Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
4237f0826ae46718e7077409d6bafc77_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4237f0826ae46718e7077409d6bafc77_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4237f0826ae46718e7077409d6bafc77_JaffaCakes118.html
-
Size
1KB
-
MD5
4237f0826ae46718e7077409d6bafc77
-
SHA1
02df2c92d1e8437969df08f40f142840f45e950c
-
SHA256
9c761b744f0c855d8b4645130a3f2da513c9f84458a4d6aef8620f0f585ca41d
-
SHA512
6002db889bf79d0015e9fdac19cd2c28729e05259911f5835e7ead74de092f45729b2a9d6f38ae4934740b16dee5d6296fe1823be45dcd3eaa0cafc0f3214653
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC8BF4A1-1211-11EF-9201-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70407d811ea6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421867129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000967e33bdee209321e229afa3eb30233636efd8b0df5c008107d2bb9ba1bdb234000000000e8000000002000020000000a74f00f320ce557f40c707c1c1b161150f07d59cf9c8a51d7df1db91c040eaef2000000051e7bd040436e98c38959f80fe3718d525da4e02344274e693cfe1c21ddd997c4000000021c6b196369ff6d49478ebcf64ab15b8c7a00c70a626812686a4ad3ab67b8001706d51bf754f6fec988f8884c72892e2974ca987dd67670580de259d1ec24e51 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2992 1540 iexplore.exe 28 PID 1540 wrote to memory of 2992 1540 iexplore.exe 28 PID 1540 wrote to memory of 2992 1540 iexplore.exe 28 PID 1540 wrote to memory of 2992 1540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4237f0826ae46718e7077409d6bafc77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5457dabe9a55b61767b8b058f8563b823
SHA188ba1cd803d545f31f3423bfba14295324c31d78
SHA256bef3f6e23e1f376e4efc783c090f073451850304cc5d5b89c50940354fd64066
SHA51238ff2cccc2f706ada9e1274048b7ad4868831b66a2d0521823c0e09d8662d56f9d53ddd9d4bf9dda58b4ef3978f462d2be4497e214a73bb305991e7b4c609b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4c9939451950557edd512c659008a26
SHA1e7369a37ddd59599eb0e18c1a3774d7fbeeac2bf
SHA256e6908832db027812573f4141c4e0901f308bb9f8f2170f340c46afdc42717957
SHA512669318faef6d4641db83f9369a0cbe5414ea1b7246645d1cff52f58d074f55fb8b49b18b6cd948ce096745464f402ca78c6b4fe87ebeb4bae24f23e69f959bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2986f9ac9acafbdc33486dd530805a
SHA12bfce3380a0cb804ab95e83e3b3372e247731264
SHA25642b67e9e20a6b429c192a66a6dd58bc20beee60bd017df0d9bf923f4e740c464
SHA512562bf0b5d19ede7fccf25f6b2e43adfcf0f09a419cf3e604386a0868abe749082ca84accdc4f80f6d41d992b394057d1a6865769033781576f91c9dd9c61a5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a5e7b76db6b4e062bb085ce842d71da
SHA1ffe322ed4d5bf65f2fcc912ddfbc9322ea826fb0
SHA256d82a4b0240cef548b83652aa0fb818aa764441becd6ac678edb43421465d2495
SHA5120fe14a3a5395d9ea1bd910c03138d027ff8a2e910afc5466e0c8a7c5f3993f3b6312becc9adca90319666293263f2111582483ff169475dc89689b2e8998ceac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58115a8e20eb2a7aab804e061f2c55506
SHA1f5eb5a1d640aee47eb68211cec665adc93179956
SHA25641bce5d1fc8d1ef6e127db038a193d507717364505342ec44cc5fa1e4d649e5f
SHA5126947424ff0eed736b8e820ea636933c6699cb1cbc80cfd7ced4fd427845d02a68e1972ad08a93e7c1a0ce5fe3e14532c73b7d76f537faaa9fdcb50c5024291f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529adb695c9e6557256b0d24fdec860b8
SHA158cc76eb79706e9d0cf68569c4847d95ef25bcb2
SHA2564dae8ef7c36ff223d8809fed7dcdd7304ed6637a4f6bce04b3d669770eff1d0f
SHA512ba5a745b8feb14af9914dcd3a31988cd59f66a734f1f0e0175244bec34408b1b36f9152431aae1ae44094484effd53ee7554b70bd7e74841fb15198db024995d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d70c5a77595c511114d0a67a1497f63
SHA16650e2f881f6fc3c16c173a9652d6b46346cc8d0
SHA25659ca5ee1e8d0a55f6bb8b0adb9562e507a5cf0409616a1f3bae38cd2f9cab72f
SHA51243740bdbefb94547c7f263c547dec28f30fe03b0b88ef8fda926d7538592a9017b06490e54219015a0dd70c8f7888aa65dfe705080d55cc49548622e8022b783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140984ba454f894206483c048caca311
SHA18ea779bc2c779838dd8cc954512f4ce6ab15a2e2
SHA256c99b86cfdb5544a8a34a87b9b7bb8b57152b0f400daa9e61441b1fa03c90bd49
SHA512cfc417d778bd17a7737798ee08dda20eedc52637e95f6e828575e777534737568208a6de781d986b417c519a868ce1b7088e5c9a3b2116e17f9bb43386628732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391fb2f9db3c125eb7658156118bcbe2
