Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html
-
Size
65KB
-
MD5
7d03f9ee71a3cd47e5732b0da3e8fab7
-
SHA1
bcf08dc3789b4fe0006ac427fefcdb1a8426baa5
-
SHA256
67a862c9798e8d93bf85143a9777fc08cc6f26202e8f87995d6b99451863e1e3
-
SHA512
5182ead6df216c9eaffc692bcfb51d02b01088319c86d818f075dffe2b0e410aacefddd1087bf1bc6598080024db6290bc7eadc589ce287aded7c6be6c50834c
-
SSDEEP
1536:Ct97RycyPK++xd7NA4KkOSaemAEL0jqck0b:Ct97RycyPKHkSaemAjjqcko
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000fd214015d501ff9bd5e35647655a89a4200b839bb868b195de265a240cadc169000000000e8000000002000020000000d67b92e2d687394ffde62304cdea19634a5bca953f17616e0fc263356ba010de900000008f9fa8928ebdbae5949db53c7349ddc61df3da423b141a71d70d0cedeb196bfc4d9dfa4dc7c3a41b7e031d2d652b5ffacdc5c7a6b09a0b799ab3d9fc2ab2a1f2ccf3ae883c5fc2155b884e0233b9003e75bee6d5c2a2eb54402b62bc1e810b57c95e79e33102afe86a55b8115db378cf3e52d89860523971b97f7c656552ba1512b924891ca59123998337ce9c743eef40000000d188c705cc86a36fab7baa3bfaf33a90e445f6faf2ce3da73b5b0437eabb5fcc21abf9e208b40550d99a78172ddcabd3b12cbe8a28fc6a2b9bc574eef144645c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423062749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609a044dfeb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f1421c6069f22e5c88da049940aa61c81eab770e7ae36d6aa7cd779d337fdf17000000000e80000000020000200000003bc4a5ff60071c36bc41fa3067e7d5cf1dbbca039f6b7f18187b79ffec20aecf2000000098e028b374a94030898a1f3fbc5e3d2401e273760f51e5460b25a61937fb6cd64000000045beae14738b06afdc788a0ba246677113661d31004805597d9f4aa3d54dde2bb324fc9a52cdd5ef51c9c706923b48816dbdee09decd6a1397d335b7567b4975 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7397B181-1CF1-11EF-BD9C-4E559C6B32B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2096 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2096 2932 iexplore.exe 29 PID 2932 wrote to memory of 2096 2932 iexplore.exe 29 PID 2932 wrote to memory of 2096 2932 iexplore.exe 29 PID 2932 wrote to memory of 2096 2932 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c43b2dbe89a346e9ab1cd80a22941d89
SHA136a401e0ba68c21a54fb369a4eaea5af73b5018e
SHA256c7aa8be84a69f50ecb868078a6f1a92afb509ef47a1615205531fb2d0c28152e
SHA512fa23664c7fb69fac8f7622cbcd53c5280d01d11b0ef81b369b76377bfddf76264a4deac1e72d9f11110d3e44f0ca9871622dd9558a25dfa68f2d280459162eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55630a661dded71893572532f1ce3c325
SHA151798e22831fd137f64d880be8f618d7f5bf2aa3
SHA25661334a91caf071dfe683e4f47cc59023fa3e3aeaa74b51288e4f77718055649e
SHA512feb476c22e5b3f7df8401b311c1d0f9b080f86a5f42347026f17d31f6c1173ebdf3e16f9d90224f4f9f2d8fd439f85506fa392f8c58ae53af0f7293f59b782f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0103c5581567ed97683253c45dd17a8
SHA1cac953f3bb06bc4815fd26a5d727a0fbb2387245
SHA2562e836212abd8debe996bc4a0bd5fa643357b4a8add13183288905772c170b3ea
