Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
2751e09dda8f26f14a466e68d0264923_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2751e09dda8f26f14a466e68d0264923_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2751e09dda8f26f14a466e68d0264923_JaffaCakes118.html
-
Size
461KB
-
MD5
2751e09dda8f26f14a466e68d0264923
-
SHA1
5d2035d79371b7639b58d0f34805dbfe61b8c052
-
SHA256
aebc0338b6a89426b4b1c98968675cc03eb58f71ee2a38a948fd3234e8d19847
-
SHA512
426f819ac6500f54bb6ff5b35a21d36605e6e8a6c78bb2b5d84320c5e1175d0c899857d7e40d787c7d87d74cd13d52202e261b9702ae06fbd13de9633760be29
-
SSDEEP
6144:SwsMYod+X3oI+YdisMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3Q5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD3CD011-0D96-11EF-B671-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000932c32c02be52b4dcf0535f38aadf70be9210efa1089a8420c7d3046004ffa1e000000000e80000000020000200000009bc23be111203fe3d3fb3ca921103e85b1d8848deb319a8967f1d226b67015f120000000e40405960413096bd832853e90a861a45ac11b5d76e031e01a85c4134ca89d4b40000000d1bc78de42776929fe7c7dabba120a354d2c41c5102ddf9b94075bc4fe37edffc1fff2abebfd015ff0d220ba2a581f6799e8079b0c8ba4607435c728f1290085 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421374496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3088e685a3a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000001ed3b41809a6fb31382f3d255e3fcb81482b0bb809d74f954bea82b29e23a864000000000e8000000002000020000000505b68728e4033e3f60224c47fdd9d6448c24a41d62ab60a369193c165e609da900000001638ccdb37d8f081b272083875b11d9d0c9690c03e4ed87732d24e53034a1334be39c7fdac6452062c202779e873fbe85eac782241028b7b946c83d45f78529b2be163b9848de9719eb19d61faed2affa3f7e18fc1867a8d380a138cd5e560b6bdb10b431979144a8eb2917778b1ad4427e916e6afa37fcb3f3deb1acb03eee6f529603920494aa743a472b2d7ccf39340000000f6d3faf6631629d81def9a13e2fee00aeda181fc337e6b998dcc5123d6afcc285ddbeef8298e9950b9a30c3b27596431efbf23646cfe9e529918427c8a69f564 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2884 2460 iexplore.exe 28 PID 2460 wrote to memory of 2884 2460 iexplore.exe 28 PID 2460 wrote to memory of 2884 2460 iexplore.exe 28 PID 2460 wrote to memory of 2884 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2751e09dda8f26f14a466e68d0264923_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f135799fdda9a5d5e1367e2d5974c349
SHA19ed8bccdb6b79f258af1585e77f425fe560f7552
SHA2564fe7259819ffa3688073b5aba1fdf1f3297b189445eff1e687f4a7e2a891ba6f
SHA51259c67c9c2355c0a9846400802d745de1c0c4f5848be3595248e34be245d41b95ecd0619b2470d6cb1080fbeab669869d268bac25afeceeac607136ac405757b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580f38407e8cc8a7749481dabf20c4fc4
SHA1371f0d876d8728be7a8bc3b2c133e7aba3f24f6b
SHA2560139573ff29475ba3263eb57906f3bc80943ac7e34781716b70449e0d21960d2
