Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
773a36fa5de803207ab35246ace07b08_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
773a36fa5de803207ab35246ace07b08_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
773a36fa5de803207ab35246ace07b08_JaffaCakes118.html
-
Size
68KB
-
MD5
773a36fa5de803207ab35246ace07b08
-
SHA1
b6a565df003a288ffebdd713f036d6d4ee4c2dba
-
SHA256
f683bbc03eccad9ea15bbc4302d6ce437a421a22908ded17e5a68b5e1ff628b7
-
SHA512
799c706e736152e74576bdb9273c6fcc8b90abb8ee3a3f3945695b332730ece4391c639c7a35aa1e4ef41f9c6c4c910bf0ce2a2a76b8732f9f478746e938ff77
-
SSDEEP
768:JibgcMiR3sI2PDDnX0g6k7RRZb8xZBoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JzL/EETcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F407AF11-1BBA-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a001c9c8c7afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000054c5a4b420ab0f0c12a793bc5c61a6fb570134f12ce9b04b0cd6f1c5edd03606000000000e800000000200002000000088c58a728d88c0c82acdf562910796b4c17a7534d0920f7c97ae3c5d7fea80cc200000008c62251fe0f773e4ae90c19fa870859be2aee90580c0e90bacd7d3835da99f1940000000fe3bfc71449756b399161a0ec0d8ef5fdc45344990a00655571e3fc9995f3f2d759e25594c32a3d364966a72c940e0d74809c239f37713e31455c6ead428ccf5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422929391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\773a36fa5de803207ab35246ace07b08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5083d20f1b3f1d0d2005822cace7cf810
SHA164fbe23f45993585b9b303965867cd841befd6af
SHA2563757ebdfba296711203ebb30196ca1208bd7ad0dff19a54eab05329830396961
SHA512aaf74552861a3fd40c5abbae6ea73fc96f1c88d40a79ad644e3fd91f7c687f3f802959d23a6012eedd808f5c5c188e0fec7ddb224a3402ca812b370e187ef1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535ff635e40c8436341c194ed9ce3c53b
SHA1321fbb1533196eb9191ac9655c4daa1f784bdb96
SHA256e8a7cd4d74d7bc64a227fb612ecd910484d10091cc1a06bf0d6cca0f92d9e77b
SHA51252d14619b11728e3a4565b5b8198c62a48880c99fd6dd80be945ff2791e2d8ebcd2e42b9c5db1d987b26a99f6d967dfcf0a5cea90f74b00b0792f34d76895585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4614e4be5d4967561d2113bcc0c1cc3
SHA19c4963528ebfa59e782e9eef8a914a15428daa04
SHA2567048f54a4fbca3cf47b9d326bbf07efa878fd84c3fe27215aed66f77b64a322c
SHA512d4eb5dfe0127b33fcbe8183ced2853e87636cbe7c75153a75f361e50635b9c9ad72f48d2742cf749a0bd9381ce770a2d6aa04a1506c97656563833d402cbb6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd20371d0d1332d26824662b2bf2f010
SHA1477663bcafccfe528a77fcf0804053d4bcf6aa29
SHA2564c841281c9eda2500d55ede5c477eed2942279c572985416f800fcd5191e067f
SHA5128693bd87ef9949c5e44f1966586e63f43acfa2a157542d311d6780284d802bb4433d983e06de8bbccf7fd121b5b234f8b59902ba301b5d2a396d1241ce9b7c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2284d82ffb3832d9498d48b7ff487f6
SHA10c8b3adab2c9063fba36b85a21634d42a713a4e6
SHA2560140a7a6ab4f42c96766e8bf3ad64765ac4f22f3cea0cd082f3fbc7826316705
SHA512cd9692214dddc30194baa906d07f0cbe67f4da40e57cf18aa7b29135cbf15a32abf472c40b07d12085886617a07874f75891910b030e12c44d15d769f51fc46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b8a49a4dae538e91ca645e23761a3bd
SHA1d7551e3ee2a5597f96608e2423741d7d806d6a3c
SHA25689f527c85744d0fbd0efa882e296b6195478989017ef8b811433da028abcff07
SHA512df4dd5211d3ffc8dc73ebf45bf027d91a8d4a6a5603884a8c10d9c5223a34190a534f2f36e8b44248a71dd93a8ce2caca0ac8a2135f1f071237c24eb002abcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ae5dcb99a27dec8b81aba8ee1153fc3
SHA1aff9ffa489ad507434c29fa1cd9d8e1c4ae4b53b
SHA2564fab1d4ea8216a2ba81958ceeaf2ed2186856cb7b8f8b8afa617f7cfbaf0b46e
SHA5123530797c68e1050afe06067e74a51104e65804415634fbbf53f81c3ed962bc412b99073d724b3e07c0cbe93fd227fa06f9b369c66ede867c700eda49e502a4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553a7e743d6417c8d15c90455a1100da3
SHA1599a6cc961a2c2a6531d3f028155050e5c17f83f
SHA256c3d525d17a43596142bc0e176ab3fb689a859fe9727fbdc9d797c19f4f6097b2
SHA512f3daccc2d795bd9dc9c72a238bc48ff4ae459de399d34613879f173ef00e3f94e2d6dc26df1df663a5b668423126f4cf66c592e5d26ba6db1062bb1c98015590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5127fabc87d67252c3866dc24bafc4498
SHA1a6e89bc08a5e0e2424218685eef2957068e5efb2