SHA12db6aecea86290f951a7580ca01802c9a8bc81f8
SHA256f425e9e4c5586152623f579f9123d52b8f6a54d9a0d4624f107fa1a2acd69c37
SHA5122fdbce86bd1cfae86e5a3130071cea9865e55a7e69352c266c3e270a694426a26685d3841907333769c8b9dfb48b7d426bae87a2c41ca8f8136131d53eda69ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af0082a25ec648d14a4d2d45790dae3
SHA12378e79fb28839da36b150f5a55e896d262c9656
SHA2566f396e3969c86902d6f71ee7ae712139e19e48ca3452ae625ef674a8bf690333
SHA512c4fa08662a2b9262dbf3332488c1c4e2abb8b168ad53a3e8fd2572a898d64b38982146168825e14f30ca59a5134680ce6b4a1b352fdc3ad15bfba6a8a6b5ba5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c111c640d67a2128d3a39db34f60c497
SHA1cc113ad80dcb2351de0166384ebafadc45934534
SHA256b6205b2f666d66d727cd6df7c01f40f97bcb3c15364c1e3f0a85985219781877
SHA512864fdc043fc1a37e540c601799017caa9270318a25496b62a53f5d1f5b8d5faabccc468ea1ef503b7ed4fd14e9a64b74873417ec53d136641380b7ab1b5ab99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552826b30297b8f90cd92a0b1772a89a3
SHA1dd18377607ad71ab43f1554d04411b2cb0899f03
SHA256cfc210e73231b063136e5c7f2611cb0e9089932c1627c4c958fa86f059c8924c
SHA51293d8c2c72566684634967eb4cca7cb5056623ca73dd292c67ec71451d23f8580bfb36524adaa39a0986b5150f2eac7f1cbc053ee62e87e22cd483747eebcff4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c4fe78b29c4dedbed403356823290e
SHA188cbd1a60b9a74d99a85e9815240307e2b2aef0d
SHA2568b891d1634ff6100aa591a1bb9f7aacd0c40fb9bbbf4549f736562165622ad87
SHA512b2b3f078511b4775dae9d4486b2a1c3f278971cead6aa08dc5ada05b3298f198d94b5198003e9903565956d90cc36e6e68b517b151f78adeee22428edee85230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515503d84e667580532155c1fb6432a28
SHA147c6b5913188f4bf46230b19a4e8bb028e62e3b5
SHA25691d11c2cf569a9feb383f151b3efc89dba01a8ed8aa0e011a69781c21f2fb86e
SHA512e8de798c5f1cc52c95bb5d5ccfcc2d8c500b5f9b0442fa84abaeaf1f949cbbd5ee552dd891cf017f29169a71e06c6308ca513a4b5e14ea753c3bd9e5b9951d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f4070283069ae69a7ee313e939f26f
SHA1097826699f52af6094d7e6be0b757030c0fd5755
SHA256f16e11454100e13a8dfae6e3aa923ee12c49c630086f8b7eed05f64fb0826de8
SHA5121e623c84867b046833d6ecc6c2db5662b9e99b556c76af04fc7a1a6110064b01f984c4b6c36955c766b8497b585f6e4ec252d64bfad17c616fe1fb10faa4adcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55adc41b20326c0bf88711bc63bb46e6d
SHA1b953a34d2d0bbcb1f86d404013c153c93a99c441
SHA256f3986169e73f7b53f84fc0f7cc141f3cc954f67e6ba7f0f29d2be3cd8199b881
SHA512e6e0057b36cf9e9d1c25e5a5de9540f1df475a0e26d29469c4f830be390f850958bef190c4ed395ddb4b78392a8f381e78187e26d66e458728740442a694c4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68cfc61a55e203d3e3bb7225d5bc927
SHA1fd1adb5b2f69c5334307e7e10c8b162805aeae84
SHA25694d9e71164516b9378fb90f51469d6f28c5760a8203049c839dec54228a8dc04
SHA512f58e751b8fc64b525162614972777cd02c9c725ad98aef5ec663041b414e535400834f3e04eb5b4f72941dc0b126d89f4e0adb39504f5824f55f0d482b414ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1cc193c25f458313f590b8c1ef4e13
SHA169dea352f70cc2ce55c2871b5342bfe1d3403e92
SHA25633861ef567e7bf8a08c7c6cf10028a6e1fceda148b1652ea15ff1afd107f7d31
SHA5120c1c5494107612987a91ecf47532f9142d21aaa2bb7369ea2a6a2676d6120dbc1ce540f0e50c53e87e3a9b24b57d9baa46eaf70a1a178928a432718302f56580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0576259c516f337fcaaf39325dd360d
SHA1d482905341002e6c6efb6f55feed7883ddc1fedc
SHA2563346c9dbd5da2dde57f03a9c87febef80970cb5204aa0604974c5e48abb00c6b
SHA5125ed56014720ff0a86ef8090bdd462a00638ff36ff82f7d055ff6a81c38e6e8426ecc2a766e5276ac9c9b3cf3041fb49a5f04c2951af6073ecf938d288c118fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1eedb6c88660b0b4ee3369ec247d99f
SHA1f4ec688056b4eb9015c0c70b7390550e027ba746
SHA25672673a0ff80314f05c69db2750e3e05a3ded1195f0b1aa433f98a0658a01def5
SHA5128a3de542802b9cc3527438df24e0751e3d77758cbd1ee0f1274dc73171727c4d203a2ebc719a10805fa7d79fbefa4dd6b2749d9cb3943dfd33df04510fc7fd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136167f9853c972d545df6b0aae0a112
SHA11c2ee3913283f05b120107c0ef5ebbd3685c60e6
SHA2568c637ef49a86fd709a7e5d0c569e0f1b6bc7aac4cd1da9f658d6c8970992403f
SHA5122faaafb0a5199bc5464729216df9d3f3a5c07f27468903b139bd89e26b7eadd25f1a30dfdc08aab7ad717afd8f19e5f757aa5bfd67ecebb76861cdb84876bcfb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a