Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
1633f092c768b1802dbc3ba04975fffe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1633f092c768b1802dbc3ba04975fffe_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1633f092c768b1802dbc3ba04975fffe_JaffaCakes118.html
-
Size
4KB
-
MD5
1633f092c768b1802dbc3ba04975fffe
-
SHA1
f1f3c16a1a10974bbe34df37ebc92c8c33136b39
-
SHA256
47041f797afaecb668cb474d68c80d934cf18b051726324e790122821692ed70
-
SHA512
9962976f211f7eb336d709d4cc0380e45138a68b87823fc854a5db8d63efc48f77db9998c96472a54169c6bdc529ee7fda2e39113177f0cd9512a2351277b8ec
-
SSDEEP
96:ziEZdCmV4MSEPBDvV0n47ej/hgOKiljTR1QnyneEhvRZER20:zigddV4GD8/h/KiZ7Qn/EdfER20
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000004186ebc093f716d764c12ddf4e283df410ca0bbbcf2d6664ea566873fb085fb000000000e8000000002000020000000b45d43f5028b24cfcc9bbebc8c57026ccd3d3f0b079e6071d55d26915cf9d54590000000def7f4c8e8930b992460b9fdb2a2be31fe919619cdfffd61e420e9933dd22cb3f4d1aaaeb92f40dc30de11fc3df5b8b0456173092a051e4e089b7c29cddf6a2cb1fc0be84ed00c7442da05a603d26fd25befa38065c8cdc853dc566746b99351a8b9bda27f53c7d81d4b49308ba5957a9e79883be5285d0151bd3b123c55f2bf52c5446936fc4999d1b65e583f81d7e440000000cd6c2954261992e5e4ef8445fb27de7a32c67f50ec325a6596e6c1ac0a112f4c4a0b1dccf948f5c1b297d3af49716a4619fe27696b9c78ff8232f02af7e919eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02d7809ae9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000039949a1528f440955e6ab766121dfb190928ef939367061a25541056f6d60ad2000000000e80000000020000200000004c4cd252166c77ac21731b57f3c5368d8eb32e779e1418e32e8e27a421316c4f20000000c16da147b8e528388360ec3d1ace868d0b876ebfff354534b4b5e9ebe0aadbd44000000059aceba50f54aad17f292d9c223813d490a92a83ade981a5c81cd8f14d680c07006f557060b9decc7106690e02e8aca6ea8cc6d498e39db3576e47ec010af1ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34C8C501-0AA1-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421049164" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 636 1460 iexplore.exe 28 PID 1460 wrote to memory of 636 1460 iexplore.exe 28 PID 1460 wrote to memory of 636 1460 iexplore.exe 28 PID 1460 wrote to memory of 636 1460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1633f092c768b1802dbc3ba04975fffe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e87d33e9e37bb44d7711411366ab16
SHA19e2ef262941c04b1ac469a3de7d73d2556789396
SHA2566789b577e6f9027940144ad9e6da456e6a1dc0f1dc79e9f59d334730bac280cf
SHA5123c250b16669feb0957d6fee41bbf4973eb9daaae813cae8cce4e89402c78be359d32a53f8558bfb1166683789a52c406684b3eb33f76d3be0015fe4ac710f829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589150b3c563a97ee16e994029f821181
SHA1fa3e45157e936023bd79466312878a97f5c4a016
SHA256bebd936f20627ab40403cb28f0a6041a17c78a6a8e5b35c6e4b2d4b1cacc2a8b
