Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
6d534d88349d533750c0c86931b71a5a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d534d88349d533750c0c86931b71a5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d534d88349d533750c0c86931b71a5a_JaffaCakes118.html
-
Size
23KB
-
MD5
6d534d88349d533750c0c86931b71a5a
-
SHA1
bd3fbbdecb706483a190a5484b955aa76dddd0b5
-
SHA256
dd8453a7f172fc159ed0067a3cf4cb0c1fd1abbf7387627eb463d255b19d4f98
-
SHA512
83f7203344ee4f89d8ef693bb09586ebb03e7b57880813d026c0fedc12189fc5c9a94d4b1c3b9a689f63e682c8a668ee2ada4e02a7b583577892c5c2fb85feee
-
SSDEEP
384:dReUz/TWs8Vx8BM1MbM3m/2oxwnWA6q5WIu9piVPWePJ3By3jPOPdlgPiPuPA:bpox8CjWAZWIu9piV+ePKGlOqmY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{976729C1-1985-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20602e6c92adda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422686570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000090768dcf2fb2a33cfa2d233b8c043038ee678a62f211aa39f8b9e650a9663e19000000000e80000000020000200000008deca6f1b3c5562d000ba90fcea6adbfea67a44bb0d72932e19d9fc5438c1b1c20000000e86492b3dc62593ea33c503600c824b2b049297bb17329a985377a534ea7ff8240000000f2ca92b2eb15ccf2c61394dad660027e75aa5767916d9f06d22810c6960a4f227d28fa61d1f716c198bf2ba94d3cedf14ff61a5c59b90f9a6ceb47b7b7133a31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1316 1444 iexplore.exe 28 PID 1444 wrote to memory of 1316 1444 iexplore.exe 28 PID 1444 wrote to memory of 1316 1444 iexplore.exe 28 PID 1444 wrote to memory of 1316 1444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d534d88349d533750c0c86931b71a5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ad908fd9f798b45829fd9e3cf17577
SHA1e982715af4c49f18d994da85c32514ae2bfe50b9
SHA2567ba0584b43a9dcc09732148b6151d3bea81d972d07b407bd7709b2f9d3e42d19
SHA51261224b6351df585bade47a24089880f4491dbed62580738d192306fcbd6acabb7eb12ecce58aca314fb7f5cb8a4abc5bdf80e516c969855555aaccb68eeead19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364de6a5593eafb83c9e720e16c4f5cc
SHA10b6b486cb331f7f57665b7053c83513ae82286de
SHA25662ac4b00c876b2ba5376465202980f5c635bf32606ee3181a055c09aa660f324
SHA5123bb318706f9e4ba52cb51bf6b92a815c1bfa5fc78d1056c22b0d1413438ae0ff02f224af1df103efc80b2e81876a1d0bb4a916c8eb1b8142b9e62702831e0aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580129848f66c7770a806f7541c20d389
SHA1c173149646c2359763a3e024dad32aceeae5d43e
SHA256ac5bd02933ad15be94dbb55023b4dde5286ce43d536f5a0c80c859192076c383
SHA512e6fad27984f80d1fe39e1bc8d8fa2ea14b32216dd531b5f4839c3a70adfef29bd19fb96a46ebb0f2c87bf12916144fca438814b3c18891d72696e07b95518a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f934a60b9533363f13a62cc6b8bfae2
SHA15e5ed980fee307f832aebfeb658735ec88af0f0f
SHA25659fa19cabdb532fa40af65fc1f65427519b39c34aaef1e35f76e8c6afb146216
