Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html
-
Size
68KB
-
MD5
458081a206a0c5f465cf2ec0919e45d8
-
SHA1
d02f6ce36417d067ef7f60ca5a64eb413e492faa
-
SHA256
c721ce5143ed9fb1d44c9ac5085a3b3ae6e279a1a938779dd3aac12fd21834ac
-
SHA512
127bffc9d1cc7ae378a81c5c5ced2f5afbe89e71c52205b5ad62aac1e93a970516c8c1be258c591cecbfc26e5b8c7c89d10bbb8adf025ae38cadfa1ff6d4e9e6
-
SSDEEP
384:hdvXw4BMrkOjOORX3obvuqAbO/DiS/Mf8PypfcMzRWgJOca0j2rwktNnW:A4CN36vuqAbO/V/Q8PjYWmOy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00b7b39a9a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421926692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000029f8ed9957d3e88dedbdc8faf1fc4b5c0e9582cb5175040736b9cb99b520d03b000000000e80000000020000200000002af3d06c0b212fad49c753a0d1d79c66963ebb9708bcdfb0b712a51509c7c2cc20000000192eae54bc07c3e395961017f476304bc9e8e9bafa12d9602ab4afbb6f17856a4000000041c05031854cdf060e62a0ea00d91b9b7d6ae9ddb96c0964c7e1cdbac228ef3add33f5edc1ace09cc7c5a8f47fa35b4f3bd33202df23aca89476e96c6edf99ff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CD3B071-129C-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa485ca1da73a01c5d305fee4f41670
SHA14fd44433224ea49d9f8a552c3456dc59198c600b
SHA256db6b0dac2b987c96455ae99dd4b6e547b3db9ea7ce2f5a68bef1c9dd5fab037f
SHA512fda4c7a89487b357965eada8f38c48efb8aebbf5c067718def0724b705acd1dc07a79ce2344112e63c072d3030035f80fc197ef4f2397fe850dd17ff1766b443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a023c53b15c18270966a4afa51999248
SHA1791c1d5ecc5abe4df0c86b42454118482b0da804
SHA256a9c9e8359d2647a4c435dade52acb7a69a10b965c5d477437b29c52f70bdaf03
SHA512872a67859df3fd2d78b4010e4483f78986622abc00e0e14c410a038723ae04f72ee73d67891c73bddf4930e06281180d1e9d4f3852da3375965a6fd6f9db9d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f19090962aec3e120828b5c293ddf8f4
SHA1d9f80c359108fa5d5799d30f333cf163dddcc408
SHA256b7e53e2cb4136fba7451eea8c1bc29ab46093f740adbdf48a5c264437f278255
SHA512e92addb1e7ebe64cefd187b58513301117048240373fb0869b49ef0e3a3d165c3c8c6b04cca1911038d97819ca90f8abfab2abbd8efa6ce5af339cc330e20c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fedb8714b29e990f8672cc98db04b70
SHA168c88abd42a20fc4492f59d8e7a536fb46121d0f
SHA256ae6ba2fe2bce75a79624078190df7cb6b929073a34e5e110eceb3a5ce7889a05
SHA5122a9b67f6d884e1629cd2d445d016bec82619b6eef716750b440d50ae4806342e7fd20d40c477e2e381213e28139b3b2e850be45912b0ed7d652f435f02c1d45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f509e09e05c65bfc4332bbba7ffd9b12
SHA11609dc139a009d17230ad35709c1fe913cf28f20
SHA25611ef0f2a90c70ed8e0a5a4d6c544422b958d8498946947feabcf475c1e7fdb62
SHA51258d616172a686f4d7aa573974bee4dd93eaf76a0cd8a460cd083c6ed6d64f59e04b4f2ff66e7e3e7821982f1ea2c2050bf1f05254c9d3907b09d81343164fb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de20c49468253f26f05c947b569423b
SHA12c4ce398ec22ef1f4ff2d45a3f293272b19546b7
SHA256c67583242a0323e1d5ec45639a03927369bfcc31632401d99a2e46e48ca4808e
SHA512f4f51d7d2e4d57b3f5d97908a88b3c62e1700d552bbe41d643ccf2ad1f3c9b3c5d4afe810207fb8b5f66de8633137d0bee1bdbb78cd732c761b1ab83715cb67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522fbf677341b9c61572f3994c65313e
SHA119a0ae386ac7d252bdae7482422cb3fd89739496
SHA256f643020e0e33cb2776904e9d161b1b024c7cdab09da029f4b8c66abc104be5a3
SHA512cd981fa6be6e9f6ed0c82f5aee9c75f6e00a4ba4002fffd28c23b064176215b514dff82f1419a90979b5c4025be363ae1dedb7882d43016d800201cac656f709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a126e039d6a00b3e7c46719c81c59ba
SHA144f9ecee5f5fee874c29d1c568a07d00ce796b54
SHA256a80dbe929c3391b60eff1ca38e74871fdd561fe69674f851e5e01900d02a90aa
SHA512789101e8c1caf7a2c3ab6d28ecdfc5be677a83663430da5f8947c1c12291466ef38a977c7b737ad70702afbb95086ab6c6dec306f64a01cc078f3835f32a0ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb12d2ea2552d45586aadde99efec321
SHA1fa8ad30ed24145de8e506761a4dddb9d967df5c2
SHA25608085d96e7a66206ecb7ce6e329ca86fc11bd5f22f3526fee628ecdff603c7f5
