Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
03c74e3af8c1b61dae58e2ff005bf979_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03c74e3af8c1b61dae58e2ff005bf979_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03c74e3af8c1b61dae58e2ff005bf979_JaffaCakes118.html
-
Size
27KB
-
MD5
03c74e3af8c1b61dae58e2ff005bf979
-
SHA1
2f4d4d3f94270f93e8d3d29b37f97c9fbb62e19f
-
SHA256
a08e0627a89816d703cb7d338cd07a949476aefb2bce30b5a3c71ef2d45ba97b
-
SHA512
aaa3e0301b48464cb9494c4a7a25aab31f8e6aff874699de982419a5dd074c5712e69f87f83f8705f296da4993c2e9014a4547d1c955cec10b581f8145689099
-
SSDEEP
192:uwfIb5nAtGnQjxn5Q/znQieSNnHnQOkEnt5pnQTbn5nQ9eKzk5m6ANSIQl7MByqh:7hQ/JpzkzuSbS0E
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38BE0871-04E6-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000140ffea6064cc2e174e4caca356107ad6f6dd112ee77a833b46177350dbe79fd000000000e8000000002000020000000af80e9f251327f410ff3b0e3d3ed6008799e8a3787dc2b34234b907c24e7251320000000d90ddaf9cf9936e4ef17808021381257de4026318c0b48ff62f551d4daec61864000000026b39e58d58497b9e2f70564063886b2a1f052f8a4ebfc05be48151fe2366247c6497b08ce97ed590af34069561918350852b288a712e66670c8cb3b66fa0383 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420419098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f46c0df398da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2480 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2100 iexplore.exe 2100 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03c74e3af8c1b61dae58e2ff005bf979_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c5b5f365695206b3dc72074fc07e10
SHA12045febe28e1bdb4a0388b87a5821ef2d73b0ecc
SHA256f3ea2769da05a406aaa28ef7cbcb81c95f96d54a16c808b3660b807581ad1626
SHA51222f8c433c65ab6c159e293c5923a3a505ddbdc57cd17909393dfbbfe91cbc82b2aee6c1ab9652b3b7fe236e18360358962e341b687ae57b90938f136c532df35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c1ce73f5e96bf476426eeb74471ee0
SHA13dc1c212d81e9cdc714a58f4d4ecbbd11377d363
SHA256c299e8d2e76fc8d70f7569c1d588009b267055df3c31787bbba6398ecfc96c36
SHA5125f2886d819091e65e1b42e16e359e21b3f268b8878e5592524dda55c3d9903b3e7fbdcf2a5fb705569c8daea21f2250c661d53a0ce9358992aedddb05f4556fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d530542002b5024716899b41c02aa2
SHA12cf5bfb81465b68bb1bc41d418b3c7410ba57f4c
SHA256fdc8dfd487ba72888f02f555ecb24b85df72d1f66faf5026b468e348c76dcb95
SHA5122408f312ff1e7ef5d2e3b0ea66ba703adc91a7683fac7a3f93886de0596c525ce9b0b692de8f7d542297d7350e65d9df6c30a5577f83149f3b0bbb665303a476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d66db9bb73f7ecb98aacc0842bdcbc46
SHA1bc971b85258408019e1c97e959ae4001cdbee582
SHA2563e0498f867f556f78dcefd11414576771e12201f40af8b84d24bda835cb5ded2
SHA5128177299e68864d5e784632fc4fe33bef59c7db4ac93963dd0f4d6fe0e8837329f30f893a1d082d5d4049b4faa43d7ebdbc7f1f71fbbef441c2e25a243bc28928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eef8facc348b585891e754a7f77622b
SHA15ebadbe468a04d3e9db59fb159ba4eb020cf3c93
SHA256fa6c5d094fdb0066addbaf76691960ab8e21ed46152b6555198a69515a3500bf
SHA512a76e0aad92aa2fda83c3d5d34b519ce82eb9eafc7e4eb60701fb2bc22baf56a1e7099ea87d8b1f2ef40ad0a14f182b7cbcc3a2616d39b2fa4cb9c4b7a73080c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd6a0a5f11a08692dcf81fadea752dc6
SHA1a5ddaed9fcb700873b8afa107f3625879f8eb7ae
SHA25654c5d274024b7a5c82e06d7163a15bed4bc4741fdcda962bb9921c15d9d0c42a
SHA512bc26d74c2c2aa6bd1bdacf86fafb189f5fb0475753aed70c4139cd5dccdd28661b15a96fc190c12097fdbcf287d0aadf80fbd1def2578ae919bae87fa7e2ce50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec957c031f8dea30dc69144bbf1ea3f
SHA15371d893deea5fd67d9747859d9be5402e728dd0
SHA256818a0555d22441365a1977c2d3e1557819d3ef1489bf03cf42b4a1e0751323c6
