Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
4372a13e510a230e947884eadd58dfc0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4372a13e510a230e947884eadd58dfc0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4372a13e510a230e947884eadd58dfc0_JaffaCakes118.html
-
Size
28KB
-
MD5
4372a13e510a230e947884eadd58dfc0
-
SHA1
0b7a51282e5eaeab5f9716ea4cd4cc8f272043e1
-
SHA256
cdaf542ab8af8b4226cb5643e394a44dc39ff2028adab395475fb2a0884e9eff
-
SHA512
4bf1d4307bad75d706f6cfe8292618b8108213b88030e3c7299c96d62e3aa00cd188eb12871560993faacc9d71414063e223379d5e395fbb34da9ab2d84b2368
-
SSDEEP
768:p9R+1y48KYkYUjq/fd69mndJSW+HWbFK5szW:7sA48KAUjq/fI9iSWMWs+W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421889381" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D2411F1-1245-11EF-AF73-469E18234AA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007a0927e00736909bcc9cd68fb249ac09e23a104fa8cc384f1f89927b79dd1f16000000000e80000000020000200000005c68794ab06feb4113db46944b4ffebf697225ef07a24fd478247a2492725dd920000000e3be974c6a0197add101af3e250ff42f0b8050a20fe9c068bfddbb425dc37d9140000000f25af7400dab9035daa1f36bfc031e150f0572627be5ad38c5fdf74e907d658b611402c3915d78f2c32f38c95afc315324998858697ddc5404be0b85882ddc90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f3765152a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000e72c2f9ad25766322409fc104981a2bdd010df210710326b8a9fd59c0f41ffd9000000000e80000000020000200000008dc867316fd354758cd2e14d1b93ca7c4feae20ae293dd1359816162f7f4cb9f90000000e1e86cfb55c7a1e941024eda7fd5cd416ca2ba7d1e39256b64e7c1a2a5259b454d9dadfe1cf4040ea912ab4ac05a77a6092babfe44f5826bb4e0a342cb25efbeec8edd6d7c673418a51e577d0decd0e63d6a006d3e342d811cb8ddbf2b7bf6c951bf68fbfb8643e04e911df68c65eef33eb88e279a2dc2d952465945f6f4cce18e4ccd0a758ca37bd4a43dd59c5b45304000000088d49b2e66a38d96020c3f306f690b2f7f2a2032703f6a83a281bf5308a80f32c2f0c3b9e176f4ac022d662860099abefff9f562337d93a2db0d0dc125c18e4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2944 2408 iexplore.exe 28 PID 2408 wrote to memory of 2944 2408 iexplore.exe 28 PID 2408 wrote to memory of 2944 2408 iexplore.exe 28 PID 2408 wrote to memory of 2944 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4372a13e510a230e947884eadd58dfc0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5406f51fcc78c8b9955ee3f37f618265f
SHA1d2a0cb4d19ed62078f545479a9e81f25c3291290
SHA256d48a40c54a717845d488a1ec35bc68dd41335bb896a096d494e59b21afa5622a
SHA5121d159c91da4aa2031e2ef2e9ce621aadb54dae6c4fb023639511c270bc7a06eae9ec2c3c7c7ac1b66f6ba10f0c6584e89bf9f31750f57fc2607cf35a06c6f02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5495676aec6168191ad5f2cb3a3e5c05d
SHA1eb21ff20470e6c73461544676db3522fd9df9924
SHA2567c8d2cf6dc113f46ff9a26601b5a59d2af60bcc0c27b6da6678ed194323fbf1c
