Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
2314d307110a397eee354dbb995c26fd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2314d307110a397eee354dbb995c26fd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2314d307110a397eee354dbb995c26fd_JaffaCakes118.html
-
Size
72KB
-
MD5
2314d307110a397eee354dbb995c26fd
-
SHA1
3298f16e82e01c77eece38ff9ba691d2e7f7d4cd
-
SHA256
69172ccf6c5369339092294574df11cc4aa98dfe462f227298324fc8ebbe93b2
-
SHA512
f1f0775ddaf25e556eaae755c2606d38cee66caeda0a38ef773eaaa57d7b4754e53e32a19aec8424a48f5871aca093ade7b63fcccb526bb5e1c1b95a849cd32b
-
SSDEEP
768:CQ1Wq1z6xCT/ixNxM82L7U50+lwBxz1B3kJ4iHXCT/aFlm6:CtqJ82P+fPHb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000266be524378dfa3fe49b869606d9f6662e989d7c826e044756dbb37a923f9bc3000000000e8000000002000020000000bbead3776a806da96c953b4e81f2d68cf198a4b335869aa23a28454ca0f5e3432000000048318f861634988aadb9a56f441a1dd5cd86504c7daf0397ee40d8b1685b3ee240000000aca5e7388c68fdef1b9a84e358f018c51612e6adc3e61bb7dd2638a7d0d3b4c1d9812310ff19cb757bd8ed5e1f94ac1b79119e67210d47c9da2e41056097ef38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ad7372fba0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421302313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007b564a7a1089ca34508f3e7eb1079af9fe4750053695a6f9aa2d3ba573800b56000000000e80000000020000200000000ad6e37b2fcaa7a2f9b62ad7b2a487efd069bbcafe535d207f8baa09d9a8f6bd900000008cc27a1f85e5bd61f4c55cbc8759460115e013f5dd55d8973963d3b6390468ddb2ba7a521220c16006ce034d656ceb100bfdc074fbe44466a696f2854cae2a27e1becc8a9734da1d4261dcc46ee1fd41f3e44b0e841ea5c509ede1b4b434dd75ffee8fd27078c880ed3cfa99d62512bc4e76fd770ea16b6affb6ea05bd59c25eb009a0709c5674a9d8a81e111d6ba76e40000000c8d71cac3e6a3fea593042e167cfae276842e0c013d11b7aa318846d16ab405d0d35b5cfa125aff0978787ef09a081904d5cf08a5286271a668dac8565de0aff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D4E9791-0CEE-11EF-A336-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2908 2184 iexplore.exe 28 PID 2184 wrote to memory of 2908 2184 iexplore.exe 28 PID 2184 wrote to memory of 2908 2184 iexplore.exe 28 PID 2184 wrote to memory of 2908 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2314d307110a397eee354dbb995c26fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5d51d375703657526255737bc0f130
SHA1258692dc4dfe1fc8c4bb61281989a5eaadadf65c
SHA256a0e8a6e3acc9fbb6cd3cf97a1497591914f5aae1fa10f0fbc164ee49a9ec0c2c
SHA512d5140b3e65eba7e7faf8ed8e37a7d601db9e2db7ad15ca2f9709c2506ea26c5196d6937eebd3d09ade0b26c58acba13f6f9cc6d7f738cff242298bfec51a7ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7f90c5459a43efa50889ca23ff9ab72
SHA1e00744ba625c9f26d07d19270104f3c9287095d5
SHA2567d847901ccca899c182f44148c445d85ff7c1618fb30b47740aa870acfa4a7ea
SHA5128dd2533e853263d6f333575f245098b5b51ed84d4f4e1920106b6379c5864cb069488f8deee68725fe2673695b82580acf5e9e237310f391dc4880b1a0a061e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7522411c15b3768283acb60ec7722c4