SHA51282f70ff2d65d4c8c86bca57e3f082bf83dea154c96f237cfa7ff530ab68fbc85fae643f4732a56a23f489259e48eb68ace0a2f076f4651c93c425697f753ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e1ef35e2cbc1b6c7ba4e2762180fb1
SHA194368e297937889d2db2d4889c9e228f7ee11de8
SHA256d1b0c2edcd42a804e1240311f4079cb1a0b76ae4d16e361d416f083a649d606e
SHA512c91b0f70e93680a5ea2f222e162ebb2cec8b99219c024ab844ad4339bb1ca14d925d855ab0c75a16693d671e840a87465d9795651a377c00bc63b7a08700b53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4aaad84239378483d0a32a20bd3308b
SHA176c0bae97ab9a9e82f3cd4a01cf58e772fb2de94
SHA256960c1e6da6487af3bc1cecbf274f60198a3b2f3a7102775fa524cc313b8e754f
SHA512ba67074302694b906dbffa045c99f979e2b9fc398759e3cb3b33478b156093859a64967783f3a16904aeb844d939672df5ea9fcc82e2c383c1031c320507ee8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f3082b1e362262260e21606b634f5c
SHA17a29ccdff610250ace09deadda597bca2e4bda72
SHA25647f7231970fb4e9810b6172cff190c1f2e506ff6915ac62bfa8114003df90cb8
SHA512b6721bafbc3d860cc3a87bc3b16fb908879eaf9f6e389b18ef9391e9457485af38f05108eef6c454eb1fa21062cc32698f7e41846e4ab99d1c2f688a7a9ef214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e134a6eb28120535480a9dd840850bdb
SHA1d75e4998925229730571fb64d0c08b575458c14c
SHA25661d246623ccc75a1985294607d7dbcd139946769c65c1b624ca216a8fb11baa4
SHA5127f22590b38458e6228ebaa72e3bcbe4c5fac6029294410e00c95097facbc895c3dac78d536188121eac47ae28bb959ad78e819169011901b30ca0b60546d82b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c645b5545661946ab6abe07189a251
SHA19dca7fdf72e4fbf6f2b596ac788eeafa70ba8861
SHA2567c7ed160c98d5c773e12f6f86cba45864c4ed2e9717ed3b20f2858f9ac25a4e1
SHA5126ffad1f7560dfdc5a6868145ea9d61dbf9c08bf3ceff83a04ef2f0ded474ad83dfa8a8b50b3a9f66dd192be1359d837e0bfa63052ce0ff04eef7df2b64b85b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511cf237c573f15ae4ebc67328f394e98
SHA1cd28ca324ea5c9a91e6bfd49313a17093069cf72
SHA256800a84f4cc1f758ac3bd3901f03d9d15d0cdf3905ff271383e6b30e99ffe4dcd
SHA512db28a4bc933f9101c017a34ab5631cea1f00ea6b52e15899f5070800b19ad794495652a3ba049cc33609f1073da4ca32dd4922495065b521601f9af4685018c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b7010c1e136489e20bdceca0d5018cf
SHA102838ddc8bc386d5bbc48540757895420b93402c
SHA25628579d75b15c12bc73f8c0aceccc031284e8432f003e8b3cb38b98e682d61cf4
SHA5127f1d42915e1e48c85f6a0c35cd1416d53974387c4e449ea8147f4048247ae3561766fec1abc0e6046713d522d9e52d9cb69938dd17ef3c5577a7ba2199b20ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5231966fedcc2d4d98d065bdbca6ce028
SHA19bada60adc56d617e4c2395dc81f7cfdb8ffc3ee
SHA256dece3bfa018e9ea4925c8260d45e32c0cbb5f9650ccb65fd20285182e5a3c46f
SHA512f97eb5855bd10bebf2aeb863db1c49232fcec0aea97624ee8714abfc179396e7e0454b5e2a85a32c056e7a578e117f83ed3924f45553863f8b5f11007b800bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5326ede217d08bd429a597213dde7d20d
SHA1d92ef8bedfb158cfeca66d2778a21d0c2e84cadc
SHA256230415091f23bda535eefdb18f9c5475e275cec0daf7b502c2e2b9a06fae9f7e
