Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
10e73af7d02f2b739f97638ca055f74d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
10e73af7d02f2b739f97638ca055f74d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10e73af7d02f2b739f97638ca055f74d_JaffaCakes118.html
-
Size
461KB
-
MD5
10e73af7d02f2b739f97638ca055f74d
-
SHA1
fd0d9b572e9326dc827e3e0e9cfa75ab75656749
-
SHA256
0381d8ddc3770c4e9c0a98ab9b10ef3dbede4df47604a51b6446796c873067f4
-
SHA512
65b5bb6adefaf8ca20cf01087b61762184984488b02573be1c62a988450299b58e19994ec21f35630707bc20aae2f5e05c2a834cbd3d9ef7eea8730038966902
-
SSDEEP
6144:SjosMYod+X3oI+YMAsMYod+X3oI+YRsMYod+X3oI+YLsMYod+X3oI+YQ:C25d+X3yu5d+X3D5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49963161-0967-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40842122749dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000079f86fff321bc92cce840ecc6a6e65e6f465599f28f2c1c60f2b72ac87adf714000000000e800000000200002000000099e6b4e49dd26502a44830a18e7f50d66fa566a690645f62b6f3df2da192899e20000000418159e160f227ec24ae1b56724fba8e23fedd07a4025d38bf9be458ba3d9e48400000002be22e5f0499a762d39e4a36335c8b2488b730c309baf111dee3560dd8860b1511d7dd1e5df63087d80993e2eb1f6157131a20fa4d85eae06d61069f9f9ad700 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002bb6ea1210ad26ec62c98cd9c7758a10459524de48c4ee593a51cf6d93ff9369000000000e8000000002000020000000530b207991a13b57f47e92d0265c31d70e12644659d3c82f5e158c6d36a3ef2490000000dabce88d17bbd8cab7f5f2519c74c1a7e53af180db6f4a477889a099a1202a2250d6b47bd536600c5bc6c3343e212a5e24711ea38b87a708009e1fc49e24d9f0f10342ccaa94985ceb78594043ecdc1f4131eaa41684a4c3815bde672f9405328d746a1b83f6d066c965ded24496014d1146977c1b39960eae6c43fdf2b869fb1e7f567b7369aa806a4ea0cb0f574d30400000000d587d2fa6002967f170f2290d4783b8d07c6eff515daba1726694523d450d49b063afed81814e90ccc729bfa755d4a5bd8987f130e22bd7b67205d82ea4b098 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420914336" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1536 iexplore.exe 1536 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1536 wrote to memory of 2528 1536 iexplore.exe 28 PID 1536 wrote to memory of 2528 1536 iexplore.exe 28 PID 1536 wrote to memory of 2528 1536 iexplore.exe 28 PID 1536 wrote to memory of 2528 1536 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10e73af7d02f2b739f97638ca055f74d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5261fe0eb4802603dd36806ff9ecb2795
SHA1d505ae12505fc020fd01785c27bb5ce101c5382d
SHA25626a740533bcca73b3efd29971d6a60c0b2b551aee2b1eda724f833a96b3cd156
SHA512271ff42a96bdde5986b3ec89fcc951736d54c32a4d4553658b23db198ca2446fded350ac6d81a2f069c6fb4c61ec232d07a35feadf40fb4cd2602ad39cba2c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b336edcb20191d895b2cb4799f9ad222
SHA1a2af9c0ff47933930a148ee1e96e99ba9c763cf7
SHA25635d4f8ab00470a05f4d6f2f5698734e71fa260928df5ebca854619b19c8edb74