SHA512749c99abbd430a5befdc268e79a5b71150e2168e0208adc925fec69f7595a387560b0de98344099701b83a12285ab1d5565e6c7d37a486d81e7e34b1f7b3559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673c4f6cacdad49762eb82ed1145c7d3
SHA1d952e8dd12dac3c4004ee49f1f4c17097a3c0ace
SHA256098f49a4bef9024f055e5b2b06f3a88d78000eafbbbe3e115fb6a4c0b8de7b0c
SHA512f51861f9dbabf24728f0e163a053c75cc08c439a31281a3634b2f4b5e56597321bbf4b264d7e88f0a50fb66c2eb91c344f920d27e8bb3e2a256708cd7b79b99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a641086b7728b44ec095b9faa2f8ed
SHA13a9872b147b2662623321731c42632ac5fc329e6
SHA256b67a1a7be0b39158ed1109fd80b68f3132048a742a4836d2e41dd48ab4baab8c
SHA512130722d3de06b12ce5fb243be47f26ef23b516690cd390f41b55199206739727b872724d67571010b534a679192db1f3420b2a88ce019b94aeee4885f3c2b9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e79db78ec19010016bd1e95ed170ced8
SHA172ed3ca6645e86732805203335141ab81661a15c
SHA256c6dd2202ce0455dcd47994f26c315363c96a1c88e2f3089092be6e93ace0bd4f
SHA5120668f94c493fc7968aebf30f039a52fa688d964de7476bbd7a0f7cee9d61e2d050bc669cd7b2da28ac1cc06a0f90ef8adcb081475fa6f92a1495c095f2d89330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541bd856534427809b56a6c779374cc5a
SHA1ef8eb23e48bc7ed7a238f6a307a8caa23db5aba2
SHA25631c221429601e9bb6af250c9e488ade8b9be79d3cd8a6df8285541a86ea3760b
SHA512f59faf32267cae4dcb0e9a27f15d49208e6cdf2ee4be3e96180aa4ef0c9fd87d33850effa794e1c6ee76e0d5e33c53cdf8e17b96e53c3b1d068031dce88ed77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40570686989c0ba4adf61b740e2f52d
SHA18a6f44329341f3fdd77366d25869f95eea45f9e4
SHA25627dcc82b2155deb41dd402503ad8db2eb187bc806bc7931a754289030e939311
SHA512f8b6ecc4045a888c5a73d732d7b502b97550207de5877f8f87e71856a2c3306fad8f9d7ed424015110228323f1d9c752b57b595facd2092869cb671bfba08491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527418c14c13e4cab3d878bf1ebd7ccdf
SHA13510e1b1d9a082354fd85546a9ba35f5aa503772
SHA256a3bdc87fe5d670cee3eaa20c590ca2adde0d385fdb453973d7c97fbc9e089635
SHA51285b4d228d76e5f5cdf257cc9c8937db6437626f772f5036a59d56393b15d475f76867d8f0eb2f54620656e2d27405c8447500bab2d0465dc66a1258d273fbd8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ff03c6248a75820e3deb72703ebdc78
SHA110f20abdef227815df20d32b9cc08c4a60f96aa8
SHA25606435a3d4469eade7a0c6f01825dcf07b14d4d2c6db2c62ec38d401a493f5131
SHA5124a6f9bbb572af76e6352ea0aebad26b23e6b111fea2baa9100bca7cd8da85a28cde42865fd1e1245e9e0045cae8654d796670bbd71108a5d37a08ab3e3a7406d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7beca9ca93d035605ff8128637e8f1
SHA19c4ec14d0f4f1e529355fcb85b1cf04d4e46eccb
SHA256dab10cf14cc1ac3c769e08cabe1675ad48df6c39e178d6cc456029cab8066476
SHA512834499d72f654c3577a2b68c69e0522a0477e428d5d35bb6bce58f53de5b405d6743b97f4918640b79ba3647b9b8f208c69d39ee4de0bc3cd4e8bd876e616538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c5c4f2d73bbb2650ba781276664a8f
SHA190e3840d7edcb10d44d360a2cf4a3ee8996c805b
SHA256043ad8377b15773c8ceef262aadc489a4846076c939052d0f509225d77a0ae20
