069bdfbc10a49a736b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c4763b98dc4177b40aacb77558b25f3
SHA179ef936e02ca8af8d4b483f97e2525fb8a4bfc0c
SHA256846d89b4668d0bb30184eb6ef6128d35fccfd67ff50f010b2480f0083f24fa68
SHA512ec9aecad10d1e6f5ca7d8efde288a20bd4745b97077663cbdd295008b34e7ff74e560b764a745770eb22db6a7df4e25cbe27d817295cf0eec300a2b54820b790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce32803b4e901b289b3cbf5efe856d7
SHA175571c85be5447efe51bf5adda847dd1d31986ab
SHA256a99eeb09b658ae8109e5d8b3ca3e4144fac0e12634918ed549b46efcc169da5c
SHA5124f90b59907138ada1f2c69ff7a97aa0b3c001381dee30591415f89f5805135abdc8a321f5ae7631d37754dabcf6b878b9837e89b41b4e64cba6301ad135a7ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d46b0334b506de340c207a7ca823bf
SHA19e3b6bc9a295d8244641fa861b96de06db987a06
SHA25674360ac084791334601f24b7a7448e1b2c6e9567d2f6db39818c6a9d14155115
SHA512bce340c3d63822737af7a431ebcca6cd1be5d0bcf379d318a9dd53a8e7f78e5311536ec38524a31defc01f971fd9e8ef8307ae18fcadbe963c33c3957418c9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbad8205ed032c102f803d454cefce73
SHA1a5f2ad1e327792495ab549a8d3f6753ad3cf9ef0
SHA2569565a6eaa4f5f4ecc6f5a596fefb5edd8da457002487ac776edce2ed6e97ffd2
SHA5123b98bb9a71d0cc01fbdccfdb34b97bc94c9f22537a986395c49d67b705bbd1f7cf43260498208f653a723b42aee2bf2fce9e985daf88f15eb182572629e50b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513f26b3c98131cc0eef308576b3be7ee
SHA1a6dd0f103f052948d52151e2ca51ce75a7c20023
SHA256e4948807ab906845cf97fa93b5621e31616e71f34aa80f6d43ae308d4d957888
SHA512d9a7c2924430bfeb45d7c07acbc94f0f72d332be485799c51799c1e933f4910f068c5b887ed76649e3c45ef9c923b88769cda0b97469c7fe20fd67fd70415788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d241b2120455cd266f4aaf12e5b644f7
SHA1e4f73df8b731ac20d8a92ce8d29c8ee0f16e1688
SHA256c1d9890bae79304dcbccb7eb63821bf1c637e3125a44f5987477ea47bca6ec91
SHA5122a09bd1d2e69ce6055a896c524030a6c3019e1f14e41261121fe1399e9a9e234ea1cbb41cd3d0d4076d2f358fd4d1c57a22289adad443983de46cf2cf0d73ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5321d9bd48b9e8014ab9ee3cd76df4cc9
SHA1bc2e3161986c09f46af55fb9a0225dd5ab523bb9
SHA2560dc24e5643f02cc2642f947ebe0f6b7848085ca6293354cb2f125eed49833d9f
SHA512cd20e95af2241c6fbc496f69c10210c482c2cc048c978aa958d6b040b0f04f723dca886ae5501ed798b1f0f2615e987cf0b70c39459a5f2319c5034ed3eca7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52494c394a1e62bfb48db62526948dc02
SHA194502ba6ab42f283abab1e418d1568fea2319acb
SHA25625e7da54225616a4b34f3a31e121d25885ae960c3ebf951c086bdbab06dfbb1d
SHA5125b287f9ce2fcc695462b5f9a07ec98d05c4344f606cda6bf50eec2d7ba4bd64331e4b2d19ca678fdcb2ec0690fe3b20b52060a1cbe5352e60a933f7b7798630b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81946aef62109c93901a9b3cb0be73c
SHA186788e4662ce3eb4d0f9fc017b611e4aa9c3df81
SHA256cd049db23eed75e052b8003bcdc60e5a97c517770359760433b26f4df5a95a31
SHA512714987709974bcdc0801751145c7fc9b245af713f77aaa06810b27f9dd765ab70dca2870da684228bdc67cbefd398aa8805f8c95be32383af6bea75c919c4b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5183f3a8f93adbebfb3872ff1d92ed6b5
SHA18c976d638aa7bba5c229037d9ebeb24f911bf0ac
SHA256f53b8d10dba2b5788c9069345280829aa0eb0116e3e8ef562179237b72d460f5
SHA512485cfceb2b22bad83f6b1223623ad9277e7b6402f9c61f4e427ba66fd19ba57c151f17872c6e50a846bebd7fb805f8db6914d578c4ef5f3f50d26226076de989
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a