SHA18503891499a38f7a5b56c06c3f4bdd8e1792c41b
SHA256b25a6c178e4c3e83f09d49ec69362a80448255603e025c864de9ee7647688c03
SHA51214fe7e76773b746982539f82b56084b6811d3ad75850e27a139dea6c21582c0fd064f72c345bf431edeb51a73e6326ed0a53d6ec60644bc880a08183cbcedbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4f819b5d65c14e04cdfbdbb64a80b53
SHA13399b924990aa8d8e425d51ade8745a4a74bc48d
SHA2561077516b1a82f9163541fced3f9516a1b6da5df682b77fa74887aa0acc3a4894
SHA512ee7efd7f9654a0687a4a60d4cc6e413b8bdefee043e1fca602805a30fa65cb38b6924f41b7c2fb49e67011ca6a236da4f94f4e1517f01d19d3ed461ff35777a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d5a81e792d7835eb0138b232f3e5aa4
SHA1f168d5eb6fb3d197510c02c79b9ed2b5c8fe327f
SHA256ffcb03c9bfe413571bc07849d6471f744654e78305ba5fe638742ec1f015e9d3
SHA512f9f3b0b7139546476a809af7bb37321013ac9705fb2a909cd84ddf413932fa6392678d7f48e2e13e30a39da2d7837da155aede5b48e197240a61d1531eb4a2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5184036c04d5823836cf3b21b42902148
SHA13574f8a644b4531bf3f9de0218568ce0ca1ed19d
SHA2561d9e4ed9f61552a57e3f9f57c7df9afb63f7fcc3ad3da5d48e5eff8044f19a55
SHA5128673e0e41df229443ee4f978dd675b12e141a2ce10cbc837f5ea448b1b0805c4400b209ea1be8d681b7eb6534fbc9e31beac06384e25f22d348a95c0a0423a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391e8e9472143f78ca1c3d8bd2ff569e
SHA169a076292705d6b825ea2bcea25d37ae5a646aaf
SHA2561dc46aea7af983d098143ab2a04903de0e7a3bf0ca0b961f5a1ecb8b4cc732e8
SHA51263cc470f938b4d7914b56ffe5e496be8e1a647adbd3b123db2fc739d53624159c4c2b97ff07b409c3433dc121a5e70047d3108d75547f7647e9c51ce0c030f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f76d5f9f6f7a2ed979e4b990773426
SHA1810db67134cb0ae369df08bc69715f6ea90515fc
SHA256840036601ed8ac6c23fb5b922017c3e3ea3d15193ed74805140f8d6514e17aee
SHA51233a9ea2470b4ed3c4f56a68988aff8312f574f646cf694c9489b0526eb6d03d1b015658423821b1d9937cca11bfead289f7da9568ae55e243fc62a52bb620a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d08a52181d65fd29753a320828543e
SHA154dc093b3e1ac84bc25134ba6e4e2ad1a97bb53b
SHA256125016aceafd4caf6877e5009838a7ea86c33aaac2b76f91b8c63ed37cfbed0c
SHA51264c1c794d94780035b2546623ebde9b7b2db9909f1eebb4fd692d2ed10ec50d2241a06ee7d4d11b5fcdf372721b3591a8adbcdbb4f73370fd1c42c6e9c5c68df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1b1aeecdcf476657ecb8fc97ffb234
SHA1a13a11c94361e0df84c1e9f3e71e0454af000186
SHA2564194f6ddef8ebe1ddf8dd03ab64277f6ed2a8a2005427be303578edc99ad0695
SHA51243319112f3be1f1a00471ce098d5a5b445807c0a74ecf7f349bdf45434cfea35aec377fb2998e9de6543c54d13d971ee2b3a9c148b235275617385a993d9ccd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05387dfa42fdc13206b2f3f3d6050ed
SHA1d55341044f6001e562b32863f2ed5b70f99a57a2
SHA2560705bce0e77a86204f1109214b6dc5d19ddf05c5b36cabc76ef3be22b6d35ed9