SHA51237797ad0119e2e4b8fb70c8eb26de439dff51f0272408cf1d94b193055b13defbede87b4ac849b598ac4ca9d3c4cb375a7ed31710c9118cfd521594173afcde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532db5af99db695bcb9b61ac9999a0842
SHA168a036668379db360cf09fb1e618e860039221b9
SHA256be41d87e35c29ffad514e1cb2bbf932ba4893cbeb0c19ca2d0ee529a55376f66
SHA512c1fd43f22057f350d0f527a15583e18ce76593af38e699928f27d7c9df304c285a91a1b2ebb3b3826da5c83cfe8fa3ab9b1da49b7276d34562a604daae817800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d6d41634a0896f4f66824e3c08db41f
SHA12cecafd4fb390ed6e88d33c7d711586c87a1bfba
SHA2566b294d1436b99b1d0f9dbaef01d19d8cf1ead645b663001a293dd2c8e527bd88
SHA51200dc489956c7f7dc3f4d93eefd8285603bee4f06c60745defdcb915198f03c3c9cb9b22a6671217d7a190100105c20a7245070e8dee3d2f556480eceefc2c811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539d88644d7504497c74a3064bef25142
SHA192ce16ad67ea16955510afdbf8a8a96eef43fef9
SHA256801eaa1dfefc71c9fe22da94c7f8bea4e95fa97732f77751b1f619d1ff41afcd
SHA512a241f9afc090f67abcf6d911ae34a360bd4b74bfcd6b49ce3ce3b5c7c236a904723100082e506fd7d5f9eb99d90ac7e805c30a986c22a11acde88c5aad48209a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5615a683a8acf79a67fca39184ee7c340
SHA112db371ea4253f979182cc3bb287c3767de290c9
SHA256243f9f0506f6454c2b80fb32519ffd257c71422ac61a1d53a1e41293d71ce8ff
SHA512edc57bb0ebc71bcd3f0c044a6a1c46181a730d965777ffb07b1601795c28a3b2b5af3e8514b79c2cd1a9616d16520fc52bbeab111ce748a81293d91037e62bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515dbabf143e5c75a64c2031f3f0d3973
SHA10dbdf94777d00e7693918ec597aa8bb5c6254189
SHA25635715931f7abdf383c4262c5ef9f568b0b90cd9216ddc4df9a350ceb1d2cb0c2
SHA512c6a958fd409972be00a26e4bbcd239baf1f0c15fcf1cb742167d60e20bd0d68118686267b63939ad50fd50b1bcc3287e0a9b8ec68685525b33916cffaa0ee561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b059800973deaf4225934d17efbaf6
SHA15687e17ac93358b924638258cffa70e128c282f9
SHA2569326a2474eed89b133ed15ff5e56b78836cb378edfd2d4af6a27032fc0c8c318
SHA512faf7e0677115fcdbab0d2c0d515d4a0c15c03f2236daa13dfbcfbf8c1b193fb262669da819ecbc9fb6763b1542d1b1fec0a5d7b7cb00040ef94a6db514165ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5112f2c4761021acaf4d214312cf87e8f
SHA10ecbcda4b24fe7746d5456eddb03afce07d00482
SHA2565e31bdf9d4844048271a52fccb0136323bc428875e9ab99fe44e7a1527387f49
SHA51267dfa3c95b5aff4163e86623717b99893b09d799ab1dd6307eb8585100517cfbb6ae0aece255beb8d92f9fc8b627326484f2cba7aed1a3b50bcc2c6dfbd36fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f491a6b750af2fc0b5d877c8cc32708
SHA1f290f6708c61a05287a59281e4b7bf0f403d357e
SHA256ee191afbe2f20ffe6597ec25087d7bae2d054c89eb2ee1351dfaebb0b9037e78
SHA512db45d495fa6cd35c7efb10b893764ce1be4f1c9774025347a3bb16d2447605173cf5c9dc7ea994374860879b34d89b85417e242b01b42a2b24d27c21ff015106
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a