SHA51279454b0103746f6c568ebf84a25c49d856465816dfe88cb8d6b1fa81a6091033771ce2e74369e83f552606d1706d2167353e10589d69570ebeabccae2b6072ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a419139c777b07c3615db6e0412fd6b4
SHA1bf34ce7a89a76fe16ba14c70b2cdc225c2eb4af9
SHA256491a93375a7440914a340c577d4f87d303223b14ef7c10bb11466aa49acce0c9
SHA512ac2df61cd823b86c4e9dd5fb2b640709f08f8bb2de8c78125621762b548bb2175970e6f137f2064c06b29e48ad65af04d70fe53e407a517520b837ac2441b9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cff1809dba38ef107960862b1098702
SHA108d7fd7e7c58bdf2ec689d01085bed2798826c1f
SHA25663bdc05466d3eff6a71b944cce7287875d289dbf6074bc8a73e66fb099037c50
SHA512359a11d3168e34eacda741c53f04cc05ec1218e6a99d9960959031f6ea2e114cf884c9787cb3d223e5a0b1979c77027012bfc59392c5592bff3c274f5c5f2001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5af92def0ad28abe9d81846bbc14d66
SHA150302761153303ba70f2e3f1908ca3f5a15e3666
SHA2566a8b3130cd9ffe2101c0a535a00e2217bb1cdc862da9ac9fbc9ed2fe5af63fa3
SHA5128ac304428a6c1b8b07f6da0d2d2055b6b9b1e684a04e56ef8af3fd3d2aee7baded46074ff29a167d316bf59c0cc008b54703e77f881647833436352e15cc1a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef3fc5b570b7654628c7e2a04935b5e0
SHA1625cc0518ef6a9e8ac4dc3d7c58732334375dbc8
SHA2564e3eb81e02aeda74323089a3ba5ccebc01e32cb7bed46ffabf40b568b57d3f5a
SHA5124e8bd2ea24efa7e2abe1d47da9f236a72e8ab51c90a573c3446391fc881fe0310104a3a4701ded11f685f42e7ecfdc8152c9794cb7b6b78c5d09c95cdd4c4ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eba38a092b73b4a2185148682eac492
SHA11d44893f1c72dcd97e9e2613f9139c9b6af79f7e
SHA2564210fcd9477502bff7c11157ccfae93d8c4e65165592da0487d8d4d27ee7a7b9
SHA512cf0ec2f683ba2802c32c9215b8469836097b75fa7c2b2fac4fc645904fe29fa75dbfa743f5868ad4d82a07d37ada921fcadbc61fd5a053346c3523da7697d4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b3f23bcf8773c031ece0bc41374be5c
SHA129fc3654427ea74de7430ce4f2aed93df4d7cabf
SHA256d9572126acb5b673768fce64670cbb903f4eca1b3301746bc08981ea5e4955d6
SHA512a3fe3f99bff7a3f818faf42a4ecac497b25db2a2b8e3e9702ec6692f5c8c73b3b9a22c0704b0ad4da31337028084aea69b22a1f8c8270ab8a53b7106370eea66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d9feca9f7af70ebb48384219aefe52
SHA14cfdd4e72ae8a38377e47fc7e956c39e4f7b0d88
SHA2567980d2cc9184d7ee153904bf4e340e7b5eca4ff89862fceb978a51c2c4eb08a2
SHA51209cc873ff81d2781eb140ab2c96d1d31141844475eedbc26eaaa47b9d43688d202e06f0dfb06fa7f213a0b0f5aaeabddaa69cff88e31f457eeaea0667dc70240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e80885392809a436d153e940f46bf02
SHA10b70b92142717cf4e36247c1957fba3b83da808e
SHA25653f9045310f3e413b4b03b2f88ed1fb04fe92cac6ff2739b188ac3857ab78b99
SHA5122aeef786fc9a8ad0d2f13d7099929930722959ca83deeb1db0bc633a7079fc15c5251d892244e55ad51d9b84c8b4ad71c546a87638c0faaf3bd3975779c7c1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50edec603eb08cebca56cd12cc4c9ca45
SHA1637cc02d99dab486c0fa63a62a3f92576bec0c43
SHA25687fffc51d51c60062e7bdcc7c581b8704b42599884212ed838168c0ab0dab947
