Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
786d613bd26c047efd88d094d121f0c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
786d613bd26c047efd88d094d121f0c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
786d613bd26c047efd88d094d121f0c8_JaffaCakes118.html
-
Size
460KB
-
MD5
786d613bd26c047efd88d094d121f0c8
-
SHA1
dadce624741a988d303a92929085b2cc53e7a3e0
-
SHA256
b23705905739775cf14597cd8662610a55817e9c42884cf0e85f58b310300027
-
SHA512
78815ebf451655c429186407c1f9f6ae1f9109f007425bbb93aa5e0bd15479dc185833a18ca266ac3b2ec155ffe03af915b011b8daa769a0ef4244bbcc255b7f
-
SSDEEP
6144:SbsMYod+X3oI+YksMYod+X3oI+YUsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3A5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422958446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99885AA1-1BFE-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90750e720bb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000d1ccf2a9296c40230346d0c7ee2d5692d347c34f1a7d96e95eb331e8fe73247000000000e8000000002000020000000a0968ac10069b257a9f64d64c9c3e1c22896bf5e8f5f48741d19ec8760d25fd420000000e968c2bfac435a461286ecf43799e9da0fb4c84b24d0f1039dbbc1dc8a256f5d4000000063968b22aa814a00dccc90b2f7fce2cf75037aaa598cc96970da021f3d8ffcf786266391a9441ad4caf30805705a8411cc085f4b5e3a4aebea8242acf6f73c2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2216 2176 iexplore.exe 28 PID 2176 wrote to memory of 2216 2176 iexplore.exe 28 PID 2176 wrote to memory of 2216 2176 iexplore.exe 28 PID 2176 wrote to memory of 2216 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\786d613bd26c047efd88d094d121f0c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f15c38745d1fe4a7bba87d415df0b9
SHA1958dc5b3784a405deb43d3a06e89a428f9c81873
SHA2565aa5ffc98d6adb528aeabe939f8ac0805a0d0c227cb6dd92e5acafeaba2c3a46
SHA512ea7d4378aa30191c4a7e0dbaebdb84e8f76b59e0048652df4b2d9ac069751ea2c1abbb6293379b37bdf8eecb0451633e000bb49160754c89250d66d7a181df7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6fa54eeb01610269e4aed907b8ef62c
SHA1b7a659f48a6ddf41d0ac00233d6c22407ed82a08
SHA256731a9e1f2b5a634cc687bd1053eece84eea57396e3896a4aa0c1ec095dda28e9
SHA512e2c420c45f93a199586db0692fcb8008222d94379c15dde7ff0e7b2600e011536164098245b79f63d2537d5e2fe2c07f24bbd5a9b5e85b8a9ac46af1c5b450ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96871dedeaf1aaf03724a53fd412755
SHA1b823f7d0f65cb89f9cf821b2fd777676a9fd2b0b
SHA256cc5573c7715a0732c6db971e9d681befdd59d7ea237857699c8a95d7c103b7e9
SHA5121d86ffcc86cd875dfb177b8b6b0c771f412dae4299282767d86836796e3f0e2a7b31910c8aadd2aa598e049124378cb3f2f1ff338acd12def927363608d7dc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b31e6a61472c4640c25836f9fabf5bd0
SHA1f3bfc6ee2ebde9fb98a0f81049343cbf0dc90c48
SHA2567d94cd502a9b5d879b34664318c5bbecf19c2f8ee20ce911aa6c233955bd3f87
SHA512949dcdf65527140d67b0f333fcdcab479a7834a5072dbf0393a66e61734e7962c91954b39bc6c5235c433475c9417f0524711127e1b9ece1a838ddd41caa9c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb0ba78bd681707258ac88d194183146
SHA158cbd7a6117ad650cd76fa51ec34eb16a6d875d9
SHA25682f271ec68cf645aa176dabdfc742ed3de24adc1d035d212f21d50d011efbab4
SHA512b7f06f39899b3bc9bc11eb8ea4ae0d60b1636836546b2cadbbfe9661c1dec89112ac7a67a2fca1366eaec0f8df359c3a59eb87d6e86d223a1729ce149bc5e2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9df0dbdfdf5225ab05babebd2c2579f
SHA1338a9ab83d9a79de8ca54504feced03a203e54be
SHA256d3e80752c82cff6e601f6ca4323a0d7b155a22c029362242e5493fcfc56516cd
SHA512798498f88e4eff50d4867b3426ee57fad8bdec2a3dca27c65105a192c2b31a7d4072a980bf7194c22a074213d86b9260419e926ed62be298789e29cbef2571a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbdb2f6a3a5dc95eb11bf87dd0e0a23f
SHA1a0dc8851b66acda7713480b2e87b2f2159f58841
SHA256b46706cdceaafdf8be3406d64f0f3fdad29e41c42af38d1fd435364b5ee47468
SHA512d8cd2f0b3d3869932afe0686faf51e69ae931c7a4e31c3258013dca23f9780b14bac9459f70b1079f66e0db3eb310a112675aca108552251491d182728e3e910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc77af85e8b192630d8ad0b4c9d422c6
SHA1ca902700a6947b854538ff805a69b370dab595dc
SHA256d2768bd0d8cd8e067b81c365890f81bac9f00de7ad4879f68939ccb051617a35
SHA51204b2186a5a7a95b30c3d5e4ae11611a501dee831241b4ef2f1898a40fba876de574afd56d06a62bef3895ee9ad3df89453d2d6a6b22138f67d5481838e5ab4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d836bb0c114dda491209c1ddddbe114
