Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
32193ed72acd4cdfe2feb0284744a8cd_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
32193ed72acd4cdfe2feb0284744a8cd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
32193ed72acd4cdfe2feb0284744a8cd_JaffaCakes118.html
-
Size
84KB
-
MD5
32193ed72acd4cdfe2feb0284744a8cd
-
SHA1
40e1f4f053d9ed0029d9764ff7612625d3d94790
-
SHA256
1213ff718ead58970579cf83aa8e6a92da3889c3c386b91bd524572c91ff4a71
-
SHA512
1b3ddeaa6c4272d087c1828f5cd1dde3a96ea5c47ccda7868faf07f121eeb320b5600bd0b315b482dd648322a5be82b2cac6b0fdc5254a4648cd0668bd25d19c
-
SSDEEP
1536:PLy1iFLGaFWUqsV4AMvAvwkkaeeeve7egeR0eRqePeYeqeZeoeMepeUeSeIe8euM:zy1dUqsV4AMvzdv7X/KtlOlg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809ae72445a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FD89551-0F38-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000125f6812c44a9d4f99b129e23613faa0981618bd97c9289e94e68a0ecbc5ec72000000000e800000000200002000000050246290305cc32d6bc234b02de462e2534fa18cfa2458ad66fd0e18f5ea197120000000435517b7c07a702278fcabe7f68c91d1af893b6fc1c439e80697fa01953b654940000000b711a6e2ef55e448a675dab745f49558835e91ec5bf0bbdd271ceaaf869a480bff21c05f6aff75396c5886c501e9e4e8757aa809f4b8853f216b84dfedffd9cd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421553867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2984 3000 iexplore.exe 28 PID 3000 wrote to memory of 2984 3000 iexplore.exe 28 PID 3000 wrote to memory of 2984 3000 iexplore.exe 28 PID 3000 wrote to memory of 2984 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32193ed72acd4cdfe2feb0284744a8cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ee26d75ce764cf04cc8e63d78f5af4
SHA18bc39a642446bf4ad1675c8c565371be24b489ab
SHA2563ce8ba7bdcaca5c181ab00877f326fa2e7ff6d3b93496b0cc220139a8582e179
SHA5128d55652c9fa5a3c647fa0dc00e16ad26d9a1a6ce6daed3e09a4faa66910ce0fd2d1d7e7d02b9f69468b54882624dd4a5239ebb15ee85b6af2e08e6b92c70fd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d38c3cc6b0dffbefa3b894f4a102e49
SHA17e194b2017ff60a16859a29e6233612774e342ad
SHA2563179db1bb6f0d6c83d51b65952b60964ffdc74d660d7adba136513a223e348ef
SHA512d023beecaafc289ae22c19bb41c49a4f10184e621c40ed2c618705c05a56e7ab52f81f250df78c3ac9c38e8794a373124e498186b3afa2ea3f093abbdaac3d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51779312d2ee2073e68081993b5ccd2b6
SHA1b0b897917d02b213ac63cf92bb2723aa22a68df3
SHA256f9f86ef6db7e156df4ac1ac0d2522dcd7ffe9bdd66d18b22bc8e612682b2f54a
SHA5121b9ed6a85f72a69b99e5bf8349a7538052ee02443ece69f0f513185477604fd7289e75f6c6ff20f1ea8204e44fae236af1d158f1b4f7087bf29446eeec286028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5244e00dbe386c3e646be044bfc12568c
SHA18cfb2efba424dc1a83ab625b1073b57dbf1735c7
SHA256332acdaded91f6bd6b81845574c7f4861eb99827a6d129aaf62ab525f695f43d
