Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
350e5c94b4529306dbff259bcd028fad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
350e5c94b4529306dbff259bcd028fad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
350e5c94b4529306dbff259bcd028fad_JaffaCakes118.html
-
Size
461KB
-
MD5
350e5c94b4529306dbff259bcd028fad
-
SHA1
5b5f99d30cbe7e0ac54a326bd0e50a79ead1389d
-
SHA256
422e7864f84075fa2ca6dfe3084bda4af0b99dd9145c7c13372f07592a060b74
-
SHA512
26a8eec53756628946ad3e55eace108688d5e945f3d380c05e9a3023709953d862c17dc985bede34772877a29fee25718bbff5092b81a4d2f99812ea0ba00259
-
SSDEEP
6144:S5sMYod+X3oI+YSQNsMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X355d+X3W5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0610f0bb0a3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000cf614d1142c33b6964ceebb5b87b53565e96c28f3bf5ca1c694d01264eaa3377000000000e80000000020000200000008fc70f00ba6c4cdfc7546bac93517fcadb39f020bbca7a6c65387e822cc1ffb79000000051d7638b33d89e65f92507a65b56e7fb97a3c3c8ca3e24caf16c6313ba7c6ccd004977286a78633a2de9fdfd15b518012f4b34796f045816449f42f6d0b454653a4d99336aa78a76955e1324a039582887000c7c7fe6fc888bd4cf20c66804f0d53baed972dae820f4f12eab92360b67cc06a2f69b9ca18f261f6e1fde894fdba569c79c076310312ac58693f0cce81e40000000aa44f77bc966bcdbeaab86d930cb4d4bd863b6c3d12b70a6acd4805cec8ea9501085d45bfc82e8b375e43cf3ee61bcb2bb270bc463509087156379d1d9c7a597 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000d540d5272a8bbd0a70ac5ffc3ca9034f4830331334fcbfa3726e916a1d6ab03b000000000e8000000002000020000000566c1b639ad5f6b878c4bdd396be0c7e1b562961b98ebafb139ccbf555858c9820000000ff2286a1d522eb2bb15249198bc3921384fc67e56e0e91b32559431ac213274440000000d8747800274407c77c072e7753719af13164dfbce1cb8d949dade8fe9c0c1ee24e6710112fbc902d98a6415c5e244dfc8caf64ae0f3219fee7445c6ea446efda iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421599773" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31EDF921-0FA3-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2172 2320 iexplore.exe 28 PID 2320 wrote to memory of 2172 2320 iexplore.exe 28 PID 2320 wrote to memory of 2172 2320 iexplore.exe 28 PID 2320 wrote to memory of 2172 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\350e5c94b4529306dbff259bcd028fad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5ef254c16e5f91a6d4c4c7ef6ee370
SHA17825f6d4ebe13231ce43d64393b92f88a500d1d5
SHA256b92c1d51f1bec86da9fb8ade87a512bd8924bb10b01bcbfb6191b0443b82ecd7
SHA512cbf8fce4878594f45ac6cc4dd77960ef77093bfb12f0e2ec155095c8942cd8a9233fc165ae14efab65080f84faead4a12ff2f2947e579100744518c3f71991e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5275a3e84f3e0245d6170cc17a96c3bc4
SHA1a33ce426016ea846068d56bafdeddb996ede6b6c
SHA2566aabd2eceabb0561d64ff312fb1d243c36b5b4ea3a6a1973c24777d719789af7
SHA512995b8abb9f9d0e895cd39da5fd7b6509c1b102edd709fa9772634b6d4f01df14c93caf27b67a80152df77a375088e2989bb694988cb2a92c47ac0bf006e04ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57820337e02bad39ced9b80a25af424bb
SHA166372207b55e795b82d23d23764c8cc8828a2c52
SHA256d25015cafeea1ed7f725b80f02a39a95b29d4f341c923a8189a73cb6052cb0ac
SHA512cdb98b81c77dcb5eb4c04ad233c207fb6c92d2381fde10d70ee8a2fb40cf7c1b8c5e1b4d97c49d14c1bcff13cce972129c48f03bccc17fa45d0b22b814c1dfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5221541cc2032f84276cad7c00921d8fb
SHA1d1f1f8ffc7a73cfe5da3990ac386dcd0b47e5658
SHA2568b97817d3836f62911055c49e1b6d800d97e8d5b8336091b86152a5a2d373e04
SHA512b26dbf5e548d657c386659aa8f13479570c6b22c728a71fb41fde51c604aa702181fea9a4b5fc4dd620aaa4dc2f452b2c507641be46836efd279545c214e2f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5103b029d8fb5ea6d015d1b65c913d7f4
SHA10c55939112136004a00d15ee4d7c1fb8b60659ec
SHA256f3f261796c9b516ee20ce8b8cf285e46c56507139f3507126884230e863ec7d3
SHA512166cb0517d124a2e30cf88dfaf61ed936ab0edf4dee7df364cab56da0ab44eb548a41507fd98d79868ac7c51f106ea9347fe4a244c67a95cbc9e3cac871f0adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53debd9c0fe165651a5f0fe719841bd59
SHA1a199f5992c5794e128e9924141e544f94eb0c574
SHA25690f13e17ef4fe22e4b27526e4d84a4bfd34f9480100f147bbd7e882f3d2a2a9a
SHA512602d1e16b0e8cb083c936d72ae688fc28806f9817a6bcd617814a732b4cc52e9380d0ffbe9774d74e26230ab9e9ad8503bd1e6d4c0b3d5fb03131fb4af625c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b73a438a81e520e5e2d60a5b692de3
