Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
0ac44696e1ce9bb0fd5dbb1294088d07_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0ac44696e1ce9bb0fd5dbb1294088d07_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ac44696e1ce9bb0fd5dbb1294088d07_JaffaCakes118.html
-
Size
26KB
-
MD5
0ac44696e1ce9bb0fd5dbb1294088d07
-
SHA1
b244cce749a758dbfe5caf02f821521d24e0f6a2
-
SHA256
e14cfd7de6a8c8aa57d82c55c353a028dc70f4934df7e1e0c64d1d88b8e6a81a
-
SHA512
151ac843308b9083371b09b73dbe54a19943f9049781ee0fb6ed2f4688119080c1a10d7163069d4b22d8c179a4c03315f15e6bdaf4e3bf64fbb7f99d1fbcbbcf
-
SSDEEP
384:lYj2mo5wNwyGkTyfLOnOLWPkaZQ/uGv1N/Y3Fh/r85qaS4DcSR6D5DsBDFZbh1Ug:CoIRagto5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F1C7B81-0755-11EF-B411-768C8F534424} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000001edc63c8bfee33f0f2e27becd1b2fee34744d02cc3b34a3813d52f0c12593858000000000e80000000020000200000009e954fbe998ff70d367761e69e52dea0fbf74f185107c1e516e5b33c6dc4f10b200000003ca3654959d31d5520457d1a14375ceb9abb0c6d50973f70191699a07ba8c006400000001a075d5cd144c90baaccb8529c33916402a15e0c7a09a62ff9ec4c06fa98353868fea879f863eb559f88ff11a6e250b6a9dd347a6d95494dc5e18cdcaca159de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07d3224629bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420686712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000001d4fa5f0ace7c4c1dd2e732c14e080f27a896bc5ac95fcfa1eb7af36c1c21ad1000000000e8000000002000020000000b637d6a84afaef9c2cf20d77f088fccffee3cefa534a9fb0b232cb1b22af1d22900000000685cf7b12a6091bae18d3e9c20d99f36ae1201e298dcd174b7889c23d24a8060c6502a755c9ea61fdaece306509c3edb148eefe02957e11d877e684df97db46321543282b483b417c0906a46042ddc8a8cf105a70a823913957380acd1e0e0c267f4fe3e82d17c289160a7647adfac02a6689c610afd5cb8947f7cf1f87d1d04d130db7ca9827612e74b0fed551221040000000b608f86cdcf2cbdb6d5aaef7486a56fac1b59bbb2fd7ca500634823088092a1806f3b032f911f95ec653947f78a85c80065e9e9edeb511ed3e415dbcfe663a8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2992 3000 iexplore.exe 28 PID 3000 wrote to memory of 2992 3000 iexplore.exe 28 PID 3000 wrote to memory of 2992 3000 iexplore.exe 28 PID 3000 wrote to memory of 2992 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ac44696e1ce9bb0fd5dbb1294088d07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cafc24ebedee07c9301968d2f12fda9
SHA178756e69d4afb1df397794d0e576559eb00fb0ed
SHA25690b0d4032395ddabbfbb8a154f0b10b37244137627b9690ea82af308d6e80640
SHA51218c0d9c8e0eb3275eff93a010e0069f127afcc85edce5eeeecb6919c4ac4e37879b004887948936f5e54260eb33c99083ef8ca556f462750515f2c7023d95da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c5082c0efaf5e31c5c3c54eaa717af
SHA133c63e3aae19bf8332836d7abff553de13332e3f
SHA25661f40340c2657aaffbc0cc41acedc32226d30e611b419b17f62b9904b68b4b4d
