Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
4c33f12deaa7ed1ed0bab0ee4280b016_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c33f12deaa7ed1ed0bab0ee4280b016_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c33f12deaa7ed1ed0bab0ee4280b016_JaffaCakes118.html
-
Size
30KB
-
MD5
4c33f12deaa7ed1ed0bab0ee4280b016
-
SHA1
327b01baa5733c36a19598e3ba2218139a6c8409
-
SHA256
73ba6beeb98771afefe3234bcafb59f38090fbe1915eb854854fbe63bc7c29ec
-
SHA512
1e16304bae3904e5b6adf5b515d2f39a6a6741dbb6594faeff24e7136d5ff9c89792a9584833dcbf7521ec15b15a0cefa761ff45d2b7b9339a2e45ff5d8c1d38
-
SSDEEP
384:SbHAoGzygTeyUtTmF3i2hV+5cZmGUvMt/FHn76xKZyRtcfx3yn:SbizyIeyUUO5EUI6x4yn
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 sites.google.com 8 sites.google.com 11 sites.google.com -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a058da7ab5a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000432cb0910d1fe4a23eebe9896d26bfb6f624fff49cb1edb5d17583b17a21c334000000000e800000000200002000000005e6c13f8e76e0468219a4081f6b4cbbe50da4f87f18e34c3957a49965aee09520000000f11a6c73c6998df68002541cf69c269ea73c7ba6c0557e8e34d687850a19cec84000000018c948e67ede92b01db6681137801b9549f2049574f761499ba5cef29f1eadba98935a6dd59ca3f29330d77c7b965168f12b49e74741481df3427cb02724c453 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3B275F1-13A8-11EF-8189-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422041916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2780 1680 iexplore.exe 28 PID 1680 wrote to memory of 2780 1680 iexplore.exe 28 PID 1680 wrote to memory of 2780 1680 iexplore.exe 28 PID 1680 wrote to memory of 2780 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c33f12deaa7ed1ed0bab0ee4280b016_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb81b586a0357e03a8b57c2249aec7f5
SHA1012e513a1879a9459eddb4549998fbd17244f030
SHA2562cb1001ce079a1d050e16358a9f2c763a5869e8f82731d12c0b90703859acac7
SHA51264a50c86806b0e9645cae2eccc4693928b951ed0e60654f7e5b4cb23e7c554a1a952aa75a380e7ff4255542d16f7a0f400aa88644878ae1dbf69cf68aac79734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57f36c6c1d360ef8e26e08e5298667b
SHA14f69491ad85c740a126eb863221ef06ee344a5af
SHA256a5797ef4e122c0437500eb6d30f523ad671847a722260c09b950092dba674e18
SHA512f81401a120594bbb3b46301279d9d41a20c028fb4541965501176e963050831ebbe336cbe79392889a63ea50bc470a4c7f21d6eebeacf96c4a0417bae95b7d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707583c76e36a8318af3684e3cdccf1f
SHA13abe6fca2fb129a5480aaf215cf9e49c291aa052
SHA256f6729d234cc4fda6bb83815bf7d8aed9feaa9868a7e3d7cb9e355304994542c1
SHA5129868a13d26be4829896010c8016b12d7f248c676a0191fb030d84ead24007610737be798406bc0f6791840f5d80f9c04dba4819703a808c8b8b620c93348edf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59416bd89b0a109d96c4c40b2fa9457e0
SHA1bccac9c249b0d707225a34aa62fe067a7588cd32
SHA256525623c772975a47eb85d1c4c2299786c4c5bcdc2d4a6ca067bb06661b174701
