Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html
-
Size
252KB
-
MD5
2a551bb0efb68a51520fd42257c91373
-
SHA1
ae738fb7efdd2df8f8582ec17b4e861cfe6094db
-
SHA256
57702c46958cb737ad6d45e10b767c2b7b7844781d006af8ca2a8be910cac4d8
-
SHA512
9cefd0554490b616bbcd1738403e2a57c25e81821ede6825780bf1083cfc84a72ca36a6b17b304116d9cbf5a2ec317ed0c27a6f4070927209321482abeab1a93
-
SSDEEP
1536:bTnhq/Hqjyz4LRbAjKDpoKgdM5XVuPIVoRrcANguJHsVHu87Zx/3Mlir/pPN0/6x:o0RbAGDpoBdM5O/6Q7ZxH7rgT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ebfe21a6e9fbc7aeaaf81e8bbbf74a3c7c818d5f90f5e2d2107d8345e08780c8000000000e800000000200002000000021a0556bfe276d028f870d039cd2893562f8faa193d3963c02a3025d1c603a8a2000000062e7c4ac0cab21761786d340141da36680c44f37a7af592926d8cc6df338a71840000000a9f001e06aba82e07fffde8e21b332e707d9a78b94dfa29d2cbeb2b345d8bfcc1af9c134ba03da34df55172a631bdf3369bae4c2cdb42a1f96deca46177e3581 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05f57f31aa2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C905A01-0E0E-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421425791" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2428 3008 iexplore.exe 28 PID 3008 wrote to memory of 2428 3008 iexplore.exe 28 PID 3008 wrote to memory of 2428 3008 iexplore.exe 28 PID 3008 wrote to memory of 2428 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547641c642400d1e67b63a4083d371cd7
SHA1f6151c83d0a38d8deb4d3ad8daa00d75c1b1f914
SHA2567c6f3a040a6d9fe227f6dc560e89ebda7fad5296c9fc2a6ea3eb2885d3cafd2b
SHA51217bbcdc9a6f781704dadb26e6b2fe8f1c116c356a7113799cd3f62c4dcd453d41d7e21a153c8a4b9a246f5a068ce6eec4a153088c64aa4116d56446de8f86f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f4fca068a41e3aaeecf933fa592bcd
SHA1847d31abb60364f657b1022b5a5c29e98e5e6c52
SHA2563e62b5dab79aa9585ab69655c341c2fb40a40b8bd911438a2b598808cd47bc3b
SHA512b792367c66f2fb11d9e79fc34fa65a1cbe6897edbd79e2d1bdf4c9269ec142e3114600340496a9c6bf4f466530b1741aff381017d74edafeb4396fef00721520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b60cedd25462505b45ee6659be2589
SHA11b058ad6f558e135dd5ed92dc86111134f8a5047
SHA25602cfdadee20b8cac8d128e936b34f38e0e64256d6914f84aab143d7a513fbcf5
SHA512628ae6f2856aed31fd4ab4a90f3a83bc7434f2324912e46037809390f7045161fad0e73c65e7bd929c3b76a0bfd4cdb1eec5528201fbc2e56376a805d54e0b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c0e562074792c2f79fbe37f45ad69d
SHA1cbb6530a48a8f7e07b459992759a55452990f940
SHA2565c6921ee065dc8d272e6aced23f431c41b6ee79b6295a31671ebe920cc44bd75
SHA512c2eb919a4b3d02e9b5f0a976c611d4d08c4f0d927ef2ed1efa8c73d4a756b67937818df58c1104b9908b1b69f4fa0b4b980523c567a4f657d0b592dee3194944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5117d301ed470f5b2de04f6632619bd8a
SHA185d3ee056035954947a4a95f89cfcedd7838470c