SHA512761610f2b086a5f986db42cc1e3e11a17837c2d5e62cb5c15ee6873ee20f2b7a6c84bee60299b983b34aaaddf240376b84ed1c2710e095f43504b278a8eb9c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59292100f85d9f6f757bbcb6fe62eb166
SHA1120280166af2ae3c2420d469d9cd79111e6db51c
SHA256d5e668d2099be6927f29ccd96efc1371a65f2abf1bb3e2254139f2729684e8c3
SHA512181e511b4bfdf302c9ef6e8f86f23fc7ec79acf680fa692197f615af257fb704a789b78242c7594413231b43be1e3a399ae2dc9ecaf7dde4825b5578e30895a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52182f4f767a4a6e3ad2c3cabb5855bbd
SHA13d7a54cfe129ca59a7d240f00937cb47cf84889b
SHA2560b2dce9a03f9299fe7b1980183c8a02064e9bfe8eb51877f42597c7d1a5c66f5
SHA512b9fe0319a6b00c8b7120843f70654f81608f9e6c1bdba47c1df2d74bd999b189e4f4b485bbc8338518d7f19172d8bee1650c17aeb35b039cab88944b8d4683de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7f8cafd7cf2fbaf00d0e8a175d963c8
SHA14239ecbfa7b3d19d8fd8aa7b5e181732c792cba3
SHA2569090a24be9722152922bef35bf0dc9f9f392fb4b473108b856046a588bd5be60
SHA5123cda34546e3896986bab31d0ab83da1c7768c9469d0e026e66c9ea3d376f7d5d833f1e91ae4024bf85fcf369da2d0ead516f642275001662403d98987c231656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564ed2175a026390c4788219beb0cfaff
SHA17de651378815a9338a41d1be7e197a36b6215fa8
SHA25606d19b52f866fef9a4346fc749e29bc284dd910076bdc1320d09915a1145dfd9
SHA512550eb17393789e9ae5ea8b2feb0b1ab16f76be5ab469061428b1b6e1affe3fa3822108a2470a62fb8afe1e7b572c789cd8e9ac35a8b39f8674e7e015521e8881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c6f5cb9437f0083eca5fecdbb3ab46c
SHA12fac0ab0308cfd1033d68b447b5f1d078b7ab71f
SHA256e1bcc9868627fdac244e615aa3962efbb268bbee0f90457fde0a4ab194ff331a
SHA512910b7a4bd301095dbdaceb837e4196a443b20555ffe477ae16e76a1da33684a437cd4067c7ab4f2aece6b7e35ab46d8d835c166f127322a77d055020faaed737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba10528a5934103f3130a9432d1cde0
SHA1314ff39ea1721d9ea65240f3c15eece8d2aab7a6
SHA25695ffa4687a3bfd5741f8025f98808e244ba3b7988c025460e78d7720ab116758
SHA512c808ae217d15f08d94ff2835b14d12b23a1481c5de215e0380712499f1a936fd07e29388fe7616044b7f104e9a9d43d2c9b8f5eddebceaa3e2e09557e08bfcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e275046e85b0d56aed598e4a40e27615
SHA1aa3d79995a9ce5cef304fc2fed3e3b5c3ee10eec
SHA256bcbf5c516dd701b7c4d600fb3cbd84aae66f7adaf3354e1080146d7cbad373d0
SHA51224247edbbc869ac3d7e5521c593a3767188fa0dff45400d0b1b62baa862ae90b8ec77fc31b56451e1485c5049211620435f7732ba2ef61425f8d335fd7de6d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4399bacce0d0a4cd713e274a1209b07
SHA11a38cf57e74eac76638d1435c3d3cdd20153faf6
SHA2568f71fea6bac447f3b88f93a970f06e08f1f0221c1871a616ae5883c1de77a95a
SHA5122f8bcdf773a858ed06c224cd4b661d127067f6d5f2b2d8a69533586ff30a18ee6cf2cba070f70e3d927be773f0d21b37f9eecc451cac6b38e22b894eaadfb912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec384d1dcf6fd06fad2fbd1c8698b1d
SHA1382c7d45662a020e599c7c79abc1b79b1d68b06a
SHA256596dfb366f4cae8e7d61a463693c93741678899a1e36f10d4e0e269a5aa2c065