SHA5122668c63a5213766bb908ba98459e0d5b69e14ef11d339635ae8e9572413f41b3cd55f8a3ce8d572c2a598feb5299fea4e45151100318d13da7de0781937bcfe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536fbcd24894c373c2407b8b083da4036
SHA1bb39c3c63ec45377b66f1b18641e057d4435d3ff
SHA256373c7197440299a94ba0377efc9d43d74830f11d0297cb7219db4da97db231d8
SHA51279df229c892ef31ae0ed48ad25e196b3e4ab557c4d22cf60e8707dd68d88b3a196531a755a1b88842ef59d0027c612b062d75f7aeb31f6c562da1a6585e443c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ecf4470551ee700c00181ee71067409
SHA1178c1eee7030cafa919f9588a01ede9b4f51bf19
SHA2568895096ff9d025b9e64aefa0b9433868bca59661ecfb7c673c1a043d8251b63a
SHA5128ae20264ec7d7275a6dd9ebab5ca5df1ad89c347d8f53ce0a65bcb60aebef715a4c2b5d701ac38f9d487ef6dd628e14357e9059d23849398dfc9342027a4bef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ac55120638119290ca8fd8ab8e3477
SHA1071034b1552d08bede4c5b8269fdae03af424ac7
SHA2561a1dc9486bab9bf892094a73ac79fa6a159105aa7c951fd0d26bfcbe783652c4
SHA51259d8704a214b5fb91aa424a92ecf92d75bdc3bd045e49625d8e2a9b36b130f0711263108e84a5a33a120c399d5309494d76dd651d8c3bb0cd838c431f2cabf45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ac3fa0e3a7aeeb71a4e916a62979c9
SHA1ceb04102ca206c6176575a97a8a1fad3fe8f6116
SHA256623b7e642fa7d3ef63f023281ee19d2867bf7b0124ffb074a37ad38ad9d3b6a0
SHA512351d5b1d2212240178a26acbab490d63b81bfde2aa03252c0a3909570f19df9d06e41f9b99320fd99abb6aba5627054a7d9b83f5f3854e935649a6676a0e583d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59faa1d45ea55995fec2159d3c0edadb4
SHA12cf6f1d19f60956f387055ca2a30168c3b04b60a
SHA256dd0084ea5a32248ba1d1264c60147ac928e08a8f94df2e179e425fa6a5cbc8dd
SHA51269b5ac2625420baee12d31e98dc4417cf2b682555de126fd24f311e7bc4964e37ee3cf91c1d0ceff09028b13f58a6b42dfac8092f5412ff6502c4bc6271c23cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596137d2b6ae21d897a576b2dab1438f0
SHA13412a173ab42f44d5cd4d961d85ae41e01b25011
SHA256a99fbdbbb2877bf15de607ef4247217f937e1d2b5e5fddff4cf32bafa7867fa5
SHA512ecf85bd34290d27d112fdcc4a8f8841e1686b58f5db417d7885f72a016f892c839f27b1b4a367d7ccab938a02c5d3717f39797f76b394c2958a9e8e1557526c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa8393d8ed54a3a2b3aa42f34dfe27af
SHA1dd415174087044ad9925c7374e20957bf704c623
SHA256d338f28e9145c6d96d35c66fab33563d409c7cc41c3dad66b80ae4a18b52329e
SHA512ee5de7fb77825c50e1af251ff179f8aa43a6d56dbac5c69c827ecf8e10c80cdcb596d94c211251252070ea5073e7014571963b56b642d00157b47f6bc7f2f54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e7e1651bbdae8c1c28ed567d63fc5f
SHA18f5bd9cadd144b7ec310366be5302c238e11ef7b
SHA2563f0beb60bdb9174e4de8e968d802924f7bdc1827cbb9cc0e8a9ef1e4f9ab7a18
SHA512526cad0ba07d1db610eecea943b521d514b75a28f2eee5c4c5902a40b9f80daebeafcb3c2ca4bc8f7cbbf4820514d933fa1f15e1f073a3bdd17935a02e882f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d5ef254b479be6980e326c06e1ef63e
SHA1c0f149ced0028fdf51105914de69421b47c33817
SHA256e67a29f6525221a5c78cc514aba40f52eb06dc156cf0586fcff0b13ad4ef539f