SHA51290b86f3ab938f03204081e7b5c64e63740b95af06a27d9858e25c23473973d86fcb1987dc354ef292ae7c0051e22cb91fb73fac6c1640cada43c53cb44aacfb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d90143755d8d855238c6a181fe4c7ee2
SHA1f84a5030428761794dc2200963e289c018e723f0
SHA2569bc6393b8ee1579075a56cba43ffdadccef7b09c38c8e0aeb79f265a6674c077
SHA5124bce6db8c52a10e4a4588b79961864188ed8bcac432e387fa5892417a735acbaf193633593f7574922ef17cc91d39863e8c6723d88a3b97e8c279880e062ea31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59461f0736a5836ba3706ca0d5591e202
SHA1d1152005bc1482e5e2098d835c91bbcac4e0a770
SHA2566d06ac83bfac9b582925a6beb0882a644160cf8201d0a9b3ea42a06b793af1af
SHA51289d18e483173d747823dab665b6dd6cedfd8c4e2de9b7bfa98f0210f21e549a5c76459b346ee015b6dd67d20ea2fea61dc02a0c1ddf0379abc52bfa06eb00f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae0daa7674f1846f1cc3a3d95b0ff40d
SHA1edf23c78e2599f46259ec9a14f4e7fc10241a155
SHA2564474f249fc47a3d8fbb7ea244155dab6dcafa3c77e1fa4e8f361a1fbd609b2db
SHA512a245b97eb36828c3cf1685e4ebac1cab0afac42fd4c008823f6a65f6dba7bca59b2345c5062b0a75db50a6aa9587637938780fe8d1967d045fcaaf42481f905d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd84667511bb73358dfada5562dbb106
SHA1bc4aec66590f2c42580875ab759077959a26582e
SHA25608be08d379237ae2447bba8527e4782d40bcc259c41a071a8f5b49221343c396
SHA512c705fe53ae9b71b76d3d02770057f29bcdd02a4bef2332f9f8eda0891e37cd2af7128976dda3b74058f41a7102579f76adf18b1f07de883dac5eb19ef84807a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f14462fabc9f8efd7536d48039135de1
SHA13f07d770eea511f49fd836723d5768206a2a6a93
SHA2564a3512467d4db528741e8c677f4b8eb055ab2d7c6e61bfb02d8cd05492aada4d
SHA512d51e9ccb6cc739de37eed540c379b250fcff03ffd7a0d9547c0175a49af1bc60a525c2d7d803856a7041e9d0d4dc30ba2ee6f7a27571966c8c28340c93a335e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa97a91e80c4feec77eb7fdbcb06aacf
SHA1955ba638dcba7f2794a850d10a74c5bbd8e2e853
SHA256f3b0549fda2a52663273bb3d9eee491347faa160399c646b99430ed3c7ab9c7c
SHA51280d95a5522c7b401f9e934d0b9160fe2f85739caeaa5c058dc1ad60d71df538d4c060e9993f8569ea98bc5e53f731817e9983ded26f0a359124cb6f2932e3104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5898cec23298f993c45fe4aa4f1542e13
SHA1269d36b0a6c5b9e2da5411f02268903fb480332f
SHA2565bc91b92434b4a7872cd2416180958168dee7955263a9f42414d5d665c27549a
SHA51230ba365972f714bbf36eeba8210d6d7608c84b345e3b0c5c87cc6d40c0516729f7dea105886190a6157d41fd03698de50f56650f4234176ac9b9dfa9cb2270a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaedc012277779db4fdd5edc69bc46e4
SHA18c52838b4ff0f9a21186e9ffbef32b2f1bd8ba6f
SHA25651b3276c38d18603a33a811b177f640955f45275580692657cc1adcdd83607c9
SHA5125425498bd459f6a3cb30671ee45bf20d6afbc5ead01123a3cce24e8ea21bda463ab1ffb49049dfa95312452e817be10b7d35129662c3b04fb28a875dc054895c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528e200f782ae7cf39721f8556e13aa71
SHA146add83b33d2ba737166fcd938e4035ac36945d9
SHA2566afdfaad11e0d295fc89832710b430648caa46ca1b8b67f3af8f9303ec33d60a
