Analysis
-
max time kernel
118s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
01de235294eabc0732e511b5cd80c3af_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
01de235294eabc0732e511b5cd80c3af_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
01de235294eabc0732e511b5cd80c3af_JaffaCakes118.html
-
Size
11KB
-
MD5
01de235294eabc0732e511b5cd80c3af
-
SHA1
1530b620e78c93c61db21e80bcc949bc403811e1
-
SHA256
da4ae77a4b449dbf7e7a85b1b8368b842ea0510c57dfe8c8b73532853d508229
-
SHA512
2e0b4a5ccfc5e5cf5ce28035cc917b0b2d505dc1841427b6fe33af83126d33bbefc31d6f31a75cd766a9a0f0e505a26e3c8c81573c14a26220398716465a199c
-
SSDEEP
192:fa+2vqVAu3na66nSkXvD9nTlVgUjJmpV/VdVV9VOBVzVDVTVGLiVwj/Vjo7wW60b:igiGna6eVpjJmppDVTwBBJdg2ej/Vq6Y
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70500d532e98da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AD2DCB1-0421-11EF-80DF-F60046394256} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000040ad38095d229e1bfa355ef4b8e84b92c7f7169010b9907123bee95a80ec85bb000000000e8000000002000020000000189af1d5eb3c80db57d512de2e92dd94d6642033dafc78b4eb6c66debf9fbbc120000000faef8aace855d2815ce9832d30c4c5f9b514a055169492bdd31b4cfa1c3e09004000000043bd43c8e9675addffa8668c1085246c0a21f18c9664304078c0775564f5683a261138d08b5f6a43b87e461645ed7cb397da3dc1b0ef07105b5547804dc2c248 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420334598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000baf19a46051818843489bcb850bb8c5d35570809d12acfefca2bcf651319c3ca000000000e8000000002000020000000f1466957181e2118d5c6c533ad93f29d8c7e37ddd2a608201e3cf78827b8cb5f900000003e36942c7bee0308eba597f18d702a787b966ed2d4b3112a9cccde2bdbedea2967478d8ce37b4baea2fcdb7f564157cef6e8413acb746f71531c3a16aa1c5f6a900602fa104636cdb22900f29cacc03625b8a39b53b9c507a5888976bc89583fc1273e6bf2bf7b756350c90d2c48297d9fa57432ca70ed7d96f69396171595f3c748f54439edd2324475fa10f16ba3b440000000bac08eba7750d431c5ef1e48619580ff7bfae99847e70178330e0abe29bf4f946288e4a0fa8de4a6842e2d0e87decbc5a0b3fa42cd1acc7381565de9e692aefa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01de235294eabc0732e511b5cd80c3af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59804c21a97d26f7faa0f670dd61c9a7b
SHA1bd915e875aa53965a7d1f787d6833a1a74e561c3
SHA2564af9bc0a06a9ae6befa2ffe5fa45f23e76aaf21527e24c5195ff517f7d5ed5c6
SHA512b48c342acd16d98cd397cd307af87dac3cad3a721b3d59a18f56a98e9078cc1165b85412a7c63a7bbeb8c4d555098c1fd722d72decafb3f9219578c1cebb62d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962233237b4c0e27828c3078701e1834
SHA14164ce4359beef34f0573c9b8f56d36cad1e3e49
SHA256912bccbb67df6709d4ad9685776a34477cc5d67b84fdff13806e9a003842526e
SHA512785b24b46f37b5cfe67421b1e960940e566f16b6d018be1b209ed742aa4db08665e4c07c0c0f98c26bd8ad68160b870d55caada37b78325b99d292869e4dd282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ee86f9e1249e894f8c8180c8079463
SHA1adaede6d4719df6fa3cdfeae18626f8baf77a86a
SHA25667c658f3dbfe3c58e58d7af2fdc12f6a2d53658f9d3ce2b132ef27f7bfddd0a1
SHA512dc8d1704c30e39d2274e71d305b588a6afc80107a839f70d634fcfb856e6a9d59b80108411e8f8ba715b256ddb5f460b5b5730dbbc8bd7674ded017a125555e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58849cbdbc3cd56cdfd26c1eef634e1be
SHA12ba710e7498f640395131466b66acfbdaaebee5b
SHA256ed36ec5e3393de36a801a8b77556820b1ea9b0ceebf715ae8dcb4014cc976e1d
SHA5121bac53bcb310c387c4708d31454d7ea4f97d1a3ccc2b42bb5d18b09421a63616afaac2c3fb22c38cef75db2a0f9a6310498f4c09a6a38506aae97e5177a0d2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa15d99d309eb9a61be79e54e0d5f7ce
SHA1be829ba8aa097b411bfda6c50d610989535e3889
SHA256242e1e781b90f141dce8a228bc5505b54224fa52954effbcb9a92399a922029c
SHA5127130cec44eb934ce7ac18ee4ee6db36261f5132dc05f4353e7fd4fb72d43db3c4397be354b9bd3ef7d4801813512b1185806109b97682dd48ae95c2c6a630323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea9d2f80c6ac30bb2e66b4c6c001f2e8
SHA1c59436f908599105f5a6d20892de08a8098cbaae
SHA25620238ba2f257f02bca1d319374000cddc132e38723aa94da7b34b95ee5aed6f5
SHA5124fccc30696d422da369e9644b8c404672efce7504b94899da0d1cd1b25f7e0961c79b7c06af9eb5b946739d7eaadf142e865d2edee742f321bdbd753c9b0ca9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0977b4e249c768df1c51d2893de8f87
SHA144f7a9f31e4ac7d73e28e0890d990a9cad3a00f4
