Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
413485c2e733502f5df80503422e4aed_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
413485c2e733502f5df80503422e4aed_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
413485c2e733502f5df80503422e4aed_JaffaCakes118.html
-
Size
461KB
-
MD5
413485c2e733502f5df80503422e4aed
-
SHA1
21db50b12ba8dfe6276cfea99f1a6f6988b89398
-
SHA256
204a850a3c800a81e2a245d7098f65b8756d0d795408eb8285a8d14c10c0ba9f
-
SHA512
1a378768c637dee654e26b9746c6290a8d5e3c95e27051330cd981d74490d9629e00fd5a463a64cee6e6a9fb3638a2a14030c2d3d86696a172ecb44e322d0122
-
SSDEEP
6144:S0sMYod+X3oI+YZsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3X5d+X3S5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006783c4cd759847acf8e0c1ba6153cf5cd2ba73415a7d0633f74672e42d0621f4000000000e8000000002000020000000dc6f05414d41bf6249530816c337fd19954c1da526e7fcc0cb867c1ef5c5137020000000c9997db3ab65a65c71a9faf951d9d793ec1aef7725a2d6abd1b237aea54250694000000011d4cbec38d9234043cdbd67a14f7f9bd25ff34d7db2e30548c6defb62da19c84529ea2bc54526eb90e8e94243c7d05c31775ecaf0518d2d3dd7b69f02042bde iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421845297" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D99BB941-11DE-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000008ce0e8e2375d6da6826d6ade6d1f3e40a31426e8561fb92f2824f4032dd844c0000000000e800000000200002000000088c81cd10075efaca81fb82b8a09882c873b3b024e667dc19863b98e4fa65a1a90000000a9f8d309b696149798533e78813eb753aac19d87dc410a9021567b636bf46011a7453d4a2cd5b967109390d06fdea47088999b760f246f8a116f23d180fcbf518c255265d58bb5b87c508f794b5041ea337d88a013667c32889cac2d17a61208734a087ce26b75118bf1abf55fb1e23d84faa073ce5ff226544268697b8bfd3450e38a9db88a8d8b5c5cdabde1c1410a40000000c4e64cf578937c19359e89792ef688f7f34c97715de294787156902eccd9da1a60be739070ebe2631f7723624591b2ea25b4fcb4725d9321d7138493a4bb2667 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05c06b2eba5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2512 2312 iexplore.exe 28 PID 2312 wrote to memory of 2512 2312 iexplore.exe 28 PID 2312 wrote to memory of 2512 2312 iexplore.exe 28 PID 2312 wrote to memory of 2512 2312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\413485c2e733502f5df80503422e4aed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c097c4c694711266767e0d98c79bf38
SHA1934bfe9080dde2b31af116e74004901bbc1ea5c8
SHA256e5bc7d484c62411d657385ae3580cea68282d123ea813c9a9c2d7117f4691d63
SHA5124b619051066cdd67ab9ad0183128f15c13a23a4439be773235d9003f8ae40b366456ab63c923178b891e93e9344e8e36db55dc4ed7b385f92740ec4dcf79b1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1072053d0c9778007c434aec5b25498
SHA1f9730cd90ad9b646c5149739cbea0fe950f83ddd
SHA2569c1f6d0cb439cf863f060aa29539f12c2c9ec717b58d2be8427133f155cc4189
SHA5128937b7d69d88634e945f3fc7f4751fe203d054cc059a2e19f82f1457c939c7a19d5256edff6d0f0ed5aebceeb1d9ed9d7caf93480c27832fef0e6e9c03c1ac05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d66c98ff4f186968fcbbcf6c6728eeb
SHA1b12dff74dea3a3ed0540374c85752f882283da94
SHA256d55b63c7d76bbcfc4f668c10e91475a05a35aa84b19554de08028c0745eda8a1
SHA512076c2225d0679959affc89eb806d1e4f250302a4bb47a31df3f0d14b04c10f908b7d2cb98f36839bbd62613a0c208ad78eee6d6ece8d27e17e36da2b71dfe60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be3e76c3c9d1d96a8e3119e0b5deef6
SHA1126494414590e73864834bd572dc9c35c25fc3cd
SHA25672a15874986d3f0bc6e0c948908409fec24ed6f5510729c99d253cb61c944e1e
SHA512e4339fa687fc882c1ff36725e7f9689160f2afdf8e6ecc4e333cc2c3bc13b9042fc9c5a4c5833538bf2a72156110dbe12039e07043f33d1075142c123ea4f11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571cc376458ea6decc37f0be9b143cc4a
SHA13892f079ea03284436f0627aa1e4a6fe3b254aaa
SHA2568bcf0387b985026bd0cee756d5f570dc36f6f5398006ee2d3c63be02020e6c0d
SHA5128a5b586b5a44cae2559bd4faf51fdcde88a122458354019f0559ca3e6ed6194b5359c68b45cf168efe7c3a871866106de0096d96aa3fcfed0bcdac72eb1ec081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5084a64bb121a33520493d9b26d65def4
SHA137a5918bc7d5da833ffa03470b02c84d9c791404
SHA2562183f0a87e01fc7f380b4cf50aee090eecfa149ecf00c6b8a1a88e387af2ec9b
SHA5124ca75530918fe5979a1a0c13ed416f3d0a6d202b3fe39f511eebc15ad71689a34a04483376cf266af87cffe7d7e96b0a073a41c695dcc01b0722c6ac85167398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd02501581902e9d23f41de74fe79f3
