Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
0f9fb62e3be4a732c8c5f1ee236cf6b3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f9fb62e3be4a732c8c5f1ee236cf6b3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f9fb62e3be4a732c8c5f1ee236cf6b3_JaffaCakes118.html
-
Size
94KB
-
MD5
0f9fb62e3be4a732c8c5f1ee236cf6b3
-
SHA1
eaf557acc946c6c854719d0d3d9b45869e9c1ea0
-
SHA256
8624e17ef6307f872460ef182f86295d370fbc7f7d1a29c7c196776425416167
-
SHA512
b951a26a1549c2dc2394f8e53b71a8463dd80f467e830061f756ab2f380522bfc5844d20369783695835254ceb5514b1c1bf8a9917118cf563dd75595f7727af
-
SSDEEP
1536:WMLiNfUZJA4kjgfCzlWy8Djf7LIPeFLu1jUZSy7BdkrY8mgHC+qpEyW:WAi46YBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E32E91C1-0901-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e8d0b90e9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000ba122fb003c1d2dd295e2a1f0a04dc98ff480cc59ce1ad0f5c898320c7070eff000000000e8000000002000020000000f0d92fe99ba15d5f0f55d70fa7dad3b50072338f17f3d0c74769b728ae592bbb2000000092a73124dfe3d9e1a2735f13c2db627d38e0c1ac52d46c631868051a2913bba040000000d6bb8ea8e3487b659e8c7e5a35b67e410b80f0b432a13655b14976d3211808f3b9fb9d1feb90a1df96389f89eab459a8396791ad5aee8792af17a9b1ca5f0768 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420870786" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3068 2148 iexplore.exe 28 PID 2148 wrote to memory of 3068 2148 iexplore.exe 28 PID 2148 wrote to memory of 3068 2148 iexplore.exe 28 PID 2148 wrote to memory of 3068 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f9fb62e3be4a732c8c5f1ee236cf6b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5759c38c005e630c43b051e647d222424
SHA183d44aee3a67055e64448843077b64c67de9cc28
SHA25682ea8cf5a1e74b049d7bec021cca1be7ec750383d63f3cace60a025f558022b4
SHA512d69d650acb5b33678500c66f6b3a573cc9f42040ca43838eb0c0a8ccbd1fc28898ba7e22b0cb929be3cca9fc4e76a7c603a60e63946028c7104be72741049c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563f0e94fd93b56c7ba75b5d9d94cb1ef
SHA132c7742a50f7bb8a8489ee19a4ed6bd892c98cc1
SHA2569f4cb082c439de0d5db4c1e8aa77322c57c828f03ab89c88f9f1e469cb0494c4
SHA51284c028fe5617163b47bdd9624b7331c82f80fbb6b691c1cf1d7d90b71f9708de61a3757cb22ba82cafe4560c37ebf34f241e076bffdfaa8f997a79ad2960c787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535a458979817aafd0e069039d48f7fd0
SHA16d9f0e0811cb8dfe3dd2b036bb6ec50876abf8f8
SHA256db3ebcdebdf8d273bd2d989c5ddc79b15d53b63ba6c43dbd0bda0b765b6df1f9
SHA51256600ef96e3ef0eba0acec7849694116d1746767cb9943ecbb42fc037dcb0db9aa1726a965c7ea07474d122c76bedeffcc14501382fe9794d0a36efcaf9f73ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4fe302fbfe5d5b916e3b860e3816b0
SHA1e3a2106ddfa1e00f361696b31588c7254787b4aa
SHA256e8b1f27781088c6bc8829c33b3fde3213ca435344c7a233104b7af4b8b207139
SHA512223798089d13dffebb09805bf5042928751873ee540c6daff4178d4eb2a1cb9952c710bab561564af26046a8bbacccedec826319f0836843e56597846dbef7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d49d5b219a99ac517664f8ebbc1835d
SHA1a652b8a18105c741eae67bc78b24e313a8e27706
SHA25641f2a1f4d3fb5c715f7ed012f4fa7bb7d67c17ba3b965dc33687e81866e760d7
SHA5127b86c0fa7ecd037cce0b7c89309e5dc77bdb253084eb1ef0f04e0a034dc3a2813193c5ada84e92bd7d677d4a8894beb09925ccc2ec5c3ec39f2bf84c88a833fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510e639243f620ec5155c239ee63762ad
SHA170e760d11536785e4ed7691b02158e87cf85a92e
SHA256aceaddc885631992b2c213929e1d084fd5ce3667e4f7ed9a18dda2bd2399eb8b
SHA512c8fd90c6fe8346f6280529faa5961d47238c7bc8f48b612305e0c0266403993aa8b406b96a64e2f1734755d32ede3117e2f640a5b61f46223293d6ddfc9d6aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dd06703a09d71d8966c68ce4d444124
SHA1d03872b63daf2e3e804179cc2289d8a5eba5d6ce
SHA25676ef228e13e59b140e5576f2baec818b3ae0cd024d79b08b96285e869baf7b29
SHA512eadade9f9ee3432fe21736817bc72df78280e96a65882605b751fec0b4296d886ade815db259fcdddf8a877e95bc92bfe3a8d7f0a67447b10651b69a56322cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d9a3d1731bfb30379ded3af28994464
SHA1a6db2e15b176da7745a290846586f9ca90a6d3af