SHA51289cf456c41b7a0e0fd5e27a37f58ad124452096e3407df74cebc6274be422594207df46188cb05fcfc0cc384931b943a1b2321f92108dbcda744989544c24a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d95a64ba33951c5cfc6ee3b995c7404
SHA14022912649d7272d969b5ff2db518eeec6fc4f3a
SHA25634b7cbc04acb91cc3d410b3e778f9154b96ac50f73ff91825c34d0c85da0a902
SHA5123e051e98be4ca634857cb9927793bb7656ba3e53a8a2eac465ab385191b65359901c3a34f2bf3f8c215f8a2435ea52431e83d29d5f025cc279b2e4d4359c8b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f0515620b95d743b57ffb4b8fa165ad
SHA14fd3f1a03c35fd5056c7c451a185a1bf6d028071
SHA256499edf5dbdb9605cebe6685c531d50c27dcdd00e604c6c3437f59fd773ed50a8
SHA512bc2aad47e8ef742945120a6fde6befb692b67b8d5dc1f452668c29fe88a20cf77bd41e1aa3df685e2ea41c8d29bb33234fddb90172c553eeec5d555ac8f3476c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9128afac1007ede7f0cc1f8f17c6454
SHA1af0a3345be5b7f7bc59e3721cae2d87ded73d5d7
SHA256b9aaa4e27a126e24c2d35989c6f5d53f7af70159dcdb2874ae360f3ee72510a6
SHA5125ac41b416e50278279cfd8c9046adf41dfff5116578bb66a6101eed475339b5beb5b1332869fb47e22467602de53bc720c3651a792b7de4ebc6dc0d9e5222b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b084b57a1efbeb04fc2c5e8e32d5d158
SHA1a4a990dcac3c609d9ab1962e95a2366a01d3d186
SHA256596855db777e502212ba5d086c3e07d0062edaa157da1a72c3ef633a66711e28
SHA51271086782744994f18384a7334df70b94bbc5cb2f8dd9f4252c155328202ecbcf2b1cd1766ad2ca782765e424d190779c783f6b63eea7e567150e293885961431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b082cbd324d1e4180ab92ebda16649f
SHA194696d93870df6d0c5b863014bd726af494a4c33
SHA25615ad941e8c34b269fcfe05d37ff4405003627711f7861f975e7210465d07302f
SHA512374f2067339da639e2212a0e7d33066723a19246490c80fbff3fa0894fbb85ff10a026d2b55ca5bef497ec0503e871756a36b76acad971a28e39aa4c0783d085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56abfe4de9496e9b230f227a0cbd4ca70
SHA17f3d5022cb371b391f331563533159fcc72620a7
SHA2564d9dc16fc277cbd3cf67962839a1f883ca5500dc728a0192d9a94dd71c818dae
SHA512e2f8a6565001899e1a48525a7c4ee39fea8bd06185d492eb34edff63f861677f3a39078f49d0e644837c0730428ef8d5e1ec0f2965b0ea20a0d7b48b0a8d81f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f39085738219df009afb6f73b76e2c38
SHA19e52f33f59f198f2682b2daa0e7d3ae6a1953f8b
SHA256630d17b85c3512becf003473d52d69fea85b79f6245daabbee4a26719c599d69
SHA512e0746e8f9a26b8cd1f754dec8409f5fe4b10755760ac8d60484d345740b2b7b3692fc0ebc91005a10d931de6d36390328a95d5eee354a2d970068b432006f77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d230763e4e1a503fb8b4ec64b0b8f86
SHA1c7b323681ac914bdb4dd48ae60a043fde2409100
SHA256c347f2d998dd4c1decc77fb12c72947816c2d7a60ffe29b7abe098b3818e941e
SHA51221936607cf6c59ae521deaeaf5883bcf41184a2b6de0b00027beda0b1fb0f9924555cd05cdbb6510077f727aa4d6adcc79be9cd6b6d234696989ea67da0c94c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7fbc0218154e3ad3b21f89fc4967f60
SHA1696ea0cf74431057902a8fcaefd6d1612936c03c
