Analysis
-
max time kernel
138s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
2bc77465f7402e6ade02afde5c37b31c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2bc77465f7402e6ade02afde5c37b31c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2bc77465f7402e6ade02afde5c37b31c_JaffaCakes118.html
-
Size
106KB
-
MD5
2bc77465f7402e6ade02afde5c37b31c
-
SHA1
5b824d5dfc0a098f24bf89b203822312759bc591
-
SHA256
40c175f7fc2710cbd871d064a69f8781fccce130e495d7d09c7d8ead7fdfa437
-
SHA512
84a3d06bfb458e3ba08de3e5757bdb17c8ada03f59f0a02275b309e292af20b1e023467dc747d7dea68a6ce3907678ee3d726950f2bcbf8967988e4f106f0172
-
SSDEEP
1536:tHD0TaDgGup4wtDGsZrwTSTj9Ni51rUljW9bU5NrOetN5qfuqRw58g51vN:dABaA5UfYRko3aet6u0we6tN
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5841291-0E4A-11EF-B7A6-525094B41941} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000ff524ecb3b809788ce3f39ab009a4fc524c53bf05d5035a2e805288cbc855b92000000000e8000000002000020000000d968fa914d4a01434c8aaaefc97a5718e8c6075b8a373ca805af27556baa640d2000000012cc02d5c28fcea66e8a33a38bea1760c91056a0e973443cab62813683ad431d40000000ed18254711a6d963279ee584d2c7b7a94811f6b468df96e2400e08f26954ce85c5e8cbc38c0c2c3c150524bcca760fc622505ae68df829e489fb7029da19e261 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421451872" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000c002415624681d2f9585cb8c4b8ffb0c12120c4305a71abb47db3ef9be2c6b03000000000e800000000200002000000074895351461ebbe187b3ede210a88c9738c1c0039c561915eba4da2bb1223fc19000000028b6157ec896466aa91c4956848e7ac7ebd21a07e4a6da38db3268c2c6728f394e991a6743517a54426208bdc84b220057b65bffc049d5b190797489ebde0c49ed3b4c37d8a461daffbde1e3b0e9564663075ec5279d32a9a4d2e68b9dce1b9acbe24e11c35d6479096de3247105616c2e78973ae296389535c9d735c60547358f85b608439cd97163c418a832abce64400000002d1a5d37a77c39a1842cb15b9b8a138044035ef72b0abd9c90ae407de4d59648c612d59bf65d31acf444214af8070a8f917a42822f86aa31c6ea3411201bd123 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00832aea57a2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1204 iexplore.exe 1204 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1820 1204 iexplore.exe 28 PID 1204 wrote to memory of 1820 1204 iexplore.exe 28 PID 1204 wrote to memory of 1820 1204 iexplore.exe 28 PID 1204 wrote to memory of 1820 1204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bc77465f7402e6ade02afde5c37b31c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566fcdb40b1c17c7625f05f2553ed888e
SHA1274965f33121f30bfab5b742f222328c6e2bf7e7
SHA256c857bec1b7c14fba28de3ade29c7191ae2897e9e4c19c1822cf33e2fdef66ae2
SHA512964711e6a1950c8024ce65be648a37ddfcf4bdf01fa03ad4ba93edc3f7e06b66f62e03f475956030a74383a01458e6b62cc33a3457b011d51cd9716427209f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547bb9bc1667f64b13f8efea68841515e
SHA1557893fdaae9bfb17d5f2b34fdb6fdf6d7920909
SHA256cec2be77f6e4d1db0be2b6944fe667fcbff6eb18b86380d9ec54dcc3cf275881