SHA5129d433c2691b7aa48c5686bdc467a87dfd7d414158c0a22a8f8a34d0752838acb7097ea00696a5ba623ba45463cf9c8c89ca794ba2720ae892e2286023f4d5e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c7ff2ce1d3b422f060803ae56f1982d
SHA1634ab4afa76eaca6079a11e42ef916f8c50baef7
SHA2560308383d41d8a16aca3ed17428d7efd8a00b6bdf1404423b479ba689e9ac9428
SHA512725a7e7f5846b692e2460c5ed3ed17321061f2eb5032831a71043fd3e8d63b46922cd900acc16e518eae545556126b8b91838e8fe4172b4653421b121e0207ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6cd27704fe8201ba243bca9e9bd7489
SHA14c3b75f26a57227f7845e653998ed0515eb64a1e
SHA256ec01cf23285792b5b3ca399185bc8f4b5d156c9cf979512ba17c89b9bfe11b25
SHA51298a451f7065de4a860df8f42b8a405ec67ebb568bd13dc6fd97472e317c0b63fd37a5805ff29e92c6056a40fe5602b8e8361bb902fabd31dc63a72c07b77f09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b41878c965ff2082c48e07e67503fee2
SHA1e10a104746d7b81bc7fad44254f99abbe205876a
SHA2562a8c0055727dfc356feb9e5e6c2f51823553ed0b0ed1124ae45c603ed3f6a8ea
SHA5120d14c8e965233088137f9c5c71e65ad167296bdb266f43e50d7225f31ca964c1d90a64d97b978e25732d937f5ed9eb88b30915680e54458f67d4803a9ec864a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6e8c86ea3d924d2b338da01bb8418b
SHA1c21a912f69c37580fc43fc3afa1e39820e252ebf
SHA2562fb82aba7c137e9a18c22605ff555a632eca718d9cc16ba6b49b23ba1af1c52f
SHA512495ca2b3a53eae08dff58d93ce37557062291901841db535d8b224c33269bba9c1b283a570be856b1ab82a948284e2e588c53b987f9d15f7b730bb71111072bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57000332b841799d6675472f73a1552c9
SHA1f59c25f2582b3b2e31ea30b843208935d9df68d4
SHA2560327613103d1a9cf66d6dba2f9c42c52b2a109f0d18fd980953592ef2d162698
SHA512cd9bf1253e82489ba43f03e4238560bd11e744ffea83f1c241e02aae669800e012961ebde7cf248457c8894801c894d08c32b7408b4569c040badcf596dc3834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5919feda1de66c17435d238a65c891754
SHA1e69c8ccbed4990f889ad5f87c4c91ecdba13eaa8
SHA256b30b03560a8127def7a0bd1123557f80fdb01df1ea6f5ea34bfa090aadd48b92
SHA512a2bf231ca4add3eea69fabdeb61d763152e3375307902b4a58dc7f62aa06890f0d7ad086d6385007ecd81f6316ff522cb86cd601859728040d5011bfae23f06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57433e233dc70ec41065610cfe5eb6b60
SHA19b3a4032ef6cf85fcad72c9e52c524df19525c2e
SHA256acd0cc6b8c8733a65455f4efb26499ad1aeccad1431b8e6dd47cb19a85efd266
SHA5126cfc2a5910af3753bbc5bd3eb96a7908f2b4fcb4133c54bccba312756e5b5c0b9911989b12a19763477f959ed698f1a1b145dd3c9e634f48baf675bc330d35e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e163c3e0700c5848905d953a76cedcc5
SHA1ce1836f1f547aeaa588c0b18ba98f3e37112c6ac
SHA2567eb5ca8aea76086a946b5171348d6983ac7018ec09a2a9c79deb5a5c1d38957b
SHA512d995e6ec58236d3554f1d614e2cb6e41a062a45d5aa27757f9b06c180300f8b83ac33f120c2262eb066d4eb5c10b891b1d8fb20389f52bdfb80828ab7acaa7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5889d0cc750133eff09ad8b6a862c0bbe
SHA1ff2a8aa60b2b656d67cce89c72da4db97a21e751
SHA256a0b2f26af5812628f180a0f30d140a20639d81454934f1c3133420d31eef28df