SHA5120367f8369b2c7bd5dde913aa30ff6bc2d857778c34ab33398f44166e2f54a1790a2b2b1bafaeda0deff7303b827c0c7ca144421c136d7e58cc482b4cd213acfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56805dbba089811aed83bd6c0f2b6d19e
SHA1a22ef07e72a68b42ec5d1fcd36e0ebe63e14ba10
SHA2569c5ea59945ab48ba4f0275a4efc819f6249a2665bba5d7e362ac4ab73262322c
SHA512b6339bb7dfc45d87141a35858ac310508e6b626acc303d040a3a306dc4c4ef41771514cd206d1f980cefae64ee8b679b45591f5cb300680b9252f4130b3cd1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b4b57fa5ad44bfafd3daecc83070479
SHA19f7d63c5c2ce1e2b7a97c0576b785c6d683ca57d
SHA2560e4b302814f1af38913a27329af9cb02bf44b827948555d1a4d9cdf5adbfac2b
SHA51230f640417e3aaec4aeb1de510ecf73de0ae6abaae045585abd5a14c2d447f2ebd4e056093e4e91ae704d882495d960b513afec46334aa9240d1447fd47d0342f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547cb25a16a4ea0d6587783919b431ff3
SHA1d4ba7000895b240443a2996715253f738087990c
SHA256914be6c6913cefcab863876e13814acdbba11e4d5362b97768e5a56b8ce0f091
SHA512fc426d4a78fa80b5a5659eb36087c9b43728e2df7fdde8efa3202a7717497971f0cfd20d5efec14f90e9906070fd41b3380d2ba25fe865cfc93d96509d9f47ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a11902331584b356e9fa85d7bbfd88ff
SHA192778da2e272d804446bcd54c4d7ba8c9d4c2c9b
SHA256baba5b91c2cbf890cb11846ea4428ac86d0b6f86ca57926d7f1765baf94424a2
SHA51288703d7251d595afa63334b51546c5baa4b20031e483ab58eb376884256a0af996005ae5d2f9e16f970923ee96b841dba6cee2ecbee638c9dbea69c20e21d388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4cd23f0b8af76c5d63ba106edfddad0
SHA15afd9dfc65ab53e90d51c7479df26a3f45c3c980
SHA25699637bff97757335ee372111efb7f807fc6be0fd5e117ec5733d1fb90db537b5
SHA512e15906112cb5dd0dad3a7b169b85307ae885d8bf335e61e757d00cf349f86e7732b0ee42721dc98ac31764c7d8d067d912ffe5e7abfccceebbf763c9e139272d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf76ce8fdf5ce87b530b313648f1b864
SHA136ba4ee6a695bf2173a1f3fd5fe14cf3056a67df
SHA256417bc792ad92d523dcd026a74812fe67227ccc5d99984b7276612f08a1a84ad6
SHA51208ea13b6e5a25164dab448f2aedeb063afdadfef66727b82c68d3591a8f5e855beac21a2d1a45173ab63c75db1f1dcd9c9fd93685faad874298870235cd8f666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff6bd60540fcd272438c0f4645fde9c
SHA177b2c70e53c8294f4cf49f94f8df2a398f2002d5
SHA25677524837de4e8557796b7206df35aa70381976c1e99bfbedfc0ade99ec3ffe35
SHA512269734618ca3655a8eaf12fbc9724e0ebb817703754eef212ad0c1fa6af1e59f726fe7af3e7498acf1a449a658baab589c1d77990b75cbe0fafb424f61a3cb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581fab8a89943127dacee62e55cf12842
SHA1a41cbf6062e062d25bbadbc48a07db103b201a0f
SHA25605b54f670996673e923d29ab9d8f0a4f58b999491ca970c5db490285edc3970f
SHA51202a271068f00b84a960a8bf81fc97bb778675411167ab602bd98f7dfbb4a0816a22921ce044ba6d76ab4809101e6122b32e0c388faef566440dd956d8126b720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa5d5fc65a607065f70d37b9b61ebdf7
SHA14a34cbaee5c94f026f5954783db5deb4cc7c6b1c