SHA2562d75fdbe3a86591be2d31cd5d3894dbbbef6f64415c1d5b035c03699d3e7f5dd
SHA5125f9ddc9cd90a5693c7c30b46f2d646469759f609e5127588251d8393befce6102952116d5c73df84241937016ff5858b0605453881c16ee96315ec1524570f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5f4b208048767e6fb34faf39d39389
SHA1d650bc2f8b494eb24e04ef3fd783947f16dfc079
SHA25635fa4516bb96548ebbe84a42e4e5700ab753667f066767db79ecaa1cd7688c6b
SHA5123edc9dbe0de41cdb334d4e39fa67921f7fbf4cec11d119a02d66f82fdbc44ffcef507b956de74755f32fdac3eeeda5311be62aa6a162e1238f4c7135afcd49c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8ff60e0ac621536601946ff015c2ed2
SHA1a5080451ee3b3060b132e5c0d21f7964f923349e
SHA256cf9681e07be91a62a7f760441a57e8bf48ad24f19696c77503fe55cbf18c9dff
SHA51202d7e26eddaf4cef9d8f94e67bdf2bf024f633fa11084e390db5cff59f33c3ae59a6e20e0d809a823e8d11abcd0154a503885a1d18f2fe181f303c3fd721d140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58955be8856d2607aa6fd046738cdcc78
SHA12f0358f5863c0d7bc46b754b30b58124799684ee
SHA2564a06ef089eece02800c30605f1e794ca38ec40d17990791f7a4755f13fd69158
SHA512b80ac736b68f3c4bc53090bd84721f2e5806bb76d6483339a94de8db08770e483977776f3ef19d07b7bfd2937ed5680f1d42241021a9b833f09bb25f8a003a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe46e524ac1d4fdb3f5f3589f73e978
SHA18b45774a969299d0b6ed181d3ba3e1bc11d7ae0e
SHA256af98fd1c5e9b4bfd7439c9cb92eb9266a8306c07286bbd169a62a66958b94c92
SHA5125800fe9ff12e6af625ca5fe2763a258b902dc58eec90e27b3dd65d37a1b0d5529a3c65ec64ee905d3777688d4bba338b8e90c69211fd7943c8aab66f2d64876f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1413e382ba4b0c426748aa6d4464d7c
SHA11e682a5f879d92e28d2cdd64cc07e8430212bb62
SHA256bf20dd94bf91d8ac9c4ed657e9e7f063c1dd90a29a599c03c69115ead35e1c01
SHA512f1be0dd6053998c1f00088587ec2bbd895faeb0abf0c0232ec2fe7862c82432b330ff02520b4476b15a0885e9c4d70974ffbc7db321917a54d19e4b2d9ff4b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d378946f27cf0c0245609ba318e9c8e
SHA1a2d23aae189b99afe88d3c674dfc02e1d9c7c33e
SHA256023ec0fdc8652bc0069eb7add4e7504a1ff2aadfc1db128745564c9dcbd7cf85
SHA512481732504816c44ae1d5779c9050b8b443ab9d5907e6e6f64cbc79b0a91735715b7dd7dfc93d3a677342e278b548988fcc68fd464c08bb8676fd346a12755404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a57e9dda4850192cadfb27e0157cd8
SHA1a5e3ed4bcb41cdea23371b44e60913a909f07919
SHA25616183605edcea165830e06aeda0f35dcf2dd8248a39a13a2ecda2ac5e93dacb6
SHA5122cace641495a1ac5dafd48815295aa6d0c73b8ee1089fa8317ef42a7ed0c84d6449b7178df5239f054646a55eafecf0f1b13da3b5ecf95c0a6653a064fcb4330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5bebf8b89247c680a0192cc0ed87743
SHA17dfa04ddbd490524bb244075956b1cc78de0ec40
SHA256d471f48d39ced0b8c2967439ab802566572528269b00594a1a59f919cbb719df
SHA512ed0bc06410f5a1368bad064df0eb4b1d019fb60e8e051df7d61331b71eb096b676182532bd54b4608bc08f87be02edbefcbbc789011c7b188244dfcbdf36b420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55548b179a114a7623096be4bc0682bbc
SHA1c0e184c60dd750eeecf94f891ade54eb39d5d65e
SHA256406ef635ed9239b72ee2730ce2a78eee94b55aa257388b46add8f4c6ccc170da
SHA512b977a0d947b62ceb1a53537d6ca7abe92f1a814c775b7ac82d1d76be4622f743338542b1809bc9c48368c01c364ebf66489cdd7d95fe0728822b3b92e7f0a62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea19648ad7e75b2d2da88f902532e9e8
SHA1b5dc5721e202b10774d10deb8c976b33371ab649
SHA256c36a4d6072b9fe527927a904b186863026a7f015296dd0c3825089c8c05f50ec
SHA512d19eab649824b5095636b8699b76e8e4766c6594debeb8b2d4d48733974c507918c15349cbc550a38d2892661ab464be03fd87f6f9f1e71d74f79bd16963a664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d806086b13e08ba517b5b62a05a8dd
SHA1c5241461f9744e73d5ed6821222677cd73dea53f
SHA256aa7b12da41424c35f21d831838976e15bc1fb79eb30e971e18f64cb6d2323399
SHA512ba68bde7deeff73a0b498f600b827ecef164f392787a9213fc8c33f3f638f6d244824152067c640273534244b05c85cd7e8f5c6d58d334de8d81b7ec4fb07654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fcb1c1be9c9db5246d66abe930b0be0
SHA133ea79225f44726963ae42bcbeef160b6493f7c7
SHA256c56a83a94ccb0f371e5ef46320328784eb53d861821b4ed383056539b070a7db
SHA512a574da1ee8949d6ca32c578c6a51e45a813b0ed9bf986b83015156bf41f092161116716b783274c76dfb1c37f9b0d100a9fc25bc8e1ce13eb20d060830042bb6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a