SHA512263120bea1d7a8ef24872f9f1f441742ded5f52d1aaf0bc8ce75b3eb6f9058f371c611498db07db409b7f1452817f9ae92e171f7256527c93371e9840eefb248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b4df16b10adb35b3ad65f1b51af6b8
SHA100349eaad52085f25365dc55b66fcdc69449d8df
SHA2560e3fb8c06ca5e618007e2d43d103d0a2455231e6a653977d983deaf8a0ef7f24
SHA51209184b6ab8d5a6d9ff2f2382dfd9a7c1f7b297fedaafa9bebf17df85436c4b086d8c278bdc8fc44304d84cd73b831245e454ca82d10e349241ff7232b7688098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ecfe2a1426794566b7f24f7cc3a1f6
SHA120ebd091d3a656259b8707db721a1a8f226ee414
SHA256acdefa25dc35783c0a6f0cccb49819de67dd463605737e42aef22d4dee0dc870
SHA5124c7f497133a9952b539784f2de1e7bd93787963b8619f725c50cf113e005a332b25f1f8305b5cebb4d2d5306c43312119b1cb47f5ec5fdde66e6e58e0b681f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ec20390c97c94b8e3d88e7349d1dda
SHA1d5b8b2817fa6542502478fb37910ee957c109deb
SHA256f9842207e5f1d384ddb1ac6d4b500d7597bc764db9a321b0bcfc096abf41c038
SHA5128969fcec7104432f574cdab1ea4d4d3808bdaa40c4b70cb7a60ce43290ebc3211b9aaa636e0eaee34d45356f54e3673c0008044782c1cb65b7bd01d2a40a8d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c66d7dd48a2f04c9ed1d5669840cef2b
SHA144e44d5dace27a875c1dfed781e46e77cd72b74b
SHA256a10d2228ba17beb5f1a8c3b34904cb8715939ec7f8e271a563a68d00c3d4057a
SHA5120d3b314c63d3f201841048fa7335a497f2428ead51f81ade687f59b9a8e74031143e5bd6ff1b139ef18a7106e708eb59be9764cc7add0a25a117d51870f2b88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314f2e073780c9a1a09f2e27327dc427
SHA157f04cc02185db952a0de9a373e20a4facbe171b
SHA256a5a6851460739d79d584b5ac8006cb8a16727f31fd0d259b323f1b26075d496f
SHA5127805f313273074e4a4fe18121ff6e9ee5a25bbb1cce15eb5262b3cffed0b0de44c3ff5ca8ebd64ab003a1675ffde4e66284dab3cbcf844b5c7f1373a8f75055a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f07f4f8e9f99bd42e5f72f392a0a3b
SHA1dbf76b25c20285ef3a00846f0c948739d2f26835
SHA2566a2add1e5e0d3e49abcd8f1d0d5c1fc85dfe35edbadeb888ac187d62af36fc45
SHA5129aef5630a161c530bbf396a5cfb2381bbf89f2e84847680217eeac379fce4c83745150c9c67097b170d5181367b37f0dd6dcc4fe072591890081decf372523f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d9aeaddaa137c920eaa76b1e606dc3
SHA1905ef46f894fc85ab1edabf9d6ddee2f7a3c612e
SHA2565cc86a3604c33f7bce64d51f8b0db9735a743ec0e994f2a4a2978254a44b1235
SHA51210892fd3e3bd12c80c93488f32c2aa2f59001556b22f1a652b6673900fd2d642370e2d529eb048013d7d7ea6a02088702e8a0c1e2145afa800b23e02ed4eb153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54748a8f50576ccd05c587293286b4f25
SHA19bd5ecf544daebd2bc277268f6b49a9d6ca16e19
SHA25646348639e5fc0206257956e921c31ad5536406f2c6434edd3ed627aab17ceb76
SHA51233ae96d1ec1ca606582253b7ecd1203e7edbc8d5d6efca30d95e119e2cbd80fd28294c29b0131d890ff05863d72c99e915003323a0e70ad27d67d64760021b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b16e7be2887780a86ab19ae211cf86
SHA19cb8c09b5320eceded5437af55c11a7ac89089fa
SHA256ee7d49c2c3f6781812632396fc5cd463da429d8c74a516701bd2c8a5a17ed02b
SHA512e2a954da8ad646dcafb78a36ed9272c7f76e2936ec6e8dd510dca81350ff79796e148ff34297c730c5af885401c998eec25a90a264086fb400bf1135e93113f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528c1ed5c3084ad7276231394e6d630c6
SHA1f036bb5fe912552a6d07c43ca42801931e782b2a
SHA2567f2f3ad755083cab4f41e2773a6b9e21e20a1af099553c2de203d7855e58286c
SHA512e74ed5ce2e7b1305fef28cf64fdad0c4dd921961e3ec03d57dbb0df95fab159fb1676fe7233fb1afd1842d50f238207e74e1e1e7761a148cb2e5727c8bb2b8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513cba0fcc1874d3c993996dc777884ba
SHA179996b166b84c3a53d79b4504fdae16144d06714
SHA256368ed416b1904a247acb5e3b3c0415963fd84281dac21790155f1c891298ba46
SHA512e8e0081c50c5f40d0ee0e8d252d7c7c486511a76ac13985f73f22eca9d4a5153196435472f7a32ce9f61685a7a2d8d0bb5b0c08ee3a439b12e1b3382801e55a2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a