SHA5123ae5d57ffe74b77fb4e7d74c96344083ac087ddbe7065889db4280a7acced123b09219a1dbc9a2eee18a5f97013e154f0948cf53bbb42eac16f345860ff57da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b1745c811247aca35597c48d540fb6a
SHA1dc683ac3307fbcd63df30e69cd0b3459b9be869c
SHA256fc3828780afe7048bbedd6a9a76ae0db6179617f617ee5e225011697466b7e86
SHA512a1195bef37b5db2fad46bc3cdba9d015a143376d677a40f40cdd2b0d52fbb37330153f3850660ecbaaf2fced91581678226ff8d7938306a9247af0be17343ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae3f1ebecea78950be1e8dd5b9672e4
SHA1bcb002c0b4e11ca6bf0d89eef13b53f3e473a8fd
SHA2564176208110dd0891e68e263ee7fca5c6c5d354dcd24e3c81bf89fa6545a05310
SHA5129f00a5ae87682a1ceeef1d463c3b94dda873ba1481f768af7efdc040a38d48ef02daa270d74584d323a1066bfa12a2a9a453ba3d09c2793b471b242d173254a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504c94e7494e3dc324476b1929433ea56
SHA19cee2e3226e00fd72845d5b5f4930d02e50297bb
SHA25690bc1fd7fb8a1fd9a9c43bddc80ad8484d33a06513dce7b5c3602890958c8f33
SHA5121263f400c4a0c040b11fe2e16d1d84a018947871434526b408fa37d701964a066f144519fded8f4a65438fdf15bd7b2a36dce3ebd8e829e5f0919ba450e9c8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d7b1bd919842132acfba50fc9d35d1
SHA1dc89d4495ffa9488d1c4c516ffe77822bf5f5468
SHA2567f8083d63cb040eb2cf239a5d2147cecdd49180451f9fdeee5dbfb9a8b59ae3d
SHA512b42b4daa801a23da7958964b9db8267361e06544b51f8d91217a3e853e16a6cefdf237248d890824bbe0713bd561c4097ffa2ce31fdeb2b2378cdfbe13815e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c62921943754e267250af5b6dcec0c9
SHA1a5b0924ad7279c930e38581e060797b66209b4b7
SHA2566be22f547c4739eddece5d126d417a17cb5022948e64abbd4ee3ab451cc4ec33
SHA512eb749628ae6df76a103ff3f79d9f41612fb98064d90248e1b2a45e5860d6323bf1af65595cdf1d3cbc87727782588dc56d3f46ad405193723a8bb2dc7c533004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5a94eb195884dc6ae18e25dd905e9c9
SHA1ca27318d730a285ae0343d1645f487d0cb800ead
SHA2564cd8348142148627b1be31b51d2d72323b4f43be411c08263411aa7840b3f4d1
SHA5123e7ecf89e48a6f441fe704db54dc9da51de6d7bdac513b60394068a0ef7cd568debfe6915bf709d85cf1c1604cf1442be052f651c0fedefda9472cbee9749142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b21357f371f08a2a6f79b0d2c79e78
SHA149bd0b2fa1e706489f4b8b6311eb18835f6b0cc6
SHA256491cfce1221252043b7389b44a0cfe699d0f50e2b688c97ff6682ec8127e5a2b
SHA5129b6d28d2f695daedb4bef26a10b92ddf768aa46abda3a46bb21bbc48e6d1b63187a17f5758e93b14659973ac28ad1111a75904ea878a1c746bfea5434313d440
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\iframe_api[1].js
Filesize993B
MD58f2be0def3279bee50c0cfa805ed08bf
SHA1de8d807d18c2ccb370a4f7862f03a16f4820890e
SHA256658c3743e102acb9742575ae382021f1480d52325368c632f3ea7c7137b1ba01
SHA512ae9eaf9e400191fcdb4ecd04877a2bfc745f871f3849839e57d587a313777bfb54a573bbeec17ee3a08d640cd1bdd5043709c726f5bbd5797e5eeaa4c8a47493
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a