SHA256ccb2f12ceaee296d1880d13608d2a9da0dfb889e4cfea1a153ade26d3e79c597
SHA512b8b15ebf801e1b737be5d55a2beb4551805aacc6088c574235233321027a67a03b1b32b6b5a21fa54d67ba336c049f10f6a86b52a50f213611d80921617d12b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52565c2dd75ee92ad2dab4469841e4c65
SHA185e24c2a265b420e1ce7ce2c954d2cd46716df5b
SHA25603b77026088e7acab2c6747c40a433aed83169f42b784b2345927affa796b741
SHA512f2f79894507d188813cbd98fb95066b31e02dd4531d6fb0d51ea9f3d2a33401401973f959bd9bedb81143f93be4a4fe40b951f170ca1a4dcb2e45d45ec15c34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b26da3050814ab3dbd1f9080fa1d6edd
SHA1b4c23e2e5e357cd2ac5a61470ef23f752e77742a
SHA256f9fe01cef483b7bb0d555c261203008eda4b68ad2b749aebedb406a04c084106
SHA5126237e198bb78e0c1dacaadefda05fa3836c3e6bcd8f85bc85ae0826fa5f97dc5bca518fb88503d748fbb9937f17002545a4e9cad854266e749fdef9200e70f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534707660f1f5a464e11720b4b0626dee
SHA13935c7ac7be3dc8701222a8118523de6fa27f810
SHA25663fee8e8e7f6a7055faed5e38c8d10f297bc967f097779f2196849c36d05f5a8
SHA51226de090974bc16f8942b03da807a3731d27213473688c6dcdac9235d7d10757fa99e95e755cfedc0d7110bd41b238294a90b04eca885f9e17aca207f740b8379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a99c9b1d36d66b112e258a37203f9f9b
SHA1df9ae31a717bc56e48a02f7552b2e5c2b487dfec
SHA256afbad3183ea981af3d6eb0358ab1e52bc30dde1eb8eae3357ae528ce3e1e0442
SHA512e9c9efd5634c799eddff368f6c7627dbd24b015d0ab52433869a4e5059e5d3a54918c34f118a85dcf67c09a91537c54fbf98fd2db5ddcff160e9758df5fc2fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a898fd0578f61b4b620bb8a3e064329
SHA1637a68041ba62c3d494d46056037df8a3968314e
SHA25607b3fd5d5e00c829ada2f4e1939edebe2368b31e24a2cde79d9cd328758bc05f
SHA51233bf59cba6ef274314f6d2deee77095b37c8aaecca67b13c8f37fb8952c66011863f3edaeb38d6350635a05115a3da40086fe252b9a320618cb1f5a7aa26d669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc9eda8254618d36c3e09f83efc8964
SHA162202665c5f6d3e696badc3eeb28a95f3b04837c
SHA2560639fa4d37d4db918abc059c38c1f58816d9ac1d3dd0f8d705542aee581dd442
SHA512c5c18e9e461e702debf53f0a71b2ca10fbe4ac34a9eb598d5e2117b316d12c319e34980b7fab6a700bba75e53b351d3e6dbc83698777156231d58b749502d9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883396e90b2718b261da7c0a8d4c00c1
SHA18b606ba6083ab07ebdb91aa4c3e74bc4948019ac
SHA256125d7423d2ea7e5156c86d60fd0534dd20afb43d4ed29f9be2569baccf7f51d5
SHA512e58fa099ddb3c4c5ea131817f433eb319002835ca38add2369137974a5bf45b4f5293245f753b3c4469b2aabfba876026ac1927d94f5325c10afa64ef31af4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cef0e8b5101e4404342c7bbe07da6a0
SHA1f193e7cb126a15fb51c6fc889fe9641e1a611db7
SHA2560aeda79d02ed3cdeb558ead6e3a407d14450b1abe6492560459e907a61dd624b
SHA512fab534b74ea8bbdbb59d9ed2f9be7d5ba46892cf7a13834cd947c88cf0d7ae9bbd357e5d54a9c5015ac7beebfd16be8c876b0b93e88248733c9a52cb614d6f28
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a