SHA512093af2b23f158d4b6952b344cc43962850c465772f2bdd50be1f17708a1a0d6635fa17aad0e17db4ae317b4e75c1a038b84e948b0f6b6d6e5421e7117ba746f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bee6019da1c482f3d84d03ad0e9208
SHA1865eb4da7328d5794262fd161e022d1bee20fb4b
SHA256bc6da30009cb850580f73cdf19831a7119e217732b76414ae102d653b951636a
SHA5122f9bc1f6b0bb714899014c279edd0797fb1ac98f2373f15a6a0aea25ee692eff3e6b4907b953667fd8f8dac942bc2a65c378fdd73c11ba5f6da50fa4eb8dcaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575d9c2b5b7f98d9c03214cae36c49853
SHA13b3fc6755fd98c69a6f778a607dd9b366d5205b4
SHA256320731d5314afd1df6ab5b8212db9e36f5497b4cc79b15c65beb6e64f7a5f705
SHA512bb91e3b41f6a2149a9ddf59ed9c1a8c91bae11e3e06bb56e8a0e01594273aceae53ddb88d04f6a3f3d29bacd8258b7009cb8e2ab5e0ae78e14f5ab6c82853adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514bec534b042a5e1501640f259c7e22d
SHA1057f020a3a4f21858df38e70c3c97104b32e35cb
SHA2565e64c47a8a4d7dbe5450a30357492772d4e1a746b6f5934bdd67b1c2f90b8ab4
SHA5127f154229596766449f1ca16c74537e2476dc02358eb6cb7f483569a73298f09b09a854830f56dd3d32f618792d0726bc454aa02979e20127d7ce65748886167d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52befcb7e65a4291f91f70abfb7d5af90
SHA17801e7e3524573fa9ff46e7c9879be30bd908c12
SHA256132717e288db0f13a8f8302caa493e156ab46d1dae46ebf072b232bfa4343aaa
SHA512237da11ccbbeff5c3f6847cd350bb5e55ca799bb1d56763e9cebd1f2cb1cd41b3bd6624213f167bbbcc7cad1dce030318b6a2be96712493b24cc94e541d43031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538522f1919391a3b4746f0efc4bac23e
SHA1ea7a37400548fc84d2e740630f962ca13412f80e
SHA2560d4224e2ea7e1ea7b020a10c669dbc4db53cdc748d6f63d9539fe7fa0cd08198
SHA5127d2968da245ba9849f5a6652a7b28f0a86f778e61565f02ee5de21eb77a9a472f5c11d966d72d50b64ea88652ae9f2a2cf63b13e6d6ddde7d8cdee9e58610ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e7ff8394447094ae3fbe3e8c2dd27a5
SHA10880c278a02b0c8da9719fa8b871319309010ecf
SHA25608d0b0d70cc006066bcd2703a78481dfe8cd0ccfaf1bbdfb5e4ecc89a966b3ab
SHA5120061d8279ad852a9636bfd28d92057c50284306b51d4d06b87fc1b3df92f2a057f9d27ea923f85971a8443259928f8c0b91de611f39b53e1dfebd9087151973f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983f79aaf5142e4a2051fb7359a7bad1
SHA147e4f38da51f51a0fed0df4175f44978b5a43c31
SHA2561885830f2aa5165df5fc5c284aa1828c001b9f33cfc63737ccdc96a822f24a0e
SHA5123beaec1657ae9cba09678917c3cf5f1339accd14feee8cce75f0a92ce6a145d0e84ce50270a6755527fcb82586c73794f47ae37c97c3c4c7d2bcacd192b2c9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586350b12dc879b2b5f8f3b49c15d2cad
SHA13ca4e07c8f2c67b44f29e163790ba6bf2e68bfc4
SHA25637d3a3740b7d60a7aec270a7c2dd6177f8dbe33670931594145638c762f37467
SHA5123898e8fd25886f04aa68a4749ead5a70104c9b038f0fcbdcf787792e7b19d69044cb74de086f44e4ceb9e51b3aa11174c7d099b1d3fc08b8073dd50a3cce645d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a