SHA19b40543189c4791a852f9abcb31d8110d0807c70
SHA256747910f0020de389a967c5f35d1b81d5bef54669e2ec90c47c97d08e7a7508d6
SHA512586270b92cc011e9af209e555013af351c359843d4e0570549067b10417f9be05a9828573a5e0068f3f81be46cf13a7440c548ee8c8e977317d5447de7912a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c42effc0466c1ba30339919f5203393
SHA13d6e9472ad757f3ef176024213bcd0d17c3c853a
SHA25619c06d57e7e7edd605ef16e3a2e8c4ec10dedc26ae13ad425c6dec1a0e0ce0d1
SHA512a057d0a91b57ec79fe167f481c2cbff3372c2ddfa9a698c026d5ca6750165432d3e951e0b378ecfae4995ea4c865ce2e5a6d00eff1d21d9659fbc1cb23cb1f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0d34d0f29afe0bb3515edd8f57ba29
SHA1138cb61ace3ed56b1fd80678be690abc9b490a4a
SHA2569a132c88d981bb854bef1e3af3046ed6e9ecc6068748cd5623955c94b1893f26
SHA5127422407c88f30ac127bedb72f0b6a7bb98a3117b2f8b9a307be1457c90886045f20f6ee29e565d125908c32b7f3d735e8af849a9de1c5e7815dd51981747799f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55142ce91ce2c262bae1512ee860b863d
SHA1588378e8cce6512132b5eafdf2cc4bae2d7a5688
SHA2563b0319559c5d1005d64ce577f6b789757aa3bcd472836530cfd282ff66b58074
SHA512e4ff3f01b9a560fb2027f7c7301d59fe8be8efec1341363e74cb03fc05d4acd736cfbec7069fe8be8c224399e5f243a7add358656170c6aae8698b7ff2d9f70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50411802a386158702df87daf9e7f22cc
SHA1832aba39495d79b3cc391fd6e9d7125089f2c654
SHA256d2ef5b52f4cd3292e792ad03a5d2b2155efe73f53ac4b905b0807551afca082c
SHA512e2955e6f27714ea31c4c56d5e69f0c735d40501ed2d8a8aa7031b949cdd8d804815ac08ef1b3bbf56510a71608b83a154d7453facc2cde8d352b013cd9c1c575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e3aabd250f1897c6c769bba37f26de
SHA11f535721852e03cb2cce16fcc1d4a0d9e18f7c8c
SHA2567df40f5ad26994aaac4d237719dea4307ddf648a8f3000a2c87dd053d82359cb
SHA512d4f2d3da5bfd164522b38842ff6ff2fd3159add381e59100dc141d15d7871eba22f55261f79e2531266cd855776877ba315655c908794aa4d5c588e86f7adce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a938a4c277adbb0b92dcb54b9dbea7d5
SHA161c703da410c64469785464e6074e6422a057c74
SHA256cd2d56d0c58055568bf23ab26ed1211a9dd15a773f3650457a2c4695856315fb
SHA51200898ddecc1c1986faf6c640aa5ab0a56735d9b30316555af369f1bcb6d56fa0d10830165877925fda30cd1e09ebf8c983b9ca07fde45d719711e99eb9c764b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae198f35bfcc11ea5637bbd2a9b30d18
SHA17c037b3ee36bf29f466e9da30de1376f41e65aef
SHA256e04ce2a5575c1e81f0488c4660530bef3909e0753d9cb995cb684823f9c16971
SHA512b47c77674d06854cfda34b11f4098361e1c433c30270b0a3673c3f29959d53352cc500587e36836c54afd9b2130cedd48c0fd96576caf5d7f67e5b9dcbb6b91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee228fca70c62f8955bf8bf56be9a936
SHA14c1124b894051a792b33666595fe9970e48bebe0
SHA256f8080f2cd394956bfe98faf9d5bd971b70ad94a743d7276df48ca8f99869f2e8
SHA5121223d1275db1d0f2ce3c94e96ac2d8523135c7e2121b6586e89df0717eba800ef08239624d31576b0224be4db53a73f2840a73420f27eb7fb1284cbfae909072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5a6357fcbc3cf4d1137df5181c0bfce
SHA1b4abad17ed6e19e5641f25c467328dd61986beb6
SHA25626ba5498e36a2181aed66c431b4799ca83dcb911338f426de423dd2374f7b348
SHA5124caa0084a33175c49ea35be7182da5e78036518617ace8d467fd1a247beb455567e5432f2ce0eacc3e2ecd087d976809b7299179f6b3cf319a6f4e17a236d143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b90f5aefe7368467b24801225acc76f
SHA1e36aef4bd34aceeece92b567b96be6bbff19559e
SHA2564476640cb3eb85b98df736467478fcc704a98129f8697e42220b48220035114c
SHA51286cba3b1797527f30111b3a76bdcbf6f35a7f3d597f170e60afd4477177bf183d7cf8397dceac20f9f121ca81ead1324e0a67359b4644e76ab52c0fdf47a0687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50e9a7ee608576902fee02aed13d57e
SHA14c906987dc211cf0a4c571cb5580bd9848201001
SHA2565d491be55dc11260cd237f9cad80423e0d932c13b37f4d72fb8210f55ae8d037
SHA5128dbd10114a20858c7f89adfad25b9232eb25cde58793a6322b98d23ded88d5a7692f8ba642c1238f8b57cfb1d6c845c0b27fbbb6c698a8faff30dc33edea9245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a12d997c9c646fba6e6f5c328ac4aa8c
SHA158330c598f48303aec0404aa7792054b8cd2ae65
SHA256e70019847b7bc9d6ace9cd0b568f22506326636d4b960c8c38893d43482c3c3c
SHA512a84c9c57789309a95734b821f13ce0a28d20fd1dbc2b7f2750c85fed61aafdc3dff5b067ccbce30adf5daa409870f580e72d3e7fd91ffcedc23ff78f18333f21
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a