Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
406504df1f4222d7df11042565ecb3f3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
406504df1f4222d7df11042565ecb3f3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
406504df1f4222d7df11042565ecb3f3_JaffaCakes118.html
-
Size
23KB
-
MD5
406504df1f4222d7df11042565ecb3f3
-
SHA1
64b4955d20f9800edcc3db87ef6550e88118bcc2
-
SHA256
1cf0711e60196040c6d2fe4e292c52fd984bc0a6e5f654cda2a7a97af08f3cff
-
SHA512
53fd3563dc734473e64df1ed55fbb41dad518ab1215b770ba17629280db0922271d76f28658e30a016e124ac92838902c5dc205cb36b570b4730cf123e8b9ec1
-
SSDEEP
384:i/5QgTIapcTxTf6JSW3sAqQ/5a9Pfgyfh4SVMNbfEQWXQzIol+YWfR:TN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ad43b944d384ad98bcae73d2a894c6c77ec73f88df387c9f8dc908279791faba000000000e80000000020000200000008e925e91e2f83016e7dba58fd95275e42b4c0b67c94c8db5f298c8ebf4b246ae20000000f61f89e969b3825891da9079b9ebb783d615286fafcce4e57d1fce7ca06193464000000023f951dada7183c3367a54348f036f19a5f8ab5ce56fcaa09fe198fb628a355f0b0618e3d896b402949aff9c7629c95711bb0fc88acdde2559e37849e6a2cfd9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63DD7741-1146-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421779816" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00288e3853a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3048 2916 iexplore.exe 28 PID 2916 wrote to memory of 3048 2916 iexplore.exe 28 PID 2916 wrote to memory of 3048 2916 iexplore.exe 28 PID 2916 wrote to memory of 3048 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\406504df1f4222d7df11042565ecb3f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ccc07f4e6f16265d1cf5c73d5fb77c
SHA10dfbb459979c8d3b527b51fece8edf80d7e7cb84
SHA2565b6bb1ff9c384ebaf5589386aeada2e8bc42f340346691c64f01d5288704250d
SHA512ae9308f4045fdcc267c47110cdc23bef3ee882235f11332148909db0192d6c39775b9fa21e8bfedf5a648c508bfec94c58bdc88f6198b9de3076f8543108b447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ccc248f46322bbd8012c96f3a2af69
SHA1b17724ca075a35505c441d248e10d583559f5fcf
SHA256b279a419813000c7f68688194c48242cad63a2c7c7d0f6261abd61f08d21b2d2
SHA51229accf0f4b28b6112006fa971be5662fe54861bf347f9f5992647a1297f85d2dfdc35cab69fc542a00075cec49037ac91ac9b66c02f03b4ae5acc437d82a128e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d07cd9ab853e7ab43cf625103999a968
SHA1b714733f2fdd004d13e6186529cbf926425b5e21
SHA25689391a7fb81b1ab4f4257afa4c356544b7e85edce7646296ef61352b7a506235
SHA512b7ce05328c1aa379fd2621dc65ebca21c103bea249d0065faa01eaab168bf3bd7b6fcbfb6ac2dbe93eafff1a5db35bb1923aa58a82894b9732d92a6bcdf3e4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00efb33b76d5328826cf3ba10e414ad
SHA11c9fd23e121bd5010b69af3c0048fb501008301f
SHA2568f91249760df8aa136658a2782dfcfd4133c061a4262b15f149caf95762314ea
SHA512dba59b59c053d15a79fe55ab19e7074e8e7f1eb4ff2fb5dc677563d11739d53f92eb85f53f8f9ddfa931a74eafaf16041e7d358e06cd18266f86f0af84a42fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57786940ded5ceec50666a24e48916c65
SHA17924942886c9d184a42f5d86a5105f3de21848fd
SHA256672c40f764fc290bf2bd46c5a81b72ce99edb3ee6cce8841b2b8d593d10c356e
SHA512a26edc04d86ad32f3ea6d8b65d75503215199f9c74c01af5e86b116b83d3a5f1cf4a419b34df444527f16afe04e37e7ce1510b4390b42a43212033708ced1213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5789228c083cba2d0aec0f105aea2d3b9
SHA16bbd22137029ffa61cfccea98b1c43d0e1b755fe
SHA25667df5a5639c577fb76c685c797148003713662acbcbc7203ee8a09b0591fa167
SHA5127db2cebbc01995d32cfc1b689199ea6271d292d5876e7f96a6077ef22df9230512fa58e8663cbaca99a7e747a694f2f3b7b1138a7067d0e69088e0a221a56899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50baa7cf4c318c63b3af27507eb5a904e
SHA1504bb28da5e9b94c42ee2e5ff554f0d06392c0ce
SHA25631f1e9405558abefefadc4b731abcb2ddbd8a078775fe0c11fa7c4cd23671707
SHA512c5dbc90ffdb75276b4469ad5a7a3445411d622c60a1fd14bcd27d5c50443465d99f6073c7e6e7fc244f0ec1765482c5a31dee4524c708fe403499cf08390630e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b15d3d513aa621db8994de4589035b
