Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
63ab89ead6ce05cd321d70da26af2e44_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63ab89ead6ce05cd321d70da26af2e44_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63ab89ead6ce05cd321d70da26af2e44_JaffaCakes118.html
-
Size
35KB
-
MD5
63ab89ead6ce05cd321d70da26af2e44
-
SHA1
924c7f447f1efadfae1d86b250d122c670d514c5
-
SHA256
370460a0e7051c7b9a95968b3645d4cc4e2d9def62f555e4408341d640eb9926
-
SHA512
72077a4ac8c805e3272190ac8bde8e158f61014b56d658300684ca3d8ac4efe0dbcd5f93c8b7386afab7b9d4484aee58a8a181de6bfa2d0b580afc0e7e0a3f6d
-
SSDEEP
768:bNYF4fiZV0p7qhBphEts2ge+APd2tSOaa9BUhuMjyZbX:bNYF4fiZV0p7qhB3Ets2ndMTjMuMjyZD
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422464660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d899bf8dabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EABAE3C1-1780-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c9b92f3baebd6d44b91efa788dab680c00000000020000000000106600000001000020000000145d0e6070a561f5f3559387328f6693a87595a596b8b7354c4a0ae560b396ee000000000e80000000020000200000000b312ea644eca20f7c63de12295141920018ff743156ed5d56c3b0d3257ad7b4200000004c68940380c3476e53c0bda9c1ca111b67fbd5c3bfea7633d4103d395f407514400000009f70e0a90fb6ef7f6920a61f45ba6fecd1070b10584ede8395f431d1f0bac046bd543c739e320682fab68d817dc4f2deb9910c83b37795c063442e646bf9fb70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2068 iexplore.exe 2068 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2068 wrote to memory of 2384 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 2384 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 2384 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 2384 2068 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ab89ead6ce05cd321d70da26af2e44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eba37bc81dcf4aa685688aed29f0133
SHA1fdfa09bfa10be592e5213722b55669704bdeb5f0
SHA256b66e6fe192d4d1a06939adfd4240badb092b89681c8b1b3b412902875c459fb9
SHA51217327c9e3570f3ce2da3c3140256ae39b6cf537b801f2bb08d9d59f33219e08ec1c6d1e1b873b8a5cde0c0319b247534dd9990affce6ad7e687bdfdfbc2fab64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c45026b01d055c4a97c3464ec41232d
SHA1ec1eaf35b1fdd22e262e4f96fc8133018d7ef58a
SHA256401d751b56ab7c52587bbe72ca1f1c5b095b1cef8bd375c4f7e8e6fe099dad48
SHA512ad7d86c3e898bc919220bd71e513f135b1947ec2d4bc3f886f9eff7eea015c9c4c58533b88653ba53df9f4e918ebf24831c2a4d221d4c87cd1858595e6dc92b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5764c4b685c6fde0fd102d87d50d6bf03
SHA1af011f961ecac5cd094e791c42160b2a7627dfff
SHA256c9c6152c15183fef1a9a0cc1a18edea8375e366a61c66a812500955b17753d0c
SHA51233eab867084570b2b955049f9595737d1fad1596f1130582645c4ace2cd53508dc5af2299dd140e11262699ac0d980aa6282c76b9169f3c21a0f270b55648ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714b2e6fe4d3455c1b12f989f65cff42
SHA16508c505b887d5242915d05b9199c4b5bee2f540
SHA256667dc89167c58eba0f85ba4b58a1229069ee0b30a5c0e0f75c61a914dd57cad5
SHA512b2110dd94e1af410c9886b05bdcfce30c7c31f380f44a620d13ed948e7e2b4e51166c6dd7d77b6e94da3c71973fdfd3e72ea59a861a8e08d898c5659f7943364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a4fd34ac02b6418937b8c271a85b8c