SHA256f154c064d62c06fac636a0bc2275aba09541fc4f8bf00fce512da1c41837afdb
SHA512a99c93d143d9f9a84853ab116a24d4002e2a3154884a066efc90ebb8790dfcf94d11f07876c7eeeadefb106b8b3cc9e52a415826d26d8d3248afc1a69cfdffca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e290666999ee0db927d894b5f56ae20d
SHA1d6430297fa0af427535878dccc442ad97ac9e27c
SHA256ea1547fe756870401d0447ba126b69d7c2252b4967f506b1396b6037cb3fc38c
SHA5122dda3d131ee52c491f1c666eaf58e414a32eb66bc3ff8ea3e2d0076ef0ede69485d6d3a47ca6a0473816b5b0b10152206340e34eb5331ea65c81ecc54c35d28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2c250df188e54585c710d3f022b4a2
SHA104df69f14985213f3af3ea070b1ae96e752ade77
SHA256e6f57f6446b6f260f69a2bebd51173cac273c258f7d30b08193026d752ae193c
SHA512b81507b55159dd9ee7394b6b5ff8b44bb679556477e5ec4ade24c9f7bd48da0bbf21e2bbfaa117b0840bc9ec4f6484af383dd939f8e24f07590abcd5e5b2da83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e85ed324d692f6bc27da80ba319e01
SHA1b19393c814ab2dc8c1470174f2de9687a0c2ee05
SHA25631ae2133b50835f7007a33022d47430ca22cd91b842bf68120472ec24efcade2
SHA512216821d9e5bb70d982a8a22e7de921ee4c7bf0af8cbba6a76c2a188a2441dcdd10987ccd391aed0bd3fcc8732ccf969d4fd74d4e9eb5ccdf996742e973e8762e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f866c2ed4412891e1daccf6233371b
SHA10eeb458238eb706045e3ef34d4608d0b51d41e3a
SHA256e0326232491d97b871d1c3b2838bc7638c0d18bc2235501cc5ba249e5d959112
SHA5123b3f0e66a56ff90f15f067618ca8e041f08d5d6adf43f8e82bf889bda1e4f436863db4acd1a50adbdf85a7b54156138d62d8d4cae40144d91096ff8cf4978701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5503c41a8a3fd3920c7173023a646fb1d
SHA1f2b4eb249c2287be0f1ae1604d9c6a51317be40d
SHA25649c1b39151d3eb918bd467eb93a25ba4a282b77725d962b1a56ed3c05c4c1aeb
SHA51263cfd3c1cd2fceb49ad13fce5e30a94e8cb6cfdfb5ff97d4c4fd7f04ffa8a53ed8a9fbc94b0e101a699e3479860d1804320be5f5c52079bd774c8c136a10d780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59941154245f935cac2ff5b59560faa03
SHA15eb26aec6da8acc47d581cf5a579dcdd723205b2
SHA2561ac616b8a1dfc19e541371bb4e7417da4a094588c6b385b2b6ac868068507590
SHA5128e3d1c3c5b566421fa8cdcb1cf705e52654a36e04935f3907587ccebbd8a926d701746ba37ec2554c5916dd3eb98e86d9139204b7196d3a0811fe65b72a406df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e4a11b4f3a02b082f1d83191e8f51e4
SHA16b872bf846433123236b9fe3b153f3960de83079
SHA256833624557b47c4df3a81e104db9cea9e9d94977cdaf7180e90aea023e6f3c84c
SHA512b85f8a557457a39d272ac179dc7c00b327b2a9adcd3c148cc8c9e5f4c18da3b723f8e3ebd71f130b7ef0faecba876a3d5379a28c701783f66ebf50b93da26cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd05ed6d7d0e3ee23a95463a2b2286ec
SHA14ce80f500fed37d2b43a09a5c3f0df45f9d38717
SHA256b860b23a013e9a2c7f4b1f22e0f3c8187708f4f8e5e09e0d103590bc22873175