SHA16027ee92c37e2a5d21deb6ec0a0abcd68e8b7e5f
SHA256409366958d1187d9dc5ebb587e6ebbe08d355e5431050990febc50e6bd18fe70
SHA512f484a8385cfdc5c86a00fff99439374ddf0c85bf88f9dac64aba4c14f4547f607b5f8ea11d1d74d120ff8b63eee122f1a3860e0d09e98236154e33ae085cadbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587db32fe475d1f3a86beb85137540be5
SHA1d8110f9af1a4c2064ffb212e516dd6a709e93b05
SHA256c5aeb38cbfae0765d9b36f5dd5a7f806e59488865cb7e9159d7707e5ce227789
SHA512fcffc11262998f7d3aafc8b9f865cc3409430055be70680b0c2743b09ecb3ae7876cd20f538f239ce8eefea75e0c867b566db788c9efc8a227a0e3985123a847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee047d917da30b4e155bc6abe44aa38
SHA1f90e27b3b18f01c98e55b0f96728bee35f5d423c
SHA256e25a6828173fce39cfeb3af2808309d35b043364a0da530a54ea3db54c3f6d6d
SHA5123ca8661be5a6a298f1eb91c658a80d31e034629ffb56e934fa47cb04da47309bf6922e00cd766d299228f4e2fba3b0c0be34f9ece7ed047f08db28464092bc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5395abed363283f2e5c1f8bda1a734c7b
SHA1caf45761ef4845f3372969f2496a80d571820932
SHA2566c6b758b3130a04a7972079aec0a6735cfcea5b8797e7f0738a729cec62a0ba7
SHA512d31b76643618b018ac6c49fdbcd68cc0aebb7a475bacdc4902325ee7a2d0abea137a233e6b4efd5a07fc1ada6e06c06acb4259bc4c63de295371f9c3cd1489bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6666fda71fe737f899fdc0f37233d6
SHA13827a8b4809729f46afcc7ff821c09f8fa58b478
SHA2568fb25ffb581f688938834519df5a10de3ac67de7f0ce23d458826a90f68b5d09
SHA512af1770b1d2a0718849b090f3390b6ada64270a89609a338fc24689d05ca034f96b44e56caf69876218a21e02b91e1540ac9a2272fee7400384a5ed4ff0e8973d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5b29185cc216de178b2dd478f2a5e3
SHA17f530cf3a2c42f893df93fe7b2a9884a73f8eefc
SHA2563ed5475c40997800edb585af38601481fce75dcc3dc5949a220eca79d0ebbff2
SHA51293b7b069f7b899626d6f5a36e957a8e91ffea238862a0e7a7d53c7214dcf33133fa1a03e06e0935c0a949be336bccccf5c6190009c76ede2c7743b521895689d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85486177ce8e9dc594ec34bf4547cd8
SHA10955e5b12eea7ea160dac2d4f812e8fcbc0ce6cc
SHA256f215bdb28a918bb16634b348db8e4f54b4011e3a48a9054706a3b977c216d348
SHA512dea6ba3b3a583121120efe1732dc5a22dbd001e1174583ed0613e12c8b3183bbfe8991a422b8eac4f7afcfb97c333084a6515ac4509d58f2776228df3f7e593f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fe053b080352c83b6fe77741722fc9
SHA1eea8a5dc6bb3b55870aa7e2bd2253465c03fba58
SHA2568510a29264e16352d2af5ed603fcdda1eba61f617181bfc9840cb516615cc4c7
SHA51206dc0b223c0efbb447c525177fcf77b337a915b38192c275e56a278e54278b90bee4e4fc4bb0dab813fdd62f7a320e1271608d403538e057692a20b6c91a5a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5060785bfe8f1b96b806dda4dc4ce48a9
SHA13ff1d38b29870777ef9c0deb748a912180ccc188
SHA25641440a4a5f0834d963b749a18b18dfefcd934b2f96fb410f122177f054e6d8db
SHA51218a7181a00b724f86fbea0435b776678837d48eda54c8e63ba8d54cc5ee6de410be8c22273930a2c31ddd80a3f5de3743fa91f96f7ad6342aa12910467e6b67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a9d622eb4c3ec8ea4f241a7937a835
SHA19078187939ad886b2094b557ca40965ac4704983
SHA256c34e9aabbf73431cf68893405757324283d90826ef15b9b566394075921327ef
SHA512746b85c2cdc946e41b91aab89f0a3db94ade43f24596d537bef956efc3eb2ab2716449089cf7999699d3acc5c7fa5f47ead87df95a4d0e29c5d18190cb37a654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe530746a25da07c0b042df7bd3aeea
SHA195e1b0c6e13dc090809dddd98d8c5360971b2f09
SHA2566008d8857c183bbb3f35322e4cb29d90811520edb189d295601ab8cb62fbb21b
SHA512816471e22e89f600af554de49cdc62cc3fea9317f65915b1f004a549e248b56716b391f5317f528cc89cff740a6c13db39e42a40671532a2a6d0b500917cf00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702e62e9ff95d7ae39d171d9d3a46760
SHA14a3c5d83b4e58e5e846b5c33673c3fc1c017874a
SHA256eab48b649693281f68b9504d2ac74e497d741df97ba80e0f724f4b521dc409c5
SHA51251d435518ab729cb26a3d21c19730b6e49de544138ad110fdb63154b57c45ff9437c165335fd681acef92c17bda99c708172ea93b5294bf60309822c412e5c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475f60d166a9d5f83b0c2199809badde
SHA1d00421c2a3fdb20a92dc8d87613a43969ef56047
SHA256f314e9bc69deddc4f05aa383d4fc6c19a4e61f8f0f625ffe51a7a4142fd2678d
SHA512af13357f95076021e8b6de82c08a35856506e496ce3e8cbe0870547ae4ba4f1994ba95fe802a1021ed9c8b0d4217e962ac120855674e8203e389d399abd8f106
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a