Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
1fffac45c65706409ba425b550648d9d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1fffac45c65706409ba425b550648d9d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fffac45c65706409ba425b550648d9d_JaffaCakes118.html
-
Size
51KB
-
MD5
1fffac45c65706409ba425b550648d9d
-
SHA1
0031f9d5bba175dd69054d521b6891b554a1d44c
-
SHA256
022ffa43e4156a51c9394d8342e19dcc6a030876ea3557f185feea8876ecd720
-
SHA512
29e78c62f782e070729ae159326823000354e741f92e90df12a81c63f07ccfa9699604c9e3d6aaa0bfaac07da2250a46bad948e841c11295e4b7aa498876f9c7
-
SSDEEP
1536:TQIpyr+NvZQG1Uy8pJrjXEGtnNo1cxS/tt:UnYRQGGy4rzNyxt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000d8c365fbef434caef4bfc71062ad720b438f579df95ec5b18be894df13177c71000000000e800000000200002000000042ff542191574ded7fb926a262f4ef60e7590fa557536297fcb280e3398072d1200000004448bfba0f6220dd3c3898f45dd30a14265f43a8540a4cd294e25fa4050b6dce40000000a4d006c74bb747abd749961ef4f7fc7f6a4ea5c9c4b960f8b7cabb3f4162aeadcb2ca5698aea550ca93ac6c4e61e221190fd8c94046d9b0d441aa2cfc8f36901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0edd79156a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD7499C1-0C49-11EF-852B-6265250A2D3F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f84a8a1957583bb998cdaeda1e6c0e02293e06d09bc075660d028a238ff883cf000000000e80000000020000200000003cd0d80178252d3063524b5f6cbbba923892536f4924d6b9da791789b0605d5e90000000a2140e63d4f1f0cfaffeb615fd2449f31cda50f0255b8f776b98d8b7e755fa60231ca519c176043463ca1c7752d6a99d0cecdf963300df09ba66ec1a255ae174a4ea520047a6bf4e01a224e666d395e78b2c26372111aca97e266f490923f3a61b5ab758f642a74bcb3f870f326c45dc49aade35d12f6d9d40c5af15b34734ff8caf0c288f707a3e20cc065b415ad71d4000000059bc499f1d64e7df8278b39950875ff3eccc58094743f65c685c0c149ea53dbdceaa47adfc71ac6269b90e513f67d21e589ede41157a33d8d78d2f266606d42c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421231500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2768 2764 iexplore.exe 28 PID 2764 wrote to memory of 2768 2764 iexplore.exe 28 PID 2764 wrote to memory of 2768 2764 iexplore.exe 28 PID 2764 wrote to memory of 2768 2764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1fffac45c65706409ba425b550648d9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d62fa4187b571c6cda717365275fe42
SHA10f704e0b28815012b93b4b320bc2948e8f56114c
SHA256bc9310a7fa08e5acf227b36ea7fad7686c2a0443a1a38a429bee2c6747b9a302
SHA512fb4d69913e491cfb931499e27b8d8ca853e7e9b8e64c8019f6931880c544f1faf16fac2b074d4d28651657114e3e7824ac23a8c79ba7fe55b2cce236d265f05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5636a998ccc9cb7a6aaa0761e70bce85b
SHA170a27fd1d9f153467cb12628d3cdfa3cfaa95eb4
SHA25674860fd27200f5abefd7cf48eceec6d08ae37c77cf931e7377d10458a10741bc
