Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
348b96536484dc88b207bc973f75323e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
348b96536484dc88b207bc973f75323e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
348b96536484dc88b207bc973f75323e_JaffaCakes118.html
-
Size
49KB
-
MD5
348b96536484dc88b207bc973f75323e
-
SHA1
f7b954be34822cc2fac456d10f54f506c4598184
-
SHA256
a03d2bed426700ddb28c5250f314ad54b2274a24404bfe41959c969299099900
-
SHA512
712c582c83cfa1d26ee80d9160030a95642bc08932593e3f80a1df820e8111f7c63a84b43f139d48819f5905cbf0648b09f734ad971e89cf3f556bb5b4491984
-
SSDEEP
768:gPzVEUlLzzkhTp2rF6S1cEOvzdREhmvScfrRHrCU:gPzVEUlLzzkhTp2rFNcE6IUrCU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{731FBDB1-0F90-11EF-B837-5AD7C7D11D06} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e13f489da3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421591722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000041cd72ea5d12c7e7cfff944478b54dabe9a12f684113bd6b410488a61f6670ca000000000e8000000002000020000000cb7f5c2f1f39312caec6e161c449581ef5508d655fcd76a7dd09b08f8ecd28fb20000000003d3aeea6446beb8c627fa7dfb8a2c3529c421babfe9a984d3753ef2388cf2e400000002cdf2e6949cea7f9d3925d4218c99aeed1e8481d2bdd7d27fdc5de31c52556d29aa31e6a3180461d2719ab5fb49fdf92f4477efa4938fe4d06b8e61f4144a7c5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000dc2ac6cf542ef03116a60070a4772981ec47789248ecb60787cedf24860c5ed2000000000e800000000200002000000088b8f7784ca51d34f71ed1f9f2c71843f95f90bea1c55351555a614fb89415ba900000009a98613f813da6640084ca637f8a7977c46aa41e53e51b520565b80fc8651a9e2b7bd8c8ae6f27578734973c7971e7d50777ca09c3806c7f74b677dc7a11983e367ad28216ed11ecdfc33914979dd4f4677bd444067a328bb30d75638636649c63a1062d2e150d726fcd1c5d1c1cb2f12dbae061dc387ce07c98089c132aea6de3074f4ae3ab361f26d5212de136285040000000baf0f33c86acec056ca70934b45063af2f444d5815ba629ef462a903bbd71ec7021cbe8a27ce368bea0ebaeb2df88be4823cabd8a57e31a79cbcdc767f1ae7de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2872 2444 iexplore.exe 28 PID 2444 wrote to memory of 2872 2444 iexplore.exe 28 PID 2444 wrote to memory of 2872 2444 iexplore.exe 28 PID 2444 wrote to memory of 2872 2444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\348b96536484dc88b207bc973f75323e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1a4ab2691cceeeb3378e09e31251157
SHA12c999293087f23c108bfa33de46b68de7bdbf34b
SHA2569ecf38142cc7d33eb1f2fab19d9c361cd620ab02cc0fceb5a3f7726238c559e2
SHA5128bebd888d7c8e863ea2ae3e8ba352f3a6fa8b507a913dea5cdff5c31875014f64b675ca5feb0a97432078bf39eef99f92b6762ceaf6c270fac2629d16ccadaf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222f137afe956cd09b318e2c068a7657
SHA18aab97e349b080a2aef0e537f57f025f5fc6408d
SHA25659bb631a916f5979048db5d5001f2e8eaa5f3c0085314f6eec2adc19c41fd617
SHA512b7853077a3aefde00f7c4a5bbe34f228e9b126e0f407102e362087b93e5342f6febd5a02d71550535e80cb86bfea4ad7fa28686e444be4fe27192382e30d0d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343f65acdcee4ac29dc6de4a96364455
