Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
3fe786f0bdbb700df6b88b73dbcde455_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3fe786f0bdbb700df6b88b73dbcde455_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3fe786f0bdbb700df6b88b73dbcde455_JaffaCakes118.html
-
Size
808B
-
MD5
3fe786f0bdbb700df6b88b73dbcde455
-
SHA1
d2fbfa8e218f535a41506115110c8ac9cc95b451
-
SHA256
05ce11ddd28ab020c8973b22d46049b365efd35469c3640f9ba7f84b88c2635d
-
SHA512
728fa26b8c4ccc1b6e61cf56d18fdbafd36447d078d57c298fd78b22c91becbe5e4f6183f6152e0ebd429c7d55e34a49d710a5411c2382fe2a1532531345d6fc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421772071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AE41F71-1134-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e20c148dc66ea7dba914b5487cdb7d449e28184c4105fb38e70bb4d435afa816000000000e800000000200002000000009b2d488507cf47916407caf975bfadd2e919aaf815b58951e9e012820e1f22990000000f4d4313427fb454c120c4674769d5aed7a6fbbdaf1e4a16437d29bb04b788db23f95ecc02fd0ffb055413b7828c5f5ebd5f1425ee1a6e040a6d3d45a10640dd32dec949c93ff087e28ea3ad154b894b08526d28c78809782b648acdc4b339ca454f46cb9ee8dea9c9a53fde2a546c6702a22696f8362854e51daeb072f36c4eb83be7052de5f8c9d1119de78a37f173740000000b63d5e13a455624b91f590c80046e974f0b8c6c69b289eaa57a0fe928b56de499baa8167631e458b6902548b01d410129a7f6d83e242db27386b31e5b97d3acb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000eb61af23732c24cf7bd631f862b7b44ba61696090e4941fced4b9f43b37e3dea000000000e8000000002000020000000c559bd770dd4fb0efa4210617d536e4e3177a6dc44441d6e997e36da6ee1389f2000000082bec3acbd28f0f4db9a14d0027485d2bb644cacbb609a5d2bff64ae10af48e340000000eba3b51858a189031560e2484d5f38bd5e681c0cabe9d8c685fd64b83cd283a27276ba2e6959bdfd672b0a16bc5f5a8118b6bf465a0e316b14170b84504f1691 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500e571e41a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fe786f0bdbb700df6b88b73dbcde455_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b226bd1d046f554ff2bca1c7bec1adc
SHA167e9b77ed7a96042bfb6eddf200dbb2cdf14deba
SHA256b55d5bdf7ccde970a6f35a8e0e710952de12de5f59a76589f7c224a9a5e4d2bf
SHA512441852784193f4074be24797c5670c3d284cc7d5f7b31ebd0f16a20416652bc3f6c3a88bb064b9556d7499863d6066472bf656bc2bf4c1346efd460cd979977f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583690b9bc825a7188b38024d483cb4f8
SHA16080e4cf69c904e77fc37026d4bbd21b8804a628
SHA25620a3ba968918f79b83f79b35f18e137739d4bf729146371468fa1089c95cc3b4
SHA512419fbc3ba3cc17908f0246b75a304d77d26dcdfb5a56f7de1af78be137a78f7fe12bdfe46372cbaa8766d17288c9c26b3875504a361ad0355d4ac6eec248c2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e25380bad3fca163b8b917c4bf509aff
SHA1b3aaf822d0f1bb73aa13b96d934baf9f9e81f5bb
SHA256a397c5a693a32844bf6bc18df5b81690efb640b8f748d319e3e7e2f56dec8f57
SHA51265f813d3a92a853d753576877ef13e65dc00a8be945599233ad9ee0f41fa83dcc1ff3b42fb9a1e0b52985fb7b6068dd98d17734c7a2562c7ce169e5417f8cf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af453c71a5d486b83c06bad22b0df039
SHA172a6bee2f21f2baa84fde3b5bbb8dad756bdf4f1
SHA256caee077c59ee79c757c4f75dbf2efb3aca6d08b1acac4998484cb560a5709617
SHA5121852f3116cf829a4198c314a415a074697d23b9b4dd915af6b4a1545affb69ec39ae45ab421263831ed40d4d410c7f5ff4089b62707524ac7a8b1295b7d3dea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539fac60d6bf88906f685a0207703b579
SHA15da68b195f8e3eaf5ecdf024ccbdd1ab8fb4603f
SHA25696b40614234a5425bd5864e53064f80855a6d600b1483df3601b8c7450a55158
SHA5121aa5150f9b108b5883dd535021f31902196fda73e85cbfce8dd9b41185a75f7464c6b689eb02fde87a1316868c5e9f37ec69a91728710bd1785fa8a4de669edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517defb337389d6927df71bc592ae85c3
SHA1a894a68eb2a6c453aa9f06a668e207acbdac8d4f
SHA256a99b22a1707dfde12885c83cc892952ca63ec3eaa68967385ece825b78c2df85
SHA51286e259e0238dca0ebba16a04fe9cdd562c22669ebdb258a1b7af4b82ca3c2c4e8077d12f88e15a361a22eca413bc6e307d25d1b7c04d647d39b2e90a4ad39bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589582085b83f193c23a899ee1611895
SHA150432f8911f1de4f55e083e3a93e0cd9c34589f5
SHA2564d2955c954f48613da6c3806e857f9d222c1338e606b4195c22c69efcf45e2cd