SHA25628dea8c65eb116f1692807c096300d3783e2e1d895638e637a49c5624eef3907
SHA512ed3936f1e710af0fc68998c6748d1b74361de93ce78f7d33fcedccd964c1901a6a222dd82770a73c61d1491a7a55af7f89c63f5f702532bff846d937e5187f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d5973189c986bdfde1e49c2110feab8
SHA14910850f86c30673e529a7f92317e4d7ccf05636
SHA256b233a7b2d0284cebee38f9bfa720863dac8d7d17d4c2f50eb0e0e5138aa5d88c
SHA512e3898eee93624c93a051a66736bc8d7f86252729ed1842e90b380aa9842082b9c9101206f1e964e796c62c317048e134e281099065a7457509ebab1725a2572f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df617f1f40be50f7dd1daae7ef800d15
SHA16154fcb3e152acb72e193a612904898dd958b24e
SHA256489b2b1a6642eea6c495c355e414d21b8f0182e0ab28c1b5380fc3799ad8fca1
SHA5121ac6ae6792e1a4e9feccba47227d8937f23c43288298c3e1ec86823566e2006cacde8ab2abccbd9ca91daee51a1f2c844846c45fb03fb9f59c8dc4cff45ee857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5630deebab9ca91ce6acc9a92f35e3f2a
SHA1b9aaa24dec571c6826f09427f86f0f0e360e0ee1
SHA256acf387ba52afb714c19550f665b6369a1db6e23aafb9e25e1a9b6b75ec838997
SHA512c4f36627430132b9817d40e621f2874a55662e5e9b65bcaaae6f291eace1f338d63d6bb71c675a490b368eef0735f28c757317b8ef91ca6dd802abbcdea14a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c458100ee77a31f2d8b810ea2cd1d7ae
SHA15de00015df647c790d516d8a57c9078ef324aa63
SHA25616061ffc32bd540ab5482f34553dcd3d918870a60f811fc9532f135050b0fb2c
SHA51252131078f17ae02ae5ba78ce4a28ef3a3c097b99182203944326bb6b6ae6c8076aa45e819f2fb08a00ebd9103b949ab0ac0ccecb072cf957f3ce9ed5bc7efdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9ea2ebdaa5c52f43ed8eeb677d98d8
SHA1b499a5150707200718b9f0d78273736745b8765b
SHA256f4c8f643eabba80799def7732f15aee8e86e7f314f9ec0442a370154576861d0
SHA5126ced5a30522968463f97333e88db935170705dee15886e17de0cba245b785c7de0df4a3abf0448ef19b131a63c879ffdcbd4d766eab78e4513181823dfc89e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e83da1227ee07dbac2146232cba6087
SHA144df0564e8da88f5bdc7ce0ba594bf8408e60550
SHA256c82b04cd69b7f9e72c4180dc4796f94e55037852d1af8ac92d18ddd1b6366bc3
SHA5120769b593d82c06029c68b7001f0b872e84964eba53c73902c31ac5136b0231ef7908fab53a6697a8642d9a2ac8df12d77be50080b66ee40c047b4b04f2a361d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f92c097fc8e7d2420a0d8232c41c8d8
SHA1efde3486be4d2723df9ae7a15809900676ac47db
SHA25639ff503bb7ff5a744f5e3caa3226ea2745091cf1d0552569241c3cf24cabdb91
SHA5123676dcc0aa2f439daecaaf9c8eaa80769597fe4a90c54095de0caab3d78409b12da6f001dbff280dc82830aaf5d62346b6bb9a225203267390ca6fa84308a667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c99de45d76ef5b3665f9300397dcfab
SHA1f5ef38a5600240bb3fb9b4d74316ba478a157796
SHA256cd265bb262c2a335a7015230307b6940fc10ff5a640d2a802888eab8621462d5
SHA512721ff593f86d763c281e75a427425494d4d04d974ec83bf8cb444381c930803098c8e6075d85d805313b1f4b6ba377e886d6e949e9824c5f172fb3bbf9d5052b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571fbc85c424e6ea4cc347a5fea6aa158
SHA1115a7017de725fed68cd3ad74e552e888e55b56b
SHA256db1543953a7c6cc896ed38385071c45fec57878b24dd1ddd26e5835176c7eb9c
SHA51211896678d6a50b85b0b014c699c4b28e1bdf19817e7e99cdd4ae61abbfb8e41f6caed4678ab3df13a63148f7f649b847ce586e53b4da77146288b422ed96c66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed4482db69d729bf690593b616a2305
SHA1da199b48742e57d09a770dac02683f24cf4e4173
SHA25619915478588f89ff863489b46372103cffbe4c8b569b4d6537c4f22f6db6399c
SHA512bfeae535482b3907ffe9b0a823c659a13ae5c059ec668f9cb368830d5697e49354bcbd2b430fd3ca832e2ac2b50291208fbf54bff2c54fc8bb9efc878badf392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0d8a17c3429288e44428092aa7e4a9
SHA10d3c819f7f3706db75b770785712d05cb319f8a7
SHA25668c17808131533bcf653280b8e0249626a89939fdd8b061d56f2e60e67103f64
SHA51289866a8b5e7f1277ccd48bc3f774afb22f77365f1a590a0ac21e6d951591d1477f3513f7da96408ae44262f6787982954ceeac32729d119fcbf6fd4a6107791e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c5a6be4e2cf6a9bfe8b7ec190d56ea
SHA10e7892009de69ea5a90699e2d6c139e3f221a9e8
SHA256b2019345404c6ba8e700043489c10500d0576b8e098be2b5fe13cd2f11c9acbf
SHA5126f244066d7549b7c3c3e286ec4f8f37d2a882705d4ea7868539266b2a5bb243ded441fb3be2cf1a98e59ea54aeae5ae03bf9d59ff2b628cb9556c567bffd89d4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a