SHA1b1fcb64f6d603944fad6c8d8d7de61eb46e8c7ce
SHA256ab2c5433a73c2bdd0336c5babd27218d6df24abd6776fba3bf70ae5157fb4381
SHA512259250552021f7817b199aa5e915d4f7335b83e486a93aaa761bad7564db9317eba88524a988a78e6a12ed55762f038ba1e9e15fbaaec3593b5c01acde960c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5738ad99710a46f0f01da6ea2328bb6c0
SHA1155c5838d1b9a7816998901405eedac378a4e59b
SHA2560366b6b73682003053d4a86c2c92cb0cd4abb5617e0df97943654c4999bf0e7f
SHA5127dbe208eeffa9789d7adaa9cdf57fcefb6c54f887ab3334710653ef83ed24f3339f899c16c20790cf9b1661e8796338bd19587ee5131c95a9eaefa66595d0586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c881920fec3f0d1c79406e5f71d52147
SHA13e53b0b71ea086a4362bee84cd465fe93a61d5f0
SHA256e094b37ab3c5441112abefcdebe1fd672cd6d04b2ce6e1d10ff52c47bdbf3bb9
SHA512c9bdbf0e195b6ee69878e85eebbedab0cbd47f32db47f6ba48d610697e7e1e658e6469a2a63afea692df494a42c00db68b6159c561f2c912f87f3ca2f1a48689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54643d967c670d8c6a653fa59159d60e0
SHA144feb51971a7a62f252e5c0b6c5454e5deb36677
SHA256b8111729e6b759a5a8d2f81a31529ba000783a590f19e22528e5bc6f8173a32d
SHA512c3b23770162870201da48afb06c7148588e9ab048639447877001e56506542fb0761ab4d5e52f1604534776a307763cb80d4375a910b3ffe368ff58a118d9a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee6411ece8f90e64b5914def7abbeb4e
SHA15175a15b67761d02237f692f982cf26245f4f6a4
SHA25669e5ccf4b3ff6f4f4bc1e2d462daf79cc74c348de83313dcf2f3686d4c9e418b
SHA512d6055b0c4a9478d489dcc8e5d58741d3f633e3db8e0c9b54b936c7131655076fa7b8ef361ba3602067d97cc45a9ef64c87b3db18f8aa2ada19e08ba8b9b6eeda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcbb2a8e40082cade3d760e83672bebe
SHA15a1c0cac2fe431a2282e31e7792ce0c54e611f87
SHA2567e1d331620224749b86740a855e7dde54ead3cb02082e020e0700c66f12d3785
SHA512bfbf47b46bf13e04e1934448eb07207f03e8aebfb2c659e596c4bd6df3d2e70b5b4d2b60629abe8f9d8c6d8af22a4540118f8d4726711196c887fae9f11f0ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528809ad62f7d2e381eebd11cc9791fc8
SHA135dd4be77d6d77b8b7d8c1180225853294188dbe
SHA2563f7c82782628c26f48d75934a136fbda08146e45ffa5bf14b2f5f40ab67f1642
SHA512aaf0e5869b6947c24f6dac37754fc317d2e5b5e5bef8759bdcb7a81983c046ecdceb95e3882a053bd58d4957ef86c3e4a4edd6304912a582698655c018975afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29d8bc472829a3d2f918ec616bf4b6d
SHA12d4f8c73fe04e512ae2a3d07fe81d1da5984a9d5
SHA256643268c242e4f454150864e041cd6744778406276682838b8322863eadd11b8d
SHA51248179d18453e47083b9e43229f2a2809319cb4bfcebfb0cb39b82c73c58496f4fe0c96ded1a5cf08e04eab9b57f7b8a4bd13cf364c1e7391addd19227010e4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde61aa222f0e401ff0fab821344b9c1
SHA1695b18d10f52257e46f651e88fd18054247e921b
SHA2568b5750337a2b343c4b8c78dbf4c5826076681018395786d0a39cc02b9faba1c7
SHA51270d760b18dd5f42ad3e4030ed6951ea4d88252775a54727b9af1607e17f7191cf317ffdfee73b5b7dba57559c4e7c5f41f862ceffc3875cbecb5f6b29616cc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adeed149c07f29b30d4b7f3961891d63
SHA1f62687de7f78b7c54ca8daa59e8cc3cf655ebfda
SHA2561c722419fa208ada3bca0f3b570e6fa150b3838b8c5c6d8b1b72e1acf1b8fefd
SHA5129d611286d02e5bb81c567c6e26316f8261c75f5020d837d491363ba98a270039e49a763069429025272cd98bf816486308836fa95076fd7d505bed77ead1d0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e03c9493038cdf0ecf12b703bd69228
SHA154895f146e1f94041275614a4023793234a3b537
SHA256100bc2cbb797f035520e1afd65f98703ff0c1c4c682be19c0a813b241d1c037c
SHA512b9025c66988ca89936a4329615900cedd5808c73c0c19d53295b41d5c89c1c4de75f823199970bec4a26c7d5571b2584b1156fcc1fe2a28ff4d1d0747900b394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bdc702760ba23e1217adc3a8ef46ad2
SHA11af47fe2ed3b099ca9d64bbad645e61c8d81ee1e
SHA2565c7a288fb43e72cb4ef46a42ab638304d08b0e525ddeed97b93053abbc50a4e6
SHA5127d8a9e378c0e76b12519b81ce1a648b7bf9293f908191d976a51a0a91ab2b82efe9bf3ceec86ac296e5bad03b8ddd46ed9188a0a4cf9a978cc410bcc542ad55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a95c6fb853ba06a78dc3a0fd3a34381
SHA175ae11d959978c032349e30360b646ad61f72e8b
SHA25608aa25b9f53421d3a68bc90ce24f5d48f73dcb2a76a54922ec01840f30e1100e
SHA512074cc5ecf844bcfd231ad52891e1abb17628bcf0cf1cfb12e78439fead4152ea2482ad40a28762464b4138951a81c61b4d9c517c3ba8b979f1c1f4103c06e60c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a