SHA512978d878fb3d349eb64cd5bc1b44f50f07141721f81939dddd0ede4def6eac16cc71d8ffb992eeb1ae9c0e068035d1fd785299888089744b0b04e8e69a1e8771d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1abb31ce1a430bb956c8ed416726f4a
SHA18a7b6940a5037ffff378eda3b64465f919cb83b4
SHA256e386f0deb9bf4c2f60c98b5c09850d25a7d78ef159b45fdaf087846351b93d26
SHA512607d8a2c0fa467e9910cdb1b24a66bb2db9232f65465d798e97fa6d6049c58a9f76f353d1d65623eeb77732312e1fc80b62881ebe29d68f4015e59b75946b27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e332255e38b4aa1f146650b78e97fb53
SHA1dc52254f65d1997bec196ddb4c20b38abbe259d1
SHA2562b23c558cee0ffbb9fb7c86bff2662ad61cef6b6affcef9d8dc5dde2fab6c6b6
SHA512c28535a5788b26a3a9a059982cae0bba86d1da79f5cbfd4572bde6375e2fcda39970b56a610d60c93272cb3b17bfa452ca81de019294d957112cd7e82daedfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff06f6942dd7d8b0e232a85c941af7f3
SHA1ef287c115b20912ad9eb4b62e6655aed4bec955c
SHA25618a85b395521b962c1f4ce4f258baa2ac731e65ee8d00f599a7958e873988fed
SHA5124240dd0d1912666ad2004bb4d6a0f8853ccb069214f272ae9566bac01ac2ab33c85d84e1e8aa6078f4f7d88257c5a129bf669eaee665ee0b00fa9bf20b12d8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b93bd775aa1f0d116d3b40106042fb
SHA1b2a9ab8231f86b9ec7b56d9d8befb86b562fc8c6
SHA256701bbb4b9b0606a789d973d673b0c3db84269f2c1c8faaa1c500d96f6ff88918
SHA5125c8e7a0ce7caeb095bd57b020f7a4edab23a4f2d26158f2cc5ae5717ffc7cd65c96dfa3c1c05711327e42a3993a23526804c2f79dfd5c4056481d2935e68279e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b27019c75e6eb6ebc2dc2bf3ca377f
SHA1f1961abf7c079a49f9dc06e1bfbbb184d26b2aa0
SHA2567e4fd2013fa5b74a995e322aaa032e84cd071728b298d8827495eb4395eae7d4
SHA5120f1cc84e588dba45b3c58ff49df4e125b5d32d34200bdea062bf9f9efd392c46acbe36bf688151b25471efdb7b6b09c9dd7a0dc4a777c3827fd8fa6847882699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f4d175d0a2a83864e6fa35b2d155914
SHA12faedde0ab3c11f6d59293dd57f481378233b2ad
SHA256f49379e08bc7b7359679d25bc465bcf30f4226566755396dcd1b789e4c963517
SHA5126f1c433b8c8ce82a11b32df8fb5526b0ed14e7be6856df3d25c73bfc473c2b6d5c037030f4a7c1ebe9d1aeba6f76e6394da4102f056d788707b413a996cecdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f75dbfa0d4a994ec0b99544b1a54238
SHA1446d2a95f9307014725c9a8389abaf4ea9705dc8
SHA256a02a18a1298d48ff621b42971de70a604cce04ecab7488cf54f57530ffde2786
SHA512c86d6bb1f808295078d8057a5e74ee78a44fa1be3b70a4796bd44a3d12baccb7af0e9068fc0f855b3fb8d555e52ac86f568d7dd0b17c9a160403828b88766e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a222348e872fc154eae9fe5d72afd2
SHA14638892c0bd9ca1086602e11a9407b72dd84cfdb
SHA2568287c9a7f2fdf4cb33e806469d9351a6f59bc22d7a784d5c44d1d9498b421639
SHA512d24ce412a8c65a8ad37cb96184559f46d65af92601ec16d6f0028c41cbc08bc8b6236d3b8f925c2da979736879fcb82abb26202bff9f130ebe0591cba5b4b888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ab016fabaf7d9cc83bbb6eba8f9480
SHA186c4b9bed036cfaf1503d31ede61bf5a45eb1375
SHA25607108be04046e1211b6b9190dda5e76f1f9a4c7a2fe34f564016f81dc5af3e8d
SHA5120779aa16012eded74525994a2102994158a97a51fb2df194c8f6f7e2920c386223cf1cba57e47dcdb05a50660bbb87354778857586b6aad6848a3dad361e27eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c98fe3a22f2d6af5a4c19aff68dae715
SHA1a963f1485ed4ea8e4d786484716348b6ac85e6cb
SHA256f86ef7328083fa19fdb6ceab4c4066a394a39be13f6d624e03a0f4938daa19d6
SHA512b118f14aa0c7304f919b36416b2acf3428759cc1405af0a09386c4b2f4ec2bc6b928fc303d47fb5b09561fd285bd9f24ea18d3bd52c617c85cd711fce4c536de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8dc002e0cfd81b511f3a803be171ef5
SHA19d0827ecd7e56ff57d051495b2b0f7ac01b783ff
SHA2565d1598557b9f73494c06c6432f5762f15d4cb765d115999aa9ae59445031ff40
SHA5124909b6bb8e26fc897655b1883ad97266014dcf95437ac3e56ca073fb6667155ebd2951e9e3d0576b90b0a6425da4d48a865cad9b388243b98c1eac6b07da3abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa26db61cdcfdca77c09deb01cd03abb
SHA1c9f20316755fdffc2a53e316153eeea48de2e9e4
SHA2565d92b2249d1fc88773225d19e79b394dc3b5bcf1e3644309389aeb1154fc471d
SHA512a751760ed91200348f245bb165de93b6268141d0fc90d525efe81bdaf1cb439bd64d3ba0c1fd4ee879d8536f5ce93367f7bf90a434f10aa344274a7e780361bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a