SHA123c10c941a26b5678bfb5d17b65bec258c34386f
SHA256abc8bff8167fefb2484f07234935958b0281117d64f31e53fdd9e1a13db94b39
SHA512dac407c0cc3db774718d959bd36da66378fe0406890f091069ae95a652d1372ee956614014663efa1618c431826c3ede78635f942753289dc80c80fff22769f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3302cd17f72efbe07c2d667027eb517
SHA175321053505e6b3963e32f43fe5285b29f3826e3
SHA2565db5ccedd656ef49699d2e59efcb6d9a5dfe355686bbc627789dfab9ff3e27ae
SHA5120e3879ade968bd6bb020a6d231b69c4d5613a913c25a2b9d1866ee9ece3b956a3d58b3675f31190e2fb164e018b2c6677aba90e607af96b8b9b54d30f8b3f68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6fcebd9066eef3c934dde7a7db8d887
SHA1a6d3cc886d3cece1fc4d3d357a8a7ec8aea87189
SHA256c2a2f632da53178ab7688b9610e46296e7875853806bf662713f1d1adaac869a
SHA51281219edd57533244b70cdbbcf458993391550c169e7c3468016c8947ff7402b05ac2bbf0293ad110ab94b63ae58e1a2b783bcca76ef498e667ea1f7f3b93c97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594ad44c0df613b6cfa591e5fe8812f5
SHA187ef7a2b6c21cef538e7930bc3ebcd79ab05f265
SHA2566b30c08177c304165b4ed62604b83af8a517852e2a81f39709f5987f0c8812b0
SHA512a0cd220082efa9d311a2e993a7c534ed3f03ae9a70f931825f143ff8bc72b9e679416a9e0f9808bb157d0954b426f75499a1c0d71c960dbc5697d378c0f38698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5ade7a73f8c6fa95ae474918c50920d
SHA11e2aaff06509db021b7541929adb0f4fc3c19087
SHA256b717bfc58fa2d292a0eca78e962cbd09731aa6f5976a6e8fe452c04af3655b2c
SHA51282707d6bd6f87b080cc051900947850cb7095485da84aa3389e80b208e636f99e02ba002c28014acb025e6695505e9efcd0b684df7da49c1ea3ea93834c996f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a13849daee131c5c10d8fd446d64a018
SHA1a31629437d0d314069b8c6fe4c7008f842cec112
SHA256ebf80360b5c5da27c1fcdf49acd420c35e3660d3dd9875cf9bb48b2764c91b65
SHA512ce91a01fdafae72dfc01535ca3649043da3ab60bd35c2580b9499347c4f3df12caa222b811433a3823cdf3e6d6cea9e790b449cab25e3deb4569d964f3001855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9e0ff52db11bf4dff472886cc6ca8b7
SHA14b130f57d529bef553762f3c3b35711e180f4253
SHA25661ba980d0aea541eca7402f514f79ee32271063057b5cb15c8fdd4f280bddad4
SHA512d51e03137a04d49ea684b35e837c21c318d7b31d9a84fcdb6f959ee7b2fcd1c9bd750aacf9aeeb2dbe109b18b24e14bd65f227d7486e778154981cbaef6853a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d98f04b9015e63849bd4805cb7c49d
SHA11b382f3dd594f70ec9b4421caac97e2c98bc8880
SHA256f7f1a10ad557a42fd1906c8d825b96027d20ebf48fe522f5439246f325433c83
SHA512ae487ae79de5c013e6b63b0e3eb1f54d93ad03c90f008574571a9c57564d01c5b236dec8bbeac77c1d1f9b6def89ab2fa8f6acd1f0043961c739643bbee36092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb3dd698c15d660b857470c8e364c68
SHA1133902694d1311c9b00b78672c93318ce90ec77c
SHA256d35daf39bb6c16d3172528fa0bb7dfdf0467a7921e297f1317a5802a3bceaae7
SHA512148165ac733da2471c8a5ff14d01b67255bf054fdef2dd0d2bb16b2f98cc948fc6e4b4be7e0da946fb67f89593b24950e30466f412b2768b24d6a5363d7073fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee7d8883aa43b499e85d6710e509d44
SHA1a80786d0c70956941c3e78652ba2a32e911b2717
SHA2569741d5b0a521085c093a5f78966d92279251ee0f086f6b474ee5fc6140f967b4
SHA5123f927a4cfc2345f4a9169a2752ca659bdcc281acb87c28a76941926b323936bc351c02b6aac28558872d0aaec46b2449b490918480c2ffc482f293e324c2db19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae54084122020ac84d183bb00ff586f
SHA199acc066a48723c3576327c709c44fbc51c2b9c2
SHA2562fa5198c4a04404b6ae2eb5e76adfb543673a1c13a2ebcf122346b21b086b8f5
SHA5127142b7aa71f8b9472f748a6b75cbd71e7f4d33890ddf2a4da4651328a4e1b018eba7793215b7f06a1174bccb990ed992fbb7886b85d7b25a837cf252d7f21f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5253604d9189dbee4ea1e618794f183cb
SHA12c0e640107b9c532581db1ae0d8c1eeda1d132af
SHA2569496857abf9b811eb43286278ec028e1eb496538360a2c1a9efa50b9f64510a1
SHA5120d8ad6c4f861427570f63265edf0911cd3dcb9c45d4f053006539ebfecbf3bbd9bb0d6a188151e99c6e373b1303393b15d20b47accde7e33b012579e51233abb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a