SHA512ed2dcf948eb62876096a2f6e546c34a9411d6eb7302507b17acabb7452bc5fef09f797ed59d92467d3a9a945b194fabe41e58321f90d33203c6f1255d080aaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f8fd439945d24fe9cbcdb2cdd5700a
SHA150df66274e2e4474d1977094ca41116e2c90cdab
SHA25690f98757a559a8f909d856cd90f253d37260c49a2d025616c01eca645ac9c740
SHA51247b1b3defe144598a5033fbeb3158a654161923fd3772bdc2f8662134493dcfd28d1db5a4ce9e8aa5fd5e0c99053528427f8cd6027908d685e5091818f6bbdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ab78baf05f9f1a44d15497acae14e2
SHA18a525b52f132d1dd4b6d8c27028146631ab2b3c4
SHA25662b89e747c8d44d2c7b159a551235ae1dfda0e109f5fd71ec3e3c144a8eda841
SHA512d812e5c984d238f88d4fb159b2f38a573e430e5f49423335e1e285f631b71b5d86e921d765fa601a59438179c8c95d52ff83776c9e6a8193e2520ef86c0237ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d469577a466890dbe220851e646407da
SHA1ff30ebf868ef4a19fae6bf5907585cd68ab6e8e0
SHA25654498d4494642a959cb14f101264e5db5682456266bb6666586d4b1578b38612
SHA512b439ab2429f8ab924c78b305f187bdafd0c28e8fe818cc0f2c21dc7d2f629512828465b25e647de275e2e898dfc21b23725225694994875e0b64356f84f2213f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e9519813c734b0d72f2cd73528a2b3
SHA1c1ce0dfb25e807f061e9daa9cb7b69a05bad1264
SHA256538dbcc2c053f123280b922d7c8db4648127f5fb9b5ae4d58cc324885f677c71
SHA512b747187e0b3b274e6ecf8b0b0bd3e1742a7a0678dbe851d3e66b327b6c26d4aa3c5d1e577df7724332379002d82b29f22a666c6d42ebdc3f4fb27580535d2146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e8904a6a19dcb2c06fe5407afaf2b2
SHA1a63611639e8e112319865b8d1305102882b60f4a
SHA256181212a0f321f9cc747d7f7a8fa7e60f572ea4f538ab0cc7667623fb5707a26b
SHA512f64b1db316e4f45ca10723c5e3166aabd55fed5f2a206618c104744e18ea66aa91d9bed5b07ff12fe45510f0923e2d2d55d703105716212cb9521c5b89e4d5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20eb9e0e68e219ace44fb281f62c98b
SHA16a08f1ff625a49ecab9e5e1f05dd73078d12cd0c
SHA256ebd70fe0cb6dabbb139dcaeae1675e557a4de42ceccab560639501e221f28c6b
SHA512241a867bd18149d8dc55de7e41449ba065e22cb4310cc652877eff431666c2b0c81f932cda29f6d5d317004ae436100c0ddbf8b1492a5ddf31dcebea022535b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d424987033bf1ef0bfde80011843a1dc
SHA143c814e0c37a5095155c41df239ce1642cd14924
SHA2567301a800ed324022743ce8da0cdf8bf92897b99f28b6122b9c60229d8705a258
SHA512b11e5ce4a4b233a0ec851be4c2f59bfe8ce395cb5e9db3b5ef0785d00692e5e8f6674882815184e42448e2258e7b420c577ee697fb86ffa00dc8b95fe1316b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2d75c53b0d11103f959989a3183b04
SHA10c28271db2e1cdf3c61741772c35a2d4d213c35f
SHA256a29fa765a292173b23fd6e04f9aea07b0a310d2c377bc1335a37d336783c3921
SHA51283199ec2f77a214e89dc30caa92768f740380cb9d6afe15d880e202c9602bf9b972331a8768c24f78dfdf24c7abefd642fea2491f472ee90449264cf79df951d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b94cf632e18850eed04aecb68da6e0
SHA1f839ce8020fb5a5a6f480154ca2819e48a81d7d7
SHA2561e74eb600d87a7c0361b17fcb95622ae0b819a605554e10ca1b093a58091fbe6