SHA512dc54b1087e55e4258c8824bc1aabf2216b6c8155d2a8a4e6df2ac99421343355aca3b3aca419ab2d73f62ec81b5c72afe57c754259d50b76bc4c09022fda6797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac24259d7d6e5bb3f93edc9390cf7f5
SHA11d5daf1d152ac304ac88a5988bcf4b15620c8456
SHA2564588df72267e1afaa245290e1857dbf23ff02df0c535b27e861a9e7e04fbe1a2
SHA5121fcf7e1e0a5325e6d08fe05d0e636dc307a44a5b685756bcb72a2a731c8db1d223d6765e06e8039bad672b68d45d99912bfcaffa72761aab40a30ec9172835a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f22cefabb04888a2fc20b301b1cae78e
SHA18cb84c86aaaa45b5696e9032b5276913a8b73f75
SHA256ab87f38abd2910ba4f0c9e01dd9218c619947868d6f2d4b1011b396f1edd72ef
SHA5126eab6d68e71075f678468bf09903a60303f754d538979ac34cb1431737b674f2466639b5bac1baecf8e37ccc082a7473d191e45b6187f6a90b298c06a8b51058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e4b4f710f8201d500f41f439af0a98
SHA112c715c4e11ab2251b24376541b54312f9c760d7
SHA256a48e78edae67dcbde0e9b2b57a6d57c46960da2bb90455a8b9d1d0762e33e82b
SHA512bb748fb9a9c2acd7242783bcbe0093cd21707ab32b57465b586c028174633e083f5dc5daf00ec524009ebe0bd2ff0f1479ff88dd55a06f312e0b9003175de1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93265012f2b1bb7e441af3eb6947385
SHA19a6572025161608b352491e4654cd43deebffc6e
SHA2563b2eb1e3335f1557a0a115483b4d57ceec3724270cf1c97d8d1457d80ce73bfa
SHA51215ea6af4d373fba8268590425e75bea23e4fb7dcab6d6777f752cc9b58edcd14445a77385806f771a8fc92dfc66b2536a11e10c938d1c0811296130d11e460c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594eb9cdc884f71dba80a0f857714a89
SHA142e8dce509289485198622412642f71f03a6ce05
SHA2562d1560728ba07d8f052cad5514b0147dad7ec758e6f10e1189c9c62944aba092
SHA512b0e46f08871dcac401b20c7067aba9f2f785dbba5cf47fba60653b5f98c79819a2365ffe0b79740afe157dcd5f1db29552f31550082a8180a665a1eb850b2484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58698a643842b59c17b08d815f1634ec8
SHA1c3840753736234d24dbb319dfb78b335cd8e9ef8
SHA2562d190d539d4b7d44da1fbf3dd584fb0f9d73bc70284a585b934d71d739a9e3a4
SHA51251e33f997908fe7286618fd305df917f3208917e0723711cc15cc665b6e42147050adddac3ea6ca8593f1a57fa83d043d9fe445a8e7ac190af531a4ba70839f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e64e6000a957943a005ed5dbc9e83bf
SHA181aed6005fb23d71e819a45da968b3c33a059d9a
SHA256442a83c5f77bc62476fa246aa297529a31cd7632611ab60fd0e66a115a15b079
SHA512e4965456fb146ea5034d96247fa4abec28050cf3e5d47e0f48d49cfabd5ec24e8cdab1573ace4d72cddaefc23ad3c2bddade336be18744363b13f8e30238606b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae38ccd9fc0b858b4f8e3f6f8efd475
SHA1362e87907fa5186f241ce994b740599c86654914
SHA25684288a0f858bacdb9eab7554f30c4d0142916d5ebff6fd1ffd252ba6b3a96394
SHA512b8694817143a7c344a828b62f0797ca76dee733acfbe1baffd997b496a5137f15da025213f0a48f4bbf863d692af43b14f5075f4d4978488b8429bee71439057
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a