SHA51230672d1df78a7148566b7316280f4961bd45de36fc7d20e5a45760e408207d0b27d025fcedb264a91d68699f056f6e66e5ad373e06675bd9dff8086f22c28a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffe3050fb88ca9e0090417a6f7f21fc
SHA121d5653d00ea163c06e67cf4323caf6311151508
SHA25660029ca2d1756e0a2943e9e968d9b3c83be10165a232e36f34a19b798133a83f
SHA5129f6e318e12f932160a2679d987559852c1fcb4aa5f3b5c1aa9075c0814fd22b687ff70ca13d2f03a470036146533701e1d6f8baea36a9ebeada67ff81e68bc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a2bd3bb0a863ff22a104708df75fa3
SHA122c072207723f134de1f23d4ff04dd22372aa6cd
SHA2564b20808eec726c509d2dd687a1310efe479b9d0d6ccb431df6ec9f52a796a439
SHA51229bb83ec795e034cb985565478490c2e2649ae3e900d8427eb168fafb39daa40b7465a518f6c3f7d1e6b6057a29b60e79d29b85742ed2039f9452460ab939886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0f7551d13960407bb76aecfd00a89a
SHA16725ac5b56762f463f3ab3056a2e8410fdcaf470
SHA256aec651320c9e57e08a00b014644bbac86c972fa43d51fdab421dc4609f207dc1
SHA5128ec09b34d9703d7daf0431d10d4e8b6eadda63ed6d934f1cc7e930f4b383c3fbd6cd61917d6ffdc49949559f44c72d0ea6c90ba66fce21759f4f7adb0a9200bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb53f11516d0c5098c5ff567a40a8db1
SHA1e4723b4339d1c2d828f8bacacd83c61e0dc1e7ba
SHA256e6ca09ff98cfeeee5c81afe1f30b165d84521f2e666a6ff2cd0c766e82c9bd60
SHA512b7b075c7323e3df7d0c73c64d3d9d9f34a0a92092e9d055ddf86bb859639fffb1419fb51ba7015bca4c42431087962eedc80948ec541a7b60e2278ed0eb91d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58420e502d6034b6ec72a2ff38160d95e
SHA14c068a0dffb2fc81d2a12af7f4bb24e75babe797
SHA256e6b3f42654838629ca70c7663acb8c800de67e33e8e57af0ca95dd26c84d3dc9
SHA512ce3faa50ca24101792dbbcfc2f6c8708702882e19cdda682838f42f885d3f52f058c70ccfbd653cac9a39ed06f6bc3f0a504fee64f41b0897b8b50f242a6f203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fb5443cd5795999051603c569d91bb1
SHA1e7aada5db2f33c45932bdf086dcf584068eafff8
SHA25682ffb8073500078107c3dfc6e219064fd48bf622f1569976a6e9de8807c60ca2
SHA51285183363609503c5b0fee9207f0be37adc159611782540feb17c585e643637afa77c2ff09927c4346f725f3890d1c073dfd911a090537b0537591e2d45643549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc70eb47272fcca7e377bce067d6fbd2
SHA1f2b937e9cd55201475c837b3887fd90d627e9a85
SHA256207e24c5e86059586ac66695785be75cb09fb19783ed8155414f107327601fd2
SHA512a25769f2297054c90fa657066cc7e8c39fb32b169340257f537067087af5ab20b9a2a584e01f60e8c0f51a69d82d2076faa7e77276f119cb7efd7d74edd29343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f611401e19da7c904406d7a2839755a6
SHA1e901ca189344871ac796fdfe6de2efa57b9813ef
SHA256413638e0aa50ef0a279e1bd4816898f8267468ec05cbee0fd8cc0a3595a88aa6
SHA5126ef0ffe7d2db896fc3dbe3d30640d9b72b54622f4dc1d59a45dc6d433404a745c84cc7ac62c4a435c9749794717b4d9b004447fca8cf131cbe07286b585214ea
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a