SHA1baad13b429ea1c3bb58792906bfb831ce03aa80c
SHA2566eed4ec35847ce02e7d03bd7bdb8e927a5f48670754836f3c03486053ea3d5e1
SHA512e1401b8886778cb5f22f5e91a2d8b84a4c578d9aae0ba53cdf8f8e15df044452777fe90d0e6afd3d361bf7c053871f7273540075d1d8944b074dc464feadf0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5be9fdf838d8c8ce2b38a5f376c8ee7
SHA19db35e8ac66f86ddcdd740560374579927537f6f
SHA256021d70d1e97730c9ccdf4ee5d5a64f95cb6e5ad37b81754626ae25aed4be0ffe
SHA512f8904cd294f628520f4e67ae46878232d85cfe8063cb165a4c228b6f660052a607f83d682db64371e365851a71a09adbd5490555a784ae230707873bfe117132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a917006b4842d5a5eb9ec0d0681baed9
SHA151a00b0fb2726130ca1acf11b1623730b5485e0c
SHA256618aaa762350fc172ab1a97739da34f3d67bdc4ae9be096d4cd65bc94ffe4d56
SHA512698a47c449bec64a3a571fc6bb4785937ab5675dcc108b48b073ff22bcde701a99de065f6d62459edd4d0072c5b3c26c9f564b27707205cbbf281249322e9238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9794de35a1c693b339f94141177b9e0
SHA116b4dcaac8ece02e3feca4c78fb7f7f4985aad23
SHA25677d39202b89a3fe1074636cc913287b87f2d457a339bf35e4d570631e368e154
SHA51251d4bb9a4249ebf1ca186deebecd3794b3871b1c5393156de9b417857a7eafe2b48b180d785fd467a98543ac8d83bd015d139f9552a9c8ffbf285ab8b80359f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59379ba5ae0526d4cfd771639807d4d39
SHA169a7abb30dd8f66c0fb6ea4423a9a04ace929b7e
SHA25620870808cf52aa2b1c8e341965a4a2cd15e11f33ec5f444fcef0d669425da939
SHA5127477d2d898847f573bad8efa38a0e82a869fe4daf7cb6b85f6414d70c54eb1244308a8322b4800e44c392d5ce8520167a4320d1a10dd52cd673143072dee0961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526926e516be9989fb4b802ab91acf2bb
SHA105544308d032f7b0c6374f17bd1f51f887c6991d
SHA256527353ef7a959b0a5edaf7fb1dfb25806ee1413b789de72da9b771631882c9c7
SHA5127d8bdab743f8b6cb108231ebbb48bbcc2db6af270dadb7a72d88a58c03b45fdaf2dc85286b9cb840405a1b2ba722a81572b7f9766f35eb1df4d1445e42fa3514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc0f97553a472594c40c7d0f4cbaff21
SHA132e563b2ca467e0fa08d2091327e6b8d2a66b027
SHA256f03175a7c68791302642ceebf4abd6f4ed37edb0aed59b9ba5a760af54ef7e1c
SHA512bb3d43d853648a5f57c211450f7860fd4d7febbc2d2722bdd829edbbce4ff18fae288d8484be80c261bb275b62b3e9528f3689e9e3c15b0ca670419886f975ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5845f3494792553be0b83dfd7535bd401
SHA15097aa35962b99f42f8f291a88712c25afab56e6
SHA256367a6d4a1fc3b02dec7fd88bd80fe85955a815695a13401f13333a3e59b0c75f
SHA512b67127a613f6d6ef0b1dbefc6e6b766e25664248e5b9e372de18c9c4352e0dd66fb33e9c92f1636dde965ae17989fd1badcf17c6d9ddd9446107c492115b6da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33a6a35813eb98efc6811a0644d8a44
SHA1e35a1c79a9b086984fa09be5b2002dea0fa12fdc
SHA2569fdc3746fcbc6f38d8f324053eb124c4f12bfda4fa61f608b434ed505d6ec960
SHA51264fa98f7ce672ccdd81bf8b1f95eb51a87eedb4c314096d40c19f1a9b3c4f3ac0dec308b02c5ae1b08202f6766f101a9011344ecd7e290fd1981a9757c685c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595d111360882044eed6a23216bff798c