SHA512e8a1453fbba8dbd87836fdd818eacaa080a6a28052034b1bbfe9e665c8382462af495e28c4792eef7f4ac7e0294cafc233627207f95ace39d15de631b476d0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d00772e447b74491d0160faad39f38b
SHA19b2da6f1b4ebec0368e7e02ab6f5d5ac31c45749
SHA256a9957148a66c168a98b5db7630bc9c0d02d250d41c96b036e9f615951faa6885
SHA51220cb9495d265d118d5f5169ac3444b29012ad823a0acac047a26211fb93f7ff236063c7c85a733742953e569d4fdc06a13359f891e5a8bdca68a4ac74505320c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da3f381a4eb065980ad7cfd19af27e3
SHA10584cc8941bc9bc92a7275a361b3702314419454
SHA256fb2ad5e911019ed96146c32b8cfd5a4b8d29cd764d2c0bfc56684ff901c7690e
SHA512cd942454c82ae4a912095996de969cfd15bbc1989d86e9caa423a6ffc6cb531f74e0f0b791667f2739ac84edbcaf107e4e3c233e080a41da71ad2fc71a4f2554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe3229533d1ee03bbe3496e2494bbe12
SHA1179797fc71cb5c39ad85d6da433d12eb0399b9a1
SHA2568e364153fdd2a35d2b50caacd1fd1bfa3c21c9963ee08fb159603796ad61f437
SHA512ea29f5b8a7c4589d2d8c9adba9fb8a94e948bc85d59c4f2e41bb51b347f22a97cd53f276b74aa8e3b0adb25c64563fc76ec0d2a6b49288d9a84b6b5748f60f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f5e0caa61235257820c82fd4c125768
SHA1da6ae37f83329d03a583bb67343d80f783dbd3da
SHA256897a7bee742710b75b7cd2f6c9dcd30c296ae6e8871fd70a057d8f1bd2c673db
SHA5123fedcd93a30b03190f7d41e2b55c1b81d9636558c66303a4c343f1f4bea8f48d4f3da3db83bbaf25bf7445be0d338a6f09d00728a14b27e77c9bb0952c174130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c278ab3a59f708c553f2f7a3dcdc4042
SHA178eaff2f3fb0502862cf8d50e5cb157252195fd8
SHA256426fb108907fd8d8e3b34cb0dee7a7b657d3f30392ef389f195a39dfbb76dd0a
SHA512faa0a0d54d581703dac66a3cdba8a297acae3ecd76d10c21c9e33a118f3d02b6fa26f2922302764dce1ebe504f957567edacb29de52a55348557b99dd280a215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b3434538e316a89b67ed0d01143812
SHA16c0c06251547006c3a7588eb1c27b3382b8fdba4
SHA25695b5f90706307d6fe0a432dbe3f60ae9688d78a120bf95e620477f30c3cb0a15
SHA5125ecd76e9ac245ceb704ed68c91d93b5e0a6fc06ea94983eaa23b7c3e426401a51dd23b057140f9f2bcb63b1ebf50760a113b42ca24018738b90672d15e545d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538661d101e6007555cc23caafbb123c0
SHA18dcaa2d61089e0c379c16f331c6723eb7181de82
SHA256a7f17165273599793ef8c6f789d8868a257a7bac553be016ec19f2e740e0ca9a
SHA512e1fe4f117e24d43fc7ad1a33a52cee1f084d36a83a0132a212a270810c0d4ebe720a436566f2614620ba494f27f5d4a9ee993ea685638c5fe3dd6f09e57418cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5577cea9a130bd444b2fa8b76da795880
SHA11fb6939f0352f61ae2d0d05561222bb5b9c9fbf0
SHA256d57b19e47599bd14aa509daf88f70924df78b8706e90a659c4c95e780738a33f
SHA512b17e5909e4030197c988faaca90dcf40c987725a6c8ba906fa496a4a3fe41142048c14c06a754180b5c53f652381fbfd0999b3035f9f98c54be2e21cf18768fb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a