SHA512e73a39dadfba62c31a65b065d4759549d6d6e09e649d2bd64883839a7f1d14d58470681c285e04b801a82cd54875ade622074eb3ccb82987e8029abe12123dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a0985332ece33c85f271cd19fbbdac
SHA1bcb0ced2f61e6d8b892f063b96b31f561d8012c0
SHA25696242c0d51d9d75e68f0a0413887a50d36219f0c778e2d7f7fa49ce51195f540
SHA512824eb0a68be0d9400c636a94d9a2a10aa98d79087259f0557dab4686c298205458d73eea8320bf790bac1f870ad7b880d5f4baec0eed5059ac3b08df946b85d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd090077639500f984c2217caa532863
SHA12187099a417693cd69e71e22edcd684ad9688671
SHA256a5c9e1763948fc76d8b8eec9abae354f41800ef19ae79b00e013b5e497f046c2
SHA512aab5cba1d1a5f759808ccd04282b716e828fa26ba6cd36d8ad2c6dd4aa64f979c12443928bd2e7d379cdb04ca68ceaf9cc7fb4ac2596683ca38ef3a10d1e0127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576dda6606e5d743cae3db3bd63bf3ee4
SHA193cfa262985523138ce9ccafb30789ac4a7b15fe
SHA25679ab67ce6f874f304a4f61b5b67f1e3548c9644dccf4d25276d1a7ecb60fc134
SHA5124e1447a11f506a15770da5da8900567c7734593b919e8867b58d8a77d2ac7a2167f2822f96362ef2ccbe624aa26b9a94e00050385937c81a86f02d0c807c85e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522145400cdfe1ea3cdc22d902e004fe4
SHA101cdf51f1b4f44e518e8088dc107ddeb94082b52
SHA256266f8b57f3f1aec4b5d657b27d33c26d5eed119ac1e4e2cdb2dfca3cc99e9021
SHA512896f248632839dd75be3429ce3d8d58a19bc7fdc8d439c18a2be6c4c60880800290d44795212c710853bd1fe21c8a894456aa78b20b41b21ee76a613617b4593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f0454792d146e3a7ab3af722e4056d
SHA199990e79174a63fc119b157b9cfb31ef09ade64a
SHA256e07378a297ed26903a911625fd74d93dba4d80d78492410e2025b926c671b1b7
SHA512cee79305685239591002889af0a97143f27d1b741ad2bf09ffb797a410b4d5db004d116e06a5a2481091365937fd3426f60f3ae0ce665bc33f67a98ecbd57fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a772c5e8eac272dcc5ad2b815031e8
SHA1550f493ba288f6be7167a98a6bd1138f31d1eb90
SHA256f6c55431a668531d5799032f7bce6326bc6fd141831592334379e8c13ce4165f
SHA512a2e877bbae55ebcf5bbc716b2a7d98f10cc2bd2705b20f844b9016a5c2fc4b5de322b6e9763e9989df01ea06a694c362a4831ac368034aebadfd687c5b77b977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a747fc870fcef4bdf3302b8a4b3a2ae
SHA12f1b814a8da231f57a1812f03fd5141f1753a236
SHA256c39edf66a76387907a605484586c69b0591e32a313ffa1ac7bdf812fd01107ec
SHA5128eacb30d4044c61f6ccc66439d2fb8ca8f5a5be63ed693181607b91f12c33a16d7107cbbdc46e5acd636fdaa8c539c7a06de9dd156f9d83fbad54c4a6301bf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f17738bdc481ae203f0bf8e15623c5
SHA126c1b0e2fdd3f3f904336258369f69b8c5630ca5
SHA25672b4e40b8e3a5702483010ff84ce5d300bb5bc6245e0e37115c9bb6ee1ffa217
SHA5123ed67b111669cb8361242e067bc344f5f0ffbe09e983a61784b001d29a65959b348a0b7aa13398b50d2147d58c97bf2f884edf60ba8220701d03fc3d3365c31c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a