SHA256a815940c65b4183957b82dc1618bf80936a37caf8dee47ab8da1f57f27bc55b2
SHA5128870a2d1a91df677c50a624673165ab6447f81cdbf769629f4a328bf31786129b8bb0aa881fe40514c37c083ccaeb627c49bb6e35a1fe50b60b66f13aa709656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e54b03c65e913d034bfacdc2fe9274
SHA1b79c03e290478dc5a198f2f77b6883ab38d0c081
SHA256c02295b0cc844bc89e4a5ad7a0a99a4974b187bc7601423e6c617dba3c920eb7
SHA512b3bd0009112841696ff7fbed89c55c237e7186abdc98ffd9acd74e687cb6febf7f560140583772fa79711bda5858b7a2bfd517436885e8c39acc76e97334f159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58287246dd2b204218bcd749a8bd05749
SHA17eaa199b1185723d77931efc5bb242898f78c7c8
SHA256cc522743bb61dc27cb0e07b7f09c4e48ba8fdbd3699ea02bba557a13af1b9f2b
SHA51201a6323be0ecb641dcd7a666bfc77e722fab3fcf45b6a1602e2b077cc24219a2b0596946b67bcddf2f727b7436621924c586101d5a4c230a2400b59a349dfc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b242cf515b3978f03c27563b6cf67ae
SHA1b5f77145eb481fff0a39da52d2962897659e0ac7
SHA2561e38739be79e68d27f58853ba4d18c73556e231d28ed05a26c8a63c2e0ea43db
SHA512f42ea7b4efea715da1e41fcc485f487c1704d6703fa48ca6fe65bf6962f7980fa0013f3e84797e8adbdb04a17bcd45bdd170dab4d0813829e6ed47f485af3482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5324dfe02e645c1e3cf9a6b9dd2ff096e
SHA1b2ff4875ac0722a89b8a2b3793f25180b915d986
SHA256e75fb3efa8d980e27aa7aaa383d563cf6ce4292089f86ef4377c8c21aa8d43e4
SHA512d5107fbedf8ec3ffe5b78a78f8a2acc7075ce7e60dace2bd0d13bf1457f2dc29ce9c9e0d227088af0979d9a289ab4b8e7950fdff824c95fa82863d383650e98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53573f50174f663df8c1f5f8002d7bf0c
SHA1b32e606142bf8c140d7086198634fa9552873114
SHA2567be1eae3422c36ee088ffdd149c66cf6f46c9db2abc17a6b16c6f1d0de180a36
SHA51269cbcbb48be2947529de6103a4ef3827a73411d7836d3c7f5f2c9b92b3e285bf3b72f55d7f3844e05131c515c10f4eb064d66afc7cdc8a44069ca00718bd536e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad46bc0f3f5dde7503837a6f81d79c77
SHA177423b46199acbeef9a09cf46d849257658e3494
SHA2568a0add5d437cc3edb8392347ced3d47d0d00ef52502190b6a4211d24a55c80c1
SHA5121ecb3176e02fb442cc05fe43343a6e9ffcbde0d4ad8fe165a95b5b5fe483cc3e83bd1fb2657646605846f5c43fc5dab40d1cf37a92f0b5ad902d797ba8db1639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532815d70f6e43afa4a5c3d6f9e36d8e4
SHA1448750241c48ba056111c5877639a650f38cd488
SHA25671c9024acb7fca3a96abc9f2c7404c462ac55cb3953a192adaabde355f313520
SHA512834ad70307643c8901424f670fc411f94cfd6670fd6e93b3348e563bfd0eee4caf58e0b6a961c31259fbb436b9b18687c0df8eedefb8a15d7184daf00be45e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a449c8d57d9ca111b2fc2dbd95eac60
SHA11c99efbc5654a38c39a8652aac748a04ac3620fe
SHA256843ab4f2783ca054baa5b9d948071d2246429b0c4c04f179f18a9015a6346ba9
SHA512b3c3caba96cb43db688452872e81901cee96527d1b45ea9cc2342a2a834847f27bc780c39dc8231123c246e5a316bda71e6bb475dc38953473735c7bb7c19c3d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a