SHA51278b6e2988808c1a260820b3c2c165f1cba5df557aa21fdf8fb39569a5a964ec899512246166bef9aa0f839dac0835a91a5d3c4a12a1e769d2833eeb8b4ec5aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c5190b5183f1616f261c612114fbed
SHA131db9beaa762edf3496b344cb19cf1c6def1e961
SHA256478dde6aab03d654d1c8a61e9f098d8a172601ce68cba9914359be79121e4605
SHA51237e4527ec6225c2073c9d87866cda7b231b1478230caaae4a30c0bfd66a68e9fd09ac6fa4b74b5fff3d7e7d0ec630b594bce0db0533b22db9bef802378bb5c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b510f6536ad45c061ed34038a62b2a
SHA1b42b8ba5e5b6f201641f9442f9d0aa42d10dc84e
SHA256ec4ac696fd221209bdd21b1b52d3d56a96d05b4234a5386c73a429ce00251d85
SHA512fca657e02f63cd0a0b42abab072164e0140b3630ef9fa53fc6c18ee44eb4707bfe683ff3a4e3814d124e7fd6362c8e31e379e2bd05069a56076250d4318c2b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569dec144798e29f54bfb6b381f30a5cf
SHA1d04188f66678fa9b36713036ae1cb78fa554cb41
SHA256fad05bcfc8856ad7ad0bf124932fb4523220f2a9107d589819aa03b0abf2dc1f
SHA51288b9bf00a4e06cc088820bd450024a964267a0127c7ba1eeec72621f64db2f77c7edc6333e4fcd9b5fb83e735df48e35dc6df5d9e96f332817b9075660bd5c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a276451b29b78abe91f188c182cf45ff
SHA1a12773721eb0e70faf6259a69ee7f7e17bfe482b
SHA256fa795434404a91f9fbbd32b87ba33d5e37f5a8db3ae68edaf3b8dfa72c09a0e0
SHA512a2a927fd3228046a1bdc628639547cb4c1402636d140fe1f02d0493e802103fd778a62ffe3632a2b0134f43825b841c0ba4897eeebcb57e278e076c568a89704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c77fcd2c0b63e979dd020d942231d176
SHA15b4afef22d592c55f0079025bd636f8b36175c42
SHA256d6952200e0b41611c7d265cbe245299d8fdf82f6225eccaec44d0e24abd3dfcb
SHA512f975403e8aa2ec537b776daaddf75b9e7394134406de7a46b45134077c4a3c75f4524d940e5a5901a8d9a36ce323e727496b047dea043108fdc8baf20986c537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad7ac73837f67e395da29638aebfae39
SHA1134cc7d5092270d4b23a361385edf86a9c8876fe
SHA2564a0a323b9e0786eb5411948d587236a4388344427ec2a40d32b40b8924e9297a
SHA5129d1105308f464b1f68b011051068a690f58cd6ed92ac15283bc40a9b798c0331dd5d70ee0024cadae8cc4d88cdd136e65bcdd70acffe7d01abb709539e6fa2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e573d9797c6bd38e913ee6c7f6d83be0
SHA140f05cd21f5670df64f2713e1d2f5692b8cb1106
SHA25640d22c981af59fc4a16d3130d8676d3685f325e13a866706ebd88d45e7172336
SHA512646f377a83d2cd6aaf302801b9f841205d192a777784d460141e6ffc5e0a74b7c5b4d74ec4e247bc33b4cbab867b9f32c95b1adf643192b69279ade42b78098e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\fancybox[1].htm
Filesize12KB
MD505a553aff3c4f301f286abe4c921855e
SHA13a704dd8a824b4bd84d9b50c113a1470c2376f88
SHA25662466573618f202e7fef7d6f3a11faf58691c60791950598a6040aa0852d6a3d
SHA5128b49ec2640cb46d414c7181bd6373bbbd0ae619a574f2c05a153f9a8612b8f4ed7f2385235ff3330df0a9844e06e1f6941d6447bd4e4f086af80d45981a751f3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a