SHA51244dcb04068bafc6fcce2853129b35fd808bb8a9cdeb8a9c8683ce4e67dd93bc7f4c6cc207385592753a3c2a05373c3c368505c8572d7fce79a0ccc9ffcea6062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5734cd151a43565cc9c72d713858a9b93
SHA19f0b8c3823553833701eacf5dfb84ebe81f6dc56
SHA256b42811d48a0c58a66d31d0d24af4ceda988b1b6580411335b9f3a46e3b6e023d
SHA51291c54a0f94ef6846d930556698f5a2bbad47eee70c5bf43e6b0443afa81f436bac14f4ecc289ae8269ebcd01cb9833f337f1c70a88ff51b5e49ddb42090ea1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5a2c93f5f27c7fcdad37b58339678a
SHA15a12f86f60780299e49b79ebbebf16e1eb502631
SHA256e78301ac8c68b3928afc67499c27b74ca10242e4c951ea407cfe9dfe74eb63d0
SHA5121ec64c2a6e9aeff877c3c36e1759fe6ed0a50b42b06666a2fa4b6c4a0059e7b12729f68221db00cc1ec3f9a15204a8b2175107e195ff1710a3288dcf7d8def27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5286a4cdaaf24068403f2c990cc4bed3c
SHA1b664fab41fabb3b43f8ec106499c77528b830523
SHA256ebfbb6363675215665bdeb69dc1c5ca514f2d64efa6bc16af093d3cade520c84
SHA5127b302b3d18f9c78edc4dea83ca45bdb12934e8591c76fd052e9e863db628028564117b0dd7a3544b67b1119ea61ea1d176988d1bbee9e5ffd7dc8cb36151a760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba73e488bdd73ba82a1c837d5548370
SHA164e5e2eb443edca1e573118d6bea87b2a91ede55
SHA256818850c89817018824cf626cdf855de2c0d450c983afaa750e7bbe855c6b2792
SHA512fab660a309201206d61f9a8a0c051061c6e2ad749f83a0fad3b768f977aec30d158f6386c1f7edc91239876e4ffd9806020e8d71e2467e634f9cce1a798b3d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a905a58a8645e95bbc2caa12451fb943
SHA14a5dc26958f7578d1422008daf35ecc382045f64
SHA2564610da6867e776fbb6a08bd1f074952e81ef95463110e0589fd31d782904f785
SHA512f47f5d4e4144db58a5c86662abdead7cb11acd251a36ca3efc39787ab62dd4168a80e1995fffe07a017892108ed13833e0b5c04b351637669c0be71fd65aa008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5783d8daaeebd5c3d140815b2f640fe9c
SHA12212f799acdb5d34a00d8288055c5cce1eef8b16
SHA256bc68248b6a62ee8ae7137ec5946cbe583173eff827cfc82a744db3e118f3c05d
SHA512cc45d81692f41e6c792b32f16b4b284bc87ef1036482c10de68ab448cdca9696d362065803364ce28c346451780143cebc86fc72381d1153e925fbb39a2ea23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f08886f2ef01a0173f4acd83dc6c0bcc
SHA18153038ed49d06036a88639f22a1582bcc238b41
SHA256a7ff7c8cd30d6008b04a615d2f6e6502ea957e8dfe681af3dfde2a5867d41026
SHA5124f60e0f66318d949ac0a29685a82e8b6a99277284a07abc75d5c48a8c8c81cb26e7d6db1fb5550aedb805e7c6c400a5e0b7bfd66a0a4247dbe41cdc635122562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e815258c1b748c325935c05976e7b4c
SHA14309f569740d0775a0337412c4ca2ef2ec48136b
SHA25651fa7e5d4d8eb0cd4184c03fe30155616719bd8090b7909a096673fcbccb7928
SHA5128e09b5cb77ad600fbcfcd79a6af45612667051e02e0ea2d1626fa1ec699019d0dc1b93e6c1bb9151224428d59833bbfba791380308d6f070fee89ad9cd91afb7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a