SHA5127c1071e8b86cddad5b648aef619d0ae37a0343c5032ad011307ffd4160b78674b907940aebef0e6e57930e13152377224e343a0d910d96777e6f61d26dd0adda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5986bf45c931ff7843f4aee86d6c752
SHA16b13436c82cd7fb4bf3c8e3cdb2e0bdc815db85c
SHA25615a1230419aef636566ae0b61f671cf5da103f1452cc6c4bf2d3c9957bdf61fd
SHA5120bff89636a94f3c46f7a74827ddf674393f7bc806c3c2e0a4d40a01de377a22a3c4165eb136a546242a38172daccdd624ec6b47d6f98dbf1289d9db334d4e28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65a2f95e01f1ba2530f1ab2cf2c00e4
SHA19f1ffa45c4b0b8808a00b9e541bf5f39c2d6d9bd
SHA2565740f8aa97426487d05cd1dd8a1a78c79dd4bc5e77c065a73e8ae338db844180
SHA5129f94b1a9a8f43026baf29e7b6778e334f402a9d7e8697fa054d4dd55cc73a00d2083555699a4a79eb0944ac8edda009bc21bdf8c411914ebabd15f5c7ea07035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a73c1adbbc5fafed3190851850af54b5
SHA1cd39b182d15f1af8b824527f6ddda4656d965542
SHA2564f17cc9444695d1414aca26741585e1b40e8462c0ecab9e3348ee912910deaf2
SHA5127f3b7b05b52c8397f293e46c5b0ab1a254ebfa37db400cd35927a29820bee349da22b19837cf9f42d3edeffdd0f83a0eb7fb68b158a34b4a2848a552ffe9caff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3d1d08e3674125b69148cd5dced9532
SHA14cb8323bb8bb217afa59a38063349df3012b6438
SHA256185727fb57c4f877dea6c10106f2c2d705d6d636315e2b58c79516eff8b38a67
SHA5125a2afb3b0e9352dcba163ef81df8a45981c2ced1784c442fc58f13ecc2fef7e2e3a5d44cc632c9b40f7ce02d9c9346aa0c11646094fb708f18341fb94a44c47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a103721661319bed11d90336dcc40c5
SHA1b408833536db6fdb8146ce7e6686ad16bbb97e67
SHA256e657e26a94c29b5664d69314c99e4f663cbe21610d581da1c92f4a9cd675b405
SHA5128ba1d43254c2871230fbe3b8bf3ce99ff0ee04ced9eafc2f8eb45c68e9fdc7d76723deecbd6c653dc77e682fcc4591770e523e88b8882e818753626d8b55211a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b5db7b3c789636ea826456207a9ff8
SHA1a11d89716fde025d96b36a98aab61f2d2d831b7f
SHA256fd5a3a2dbad36d87bb257a2818b9326f025be7661b2a2354a64fdc59edb50c0b
SHA5127b3c4c685a548c2e7a73cdeda36b7cd6aca9b0b0e01e130ac3f4de05e7c8998e6de660351fad3ab29b34eaa50e4a928c6eb0f3a56e26ce1116ec0e5a8dafd67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f1c2247169ec2a3491448de5994228
SHA123c2fa6628b202cfa3df7f9e08d8d364cfbbe02c
SHA25602822bf047af85fb09c8bd7ce9c267bb09498a1b8e247bc5eadbddc2108f0194
SHA51218715678289e68a3b7cd073602af26c308a08754fdcaa4f2b968b58defd12e5a766f04074e5446935b6a27ffea3474f8bd12ad025c5e3146916bce23a17476fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d44b481b906c29d196e804d16f22ec0e
SHA16f7c8c2add5429d327b67b391be3d4c792f1471e
SHA256174be5c3356ea9d871379edd5bda34ddf37e8f92ecd5103dc8e2db84b479ad28
SHA51213e345e72b991919422b765e21b4884e7dfba33a7727adaa0c6eb5ccd21fac4382a1b742d4a1d9d93b6b6542ef5e565b9467db2fd3187a40779b914d5f39cc53
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a