SHA1e4cb3ba0fc0ec68a032beb253621653d28b53b6a
SHA25648ee1fad97ffcce674bcd8e83e8988378161283403a410d510ef892114fdbf92
SHA51278f36fe96d8ab4777fdaaac22875bef1b1e2ebb0728d5ecdaab7323ead77d2fc7c09ed891eabd4cdf8ce26d90adc7f14aeaf5b8a986ed8fe972006558ee8cfc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a08712f1bf433a09b9af954eb270987
SHA1755268e677bb4c44de4c07a4af97c55633e65c13
SHA25698fc05339bca64f934b7068eff1cfe53952650aa99f50ecfd958221b7e947976
SHA5125e56d9ddf935260709911c10deec9922bdb873fa05af0e73fa3c63f1c33884d67a68afd730c91eb0e478b8de558cdd75fdf032e055d8b29e39325f8b284d7f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a453f435df7bd6933fb056a37932ed7b
SHA16f394dc64f8293760d16384ac07f47727fd1333f
SHA256ce17f0a5e9a73216fdc00887db17b7ef628d50c8bfec57df164b0cba2b65c107
SHA51284bb14b996d3e4890699107aba9c2293ff6d120acb75c1e1212f2fb6823cf80864397c46d92aca7823e87dc37cc96a6293899e0eabb17c9c8a7542641d0520b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9ef518de9e15679200f1cbfea84c0ad
SHA1c72195e4b02a2096079fcc3570509037ae06d15b
SHA2561c4599e866faf3257c97b13563a5e036f721d7883d019fac14054d483b5a13c5
SHA512e69c01df0f0be2e3f13f2d21492d2cd6d681b4f8b061f3340ee6c53fe838411b67069e175168dd90386b15df556968e32ce8ef35e224aecbc0502865416ec58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a0e713f8230c79e49d485c697f2954
SHA15abb2de6bffeba6c048b6598a1a2685a8ab94f72
SHA2567aadcf425e38c998ee5f4083aa8a828499fb7e44cc8b22d3d0e9610774048235
SHA5121a40ea3e2200578a6f22e438c0ee0dd1028bc9c6787486fc068885fd28256fda422a9dabdbcf21c642a71d46624e08e154703bcd3dd50d3db716780231833c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718ba6bf6d9de4097a1d10bfb939b424
SHA1ed89084b978e6d955385f76cc2b16e83ca14ef88
SHA25627a409aed13d986af3072c556e6aaa9768825215ca40fc91895d992d3ae06ba2
SHA5127f4be1a215f3614233ecc6378371c503c6edea10400210d824bbf164b8bfd4338e6d5aaab0c97e52d07e7f138867d26c8ff6a0f498529737f3c07f0ae94ba08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a8cd081718fa987aff2c1b9740742d1
SHA1a8b7158d273da082f0862118cad98980e78910a4
SHA256042593245f57a139c0ad15a04f5be006483e0b2c7332f302ea3ecb6fd9ea6741
SHA5122b3fd3287aaee60c485811623657f0e5dfe5e43866c65d20c055e5cd19c1b8834db4489684c1bee1786a6d3594767d5184303703b6ec38ea5b3c874a2521b738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524891bd32fda93896e5af540f1c30d05
SHA199daac0df529ba9052c396d2d167d365a7eec222
SHA2569a710fb7dabf8f29784ce9dffb1ba55975691d6341b9be04f4392f51eb8c913a
SHA512d7e8a80b3d255cf96a228ba29ccb73312e1849084a48ac20c051da76a7bde9da022c82048ac702e0a827fee560a85cf24a3e111be9463b638b48750bc11a59ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d55e57bca2150e8998a30a624d58cc0e
SHA158dd1e12038ce44e6f366854612937a4d898baf3
SHA25669018c7d43d9b978a991172afca84ea98fd28a7d09f10bbba0c68fa663a80784
SHA512a7f70b154c5f89cc29361b4f3829ba286382088164814c129468eed812441a473ca871594c60521ba89f0dda43fdcb3f4784bf5dd8fa2ebabc297041206b4a55
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a