SHA512de362ea13ad7d5a0c0538749e8475c00cd8b5f106e3f249ffb85774434409b49fa517f349728a5bdf88fd5f006df83ad3939722f2c5aeb8ecb094bc97cb4ef2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c082562ed3c57d37c147872d90fbe530
SHA1c97ff83237fc7ffc7bc377ea208ab46d20848e8b
SHA256d41e24e96042a89f96ea4209ff962b357f9971ecd1b7b197f2c50509a3703834
SHA5129ee4059cddbd837230d62c0b3ba3c68386312dea848e83982b04e9174dcf1a898a0b5a1be7952ca5a5ed7410456664fb3debb6d1f79fdd2b94a5902018a5afe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c3de4f22b2e8449166f9b39fbc007fd
SHA17e4a44e621e4b0067db533724c222e3108df8570
SHA256c134d4f02f9e431660cde68a6ffeac23890bab4af07f1b5edca4946b33334793
SHA5128eb226b2ad81e8d6942f0c8fe75fcf7b63fbdf7a828afee986f14e85b0c5e159c63f5ede0d26a41073d12a2c6e9173ac745502b019f8b430ebe9fe289f35b120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a87643c281d63e6f7b65961eacedf6ff
SHA11316c201225d3f50efd528e95eb8de904da94990
SHA256c05a298c6c963eb8c11e44ef4e5244b2124034ba64775e9cb81be206260e19fa
SHA512467b1f1c6125483f2bcdb2dce9b84bdf1e39e72b21717719bdd2b4962715326324c05fe4040b930f584e1ef617e7b8e931096e137fc958205d26cde6189b5438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56991f203f86457af6759f0bca16f4b36
SHA1908d40a75a5407bd24e9e09823862a7106fa891d
SHA256ff2c378ea50a387b3cd071f6b611299f625bec9a3b00b7facc1e4dfb94183c81
SHA51256792911b0724566d6d7f9989349310d94ee6f47a154d8343a733b792c88df7800fbb531f2d6754442679173864ce8fd922be75e5985f7b81885a0bdf2e10cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5842b2a8c14f547b3098a5153a29ce0e3
SHA155e24381016834f9e879f60607bc169d69958f99
SHA256e74d60e15f9564db8cbf206e355cab85d4b0396e2b79c468a407c9cf8bc39852
SHA5121503f294fd790a138949cb080579eead9e47967abb683813f4fa2320b69c7171bc5c89b36f09538719da53f211d48f633432725cf1480a45211660c3a76405f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef4bd8f3f2d6c772a84e12cebc671612
SHA10663286e6b6bd7f872e6c2d9dc55c8ff9008e449
SHA256be2446e50a86938d6de4e4a2845770257f9f899af2115e11dcb5f753e90a6351
SHA5127ee81fabfd6d803d8142e1d1597bedb7a47925415ec3ee0e6a960c9a84ad46fb9dbd2ea0f8d195d7828b91b8d34bbd2d55bec9647f57b862da8170e560e04d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57515a08966e5eb5080cb34ee82785e92
SHA1a933f97bdfd9fa20baefa3586a677de9e7d163c1
SHA2569416ee34079c4cc0ff1c695fc6fba1f6f80a4c89b2b27ba5dfbdc38314a85875
SHA512bcf572df5562299b5d2322d5b014984f933dd49f1cf83a7d3b53d3eb9349ec2c18d04dcbc6acaf4cbed0275cba6ceb96fa6db99f562414aa11c00b3140ca9bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a97a8670fbd6e21b025b14b145efb1d
SHA134c2b1a422f541dd32c61e7ed773a8a5a98c499e
SHA2566ae3cfd68dfb7cd30449ab89be1009760c58e5421f98b25f14fa7b65d08158a4
SHA5129c1ba087d4298e5ff7577740cc50f669b72396fef3c89c362132d10590733b1481a9c3c48a919085569eb30f1bf806b41798a916fa8b16ac43ffbf7181fd87c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f4da774f513d09070bcc4a09ded66c6
SHA15dad1ce278574f16046032d89f2e4a9612d87ef4