SHA5121f9037fd12c7230ce5a867b8d2e3fb5553871a68484424c2fefcf223f9c81bbb073e4c631c48bd25350017fd49f521fd93de1355af8f23a99f2c9f1477042442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c629560510c77faab72268efac9f23
SHA1244d960f0779419c5c79352329f7e9c5601768ad
SHA256a5a0d396a60ae8fdacd06d1d2a1eac6bccfe7476e4be911552ac9ca8471a267e
SHA512bace67e57d3ba6320693ec97fe577a80359f1f99eb14d2bdabd7134a7f27e21aa3d641cb36d206ecce80d388f601456ca0b204031c4f145943261499c104d0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56160fa46c04904f20f8eab54f8e463
SHA1e5295adb40724a3bb2b027200c7d82421741c296
SHA256ae5665f0d9b223df9211afd98818a5738043aa6eb2e6a7cfd949500c84dd37c1
SHA512d5f80adc3b51297a4bd57bd5c9a7af17c3a4044e2898711a1441974a4ee904105363a423234183fe075089373eca311ecac63f4981a9931e00b25654292a5815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfbc67aec4711a779355ec6b61b4de1c
SHA11e90071432551e153f0352b1065566518f0194d0
SHA2564e6f4a7485f12cee9f15a4a92d54d70af1bbb6f75c835a086ae048b06ae8aecf
SHA5123a020109ef25a5b09ae5d450936fea1bf7d811ef09b15e135171c79516609ae23178eeace05293e723156ee12d7552ac194989b0f8e3f2fa097605ff0a79b20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec006824a768981a1375866a3205e79
SHA197f84415640abc04922236ee9168e5a43a7b51c9
SHA256b0040cd8a4e531b903d92d772df8b96894f3519fdff9c491a1d1b56549e86042
SHA51201908b649c70d2d5f6dec85786fbaf8301a8f763f2e04c8ce2775e5ada093889bcdc240ef24175e29e564ca5521f5ac7faa46186e5f1fc78b99570ab4da98bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260b37a90bf298bbd47e66fc2fae531e
SHA176967cb06278f53a8686da734505031318dcf667
SHA256c0627d709ebe4ee3335739039bd9eb915845d3d42eebe3a84c1f3aafaf4b9b77
SHA5129a116e13b483e2d8adfa32d2b02018c3c06d7cccdf148a64ec47686b8b1cf439c39bb154196b284c2a04c3fef93dc81516549c2b9385a39c3de1ac7d05b95322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0f94d6e0dd3da22758f66817f63a0c
SHA1c3525e1097dc6ffa45422fa5b0e9c01ef10edfbd
SHA256decac65beed12a1b0c1b0b1e4ffab3ad6ad7eb1633ed88fa0315e470a35e1ca1
SHA5121fa728deb23fe96063da8bfa2e74d19ce56e9f1ab6d0e97e55eac8b1d19a5a0e217c9883e5631340073d8917cdd7a9a9ca40dfbb33619cf7d7662fd680ff3c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db441ca2073e47db1438c90d5ddff013
SHA194e03a819952c81bb5af2ee0310adb28a079f7e3
SHA25607398d95c5f08ec19890a8cf466d09dcf69b3d76550bf51bc888ab75257298e9
SHA5122e741b74c5effdbb641ce62faaf4b85e5885ed23845b44f946c7de16928073d6a22b6ee8421ccc76a7694ff0284a663b3e98cf45ebab4191c726e582ba59787c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a875e6d5743bf9915cbbe1acf3e4b771
SHA178237d0f6041426f60f5a165078b2b2a5459b3ea
SHA25612038027fa555ba70da4232b911d8855ab9f3fa73d4cd5de2a783b1a9c56fc7f
SHA5128bd2ceeeb63933e2b640a7f604873f821d7d4f8b8c5052254934352704df0b6d9456d9e8ffce0059e3315a2542d5117b055548ba2dc983301165208df8abed67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d50e08f77ced9fdfdd7c25043968f392
SHA1135362ea30aef8d7759309e69cea9d4d574283a8
SHA2565c69dae06c8e6ad43db6b07edb066ff058ba1f9adcadf4a0e0bed48ab20d339c
SHA512ffe1205eb14020497a774f733816a8157f6e01b33ae496a7c511fc14f40784da93754d31ee8ae38c3d7f4bef88deeb74742a5d9554d1d82c9a64ec6884823545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1251341f95247482b8e2fd4fc63551
SHA162a86d1353f3f80079fd2ec995db0caf28be4421
SHA25671e4b5dfe238d784d1b67cf31d31230d17d56a784d68cbd6ffb584bb5a2e60f9
SHA512db0ce5bde869287a56f20853a68f335016349c6156ceead449d1e864d15ab8c450924fcffbfc385c17d09a3a3d37051cc67b0fb39d06e8cd328b19618cbfcb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8396b88561b6df69c7835f57ddc4c2a
SHA1588bf1b3974f350cd0672fdec0cf3d554d9bdc1d
SHA256dbd73410eddd2d0d2a8b37f1af965fb9f915ff43d2d0e3e0b59167078787ef04
SHA512db5588057e23a228d77c5ae4de29546979622c1fbed7e1ad995f2ba6ed5d67eee4a5375bb30ad3ac5d63741749d374aea2a9d83933632638d1c8a4202f5a0a9a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\system[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a