SHA2569acf8c91566f690a9d08127619833a869b4d786951c245f8b390c8a22baa436e
SHA5127819e4ef0d950f6e52a73eb84ccb2a4cb25b5fc88743e2af07ccf9849ccf598fccd45dce86d3234b88cf08f79fa67e4d6130da14f86e77ca96a659bbffa9216d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b004be31094d26ec3a9419b28378f57
SHA1eaba14fb164808bd14f17a30575203bf7964b5af
SHA256f2b5d68ad44f7ab6b217970467575dc7259e9ea72c406d6ce0bfa21e2150a9fc
SHA51252ec0f122a5fad047a513798a2b3953fc5f7b565aab2f00562b5106ba181f2fdb941bfa6cdae3ea3b934f1b33d262d2b33a6cdd6fd923533db6b1c3b9d5b6658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d7f5b75d44c9026b69b98f913afd0b
SHA1cead8818a33e35ea109167bbf5d4430559289b23
SHA256a8451dc108235b20e09bd7b50fe8a8585b2936ff2a5a7735817506776d1f9502
SHA512e092a585e1ee84f48fc1265fb03f41014cdd257d5de837da9863eca64c43173b86e495b6603b62818c4dfc7c477bfba1ed5dbdae6a356d276d789eb6beca6de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53708f4d91c3bcf279a51e29aabc6f5cf
SHA1a92ceb2ee3df7302bd74c3b58f8d1a1b10b3fe56
SHA256f27f4bbf247d5415dd3b7bc4a88ebd924a8ae13beb107e76f9a9ce7578ce5839
SHA512e3b420a75fbb009043229605bc41871b07dc794449f6f6d99d72b7c351a6a0745393b5b09070d7808decebc964cd1267bc19eb2d3c2137244ce3047ebd7cb7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d8f7be3794eb1df3da2e4cd4da926d
SHA15f7f7530b6c21f937fb92ff89991405284cf41d1
SHA2565f2c1ff94003c85e47f5011f4bc18ca3eb7cc766566e371393f09156ca87c4c2
SHA5123a01182d4b9814365d1df1e53a6a00ae7bd8ed9a2d4fd62583ca067043b46aace51eb9763ba028d2b1e37dceadd2dc831e80b654287947dc78ed064578043173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57072531acc9b89f62c78da16b79d65a2
SHA11fede52a93dac6f9ac97e95346a21128ddc99a61
SHA256f36c6f01e425e333b90f76f174aece07f00c480cb4fbef36dd1eed72e923659b
SHA512a000c5ed84f1a873c6d8378200acb398e258f0d2fccea2b85fc8793aeff64c57908b7ca9ac9bf4b2e4543c0ba80ae552e73770c6f54f9da0aa611e9bae35d259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585deb47f6ddc19b8f70289044ed3617b
SHA14fa222077681890e219f88fb5fa096d273e31eb5
SHA256923c7c0db49e1dee6087c893842708579b45842fe73f08ceafbabe4aebaa2804
SHA512fa6d3c3841e6fe224a815ba19f3f087126f65b2e54333b5f83ac5a05fa3c78bd20861ecba5712c423497e452fd182a765de066587f2b25efbaff2d2b8400fb96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57625689109981901500ad613399e80e3
SHA119574da8e83f0d906a27cb81a6e9de82f4acbb02
SHA25641198e478ddcc53b90af274dd37b1f7dd3ec02397f1c6749c95d24b56503b8c0
SHA5123270ed14dd6504764a271c6f907390739383d028d29ed231cfd85525354654c9a44541eb601dfbf549cd375453d161e58deab82592f19add72859ebd1d21667e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace59be9fa0a54e02d16ebfc7030679d
SHA183da92d1aa7dd53419a54f18d4822774889bba4a
SHA25689709c64e0e94798f11c7b12141ad98d10f0c30d07fcd41bffd2d8d4707c327e
SHA512d97e8e31a6ce7ca95a64346a5e482c8eec912b7bbe0fbf1450879d3ae427e9e13c7d4588fb8022c8e5b5baae3d25aa047df53699de1c4bca21e421dfc11b279f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffcfc74f0b4b3d08d8065472ca8eb4a0
SHA17f8f4b1dab0d644997c2f8fd3aacc85d9a52ce53
SHA25655e0a428b1b5ba1df1a7fbf5b3dcf61b659e2a0c83c513057ff7007c7b3b7737
SHA5123054e55398791f1de8604015bce0e6c2b308021e3acf3b492f27d344d5d9a6fb6772ecdabe0258ca9847d9bd9f469d8be483122a9b2f24999abab6e83a8a3905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2e785ff1b52b3b752e7db157163945
SHA16b1ccb098d69970cda4c9b6133760dce71e662de
SHA256c1fbca8a72be2c6f6babdc13c4bb60d897ca234b9cd191514c3368f64dd5a35d
SHA512840cfeb13494a946787f2c69e219f6bbc703c1d876909576b594da604f93736a80ba49e3ab3262e5017598c595e9afad7fcfe0c7ea6b8d4a3c4aada1cde29d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e818a4225ff6fcfb8dacd67069397400
SHA15e5b2cfa14b52baf7ecef40630b761860bf92eee
SHA2562b3bd822abd3f0092dd7bffdf1b7bf4f7587349a16681449c3181544cf37ef2a
SHA512a8e66fc184db1126102b0393409a7ca95be9162220e30e86e23740fea6904ebfc2c368ee449d5df56e171594a0d7b3ddc2fcb7babf625361caa604cf23dc0a48
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\jquery[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a