SHA25686213306cbbf2e92d574e850deaa999328461b435381f2a4405ef6ef4a72346b
SHA512e43924be22567b4d855b45bef91147e6af954318a3b0c50e0290c1fcd04b1a8d9452ff7628961106342e4724389b47ff5fd7854e6c7796e0320eb7a345b36458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58aa8eb6464c0ecade68f8e4da93a86b1
SHA194049ed61598667d757fe2a76da3a3bb2090c8c3
SHA2568be112b70ab78188499658c8401176aee88bfdd7d51b969448a2598a44a615d3
SHA5128a2cdb1f446d4a1400821e00f4baca61b1dded5c5fffa6398adbd469e835ec6dd6c3d6c06bdbeb3d60c7a60b0e0a478bd8fea2c240c5d8430991df7cdd6688b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5d005eb35091cda5e8c7e368321afb9
SHA1f4fd3d3aac943f0c3d00190746c699ea12371ffc
SHA256fd70c683f18b480d23f257d62c7c1868299d1761fc55e49fcfbf15a16310401d
SHA5129222b55c08bfd9bdb365ee06d764dc7c00dd3ece71ca329050fca7308f38cf4547802ba7bb4e7f180caec48c34759d775a451e7b7f338f093d0eb92479ff63a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c62a5e54d994c911c60139a35300881a
SHA121d86952095ac4fe2a0b5dc65f0e15adad25b9b3
SHA25646a91b4bd797bce5cfdcc1416e9b9e028756345c28bfd4a2cd0629d09f624fa1
SHA512fd3f9fce1d718be2b1852678fd8651aa31dad88854632e8871f617c9261c7188a6e8a450a5746cc525a0c29fa8d54f33103c3c572aadea1df6c86b73cc1f1e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53847a7db26ed8add2c63770764e48f4a
SHA17b2f531d270eb0010b52743a553495c7eee56c63
SHA256ee098871a7aa1b1ca4ab1437b43c79b55bab9fab89fa14651a746b96cdec6035
SHA512dcd99ccff198fb7f83f61acb83c5e443eb1f469b45cb6194d2b48d6e8c208bfad25f313d6f3d51d3de1194d76f59e4fc6cb8a0667ac2f2a1eee0c6e7f7d10d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f82421a94135698c051606699e824f42
SHA1323a5ba856f3df0298d5b2c82d1ca5c496d8cfbd
SHA256bc35dc50638e8e01945ebb9b3bde1dd7c0a13dfd3e4c51f512fe03d80d6b8f32
SHA512f030506a50d0cc77b03e51bc22a7a2e3d7e1b40c195c9db78e667894e8dfa93f6d2ba5d0bfe8d2981bcb6522bbf48c3af513b9711dbc47aaabe0fed558490658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a5067ef2f189e2875e4195ee3336cc6
SHA17730b5f15bf91c6e649af2f8d871db63c19b71cc
SHA25643d6f5cfc57b2105a6fc1a0c62d8e632c5de64f36cd14b23add873dee181d8e3
SHA51253b108265009a56fdde1969aca03279f206b438b0e198b5647d54c828630108f111170d9a638f41f93e64cc7eb3458d046e5e1dd9f027214a5b8c2222da7b674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6d8d1b69599df8e8be1238b5ccb601f
SHA1b1ccfc89e6ed18fe3c17b737217126f51c642253
SHA2562063f51e6327198efdd9dd9bc37e491c74f5f1e1a952f21adcd376769d783111
SHA512ae0f2f5173f1d8f7509fe7a397ff2486dcbaab3e8fe54ff2d2fef8541baacfca4c3448c3565e92739639374cfa24bcbcfe30371bcdf8ebbb0be9f0cc62f7c4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ca91a501c15e6043e2f75308373f7d4
SHA110b67fb8a31d07abddec72fd7865464c14c49f96
SHA25672ce0eee588a862ec602f106bb15bb4dcbf9c6c0b722851898fccb68360bd2dd
SHA512f8c8ed77fefc7a0281d1804cfb02416932b3717d9d3c901ae13607f6d861bf2f195c3726a8644a5393085290c2a11697dc3b9a7390b09e93e31f5a6c60513c68
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a