SHA14ef9dc3f00e0538822c763d97e16fe2b3059e514
SHA256055df4e512738f9a120e52d12235671e0123d3142840cece682ecad095af2c1d
SHA51277882f69ba816686d6a777af483b6847d7794d708a02a058f24ee96672f39d529a6f8ead1838e6f1fd26359595925238b8f2695306926f55bcc2b10075dc6c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1a11582d93d3c3aad426fb238501b8
SHA1b92961b018e3f77fe563793fc307b075b863fc18
SHA25647e41b241a29ed78a2e525cf0a5f7e19993dfd8845a7b9dd80305b47f5e4b705
SHA512fcf444a949d025cf15aa77df2ad7e9e77b523bb0611814729ec7301c96a9c786613b25068bb8e53ace26000bceb52a5017ff5d810b31cac30babae358bce8a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd990e7aadad76da5c32a760cbe9a0b
SHA1c83d92218e92e0e0b4677f46f2dfc2b69bdf2ef2
SHA256deb4d8c2dff151bd8b42c34b8bdaba9aa2b1fd7ec2f01f99f14b62a94b6432b1
SHA512b17b7a64815f1c75d3b4e3d4e1ec4ea92c03e754502ce5a16b94b7571a721439a54f35d34a7f5cbc7b2c894ec9a149b368a15075c3b1a6e6383b9b8dbe343d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7cc1ac501da7c4ed45dd70cd711ed8
SHA1a55946f0349084ea49c4cb1531c9ac332eabfe53
SHA2560ef0560822d7924515f94aecac689880f7d787b23c444f967379079adaf8708b
SHA51251be8b5d2c7e44d807aeb37e8fd1861c09cff509b2df8db932b77c65a2088a75b69a4bed12452751eecc8a74b136b3a4afa69a9b0b43e264c0edd9b76afa2f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aca68e34fdcaa9e456dc738e9dd605b9
SHA1940da7dc630061a918867169ceae88ff34688a07
SHA256897a692400866771e57be91b5a633c396d5b2a6de265ecf42a04d45b3e014876
SHA5125535c015b6895567edced1f18a3db828761d42aca1565a7d21843ed11428df3428ce2e05964df912bcaad437c0ed94ec6e511866d1a2ff1628729f08d4d744f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840fb1ce124be5f4f0a0099fe34c1f92
SHA114cd89b34014002a632e84cbaf62b3b78436f450
SHA256e6246ab9f191e4c3a0a8f5b1fd28fb19bbe074f50252a31f6c118168cc97b701
SHA51292303c8a07405d8105f0376a5fb1ca319e6c2ffc26cb437068455c1484cdda79435847d9bc2fbb8f3ca058a09c9a3eeaa0fee73400519e66946f92ff9b3db585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567288982b9cb29c3af7ee95c7c35658d
SHA11da07155d270c80c0cb66a7b3cb7e6dae70761ce
SHA2565e68c628a0cdbfb4ee0f4c886c4878f182a7af6e041705e59c275b44c07bfd29
SHA512c8bbf6f70378ff1f6e686db0fbb0f5efaaf037098a10024dd2e9302904f9bf1beb196a8b708c5c3692ed2f4dfabd89c89030ca632918a66338655daa08964d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559279561bbf799b5cd0217175111773e
SHA15873e683c94fa58d471c492c2d1a36c8183b504f
SHA256b4dfabfeac99c85734523808ef422958f83625e27d61ec8dd7f5e63d06acb948
SHA5121b671576cbe8d5d673aed6f2bc2d9949285d8798e9f83ab6093ad9513b208b23b3042abff7d8ea33eaae0ec0467061e3503ad6b268c492a0a5fc691d6cd3ae67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94b2aa4fed8ab7f4fa76b740c8741a0
SHA10b839f07e166edb80669293af6cc6bc5e62ec399
SHA256fa211c3d0ff0b7a9fdb16cf534f5fc1538853c8587f346856f9bdca59ccf5248
SHA512618842d1c2441eacb8aa4947e215064f7f820672b988b917b8921af43e455ba624871c116fc746453f67ebbcd918902b701dda525bb70433a454ab8e00f6599a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3dfb2afffab7fa1b9d4ae77b871d5f6
SHA1712bc231f5e5fe80e581df75556c1e8254815442
SHA256083ffb2e3864dfc7454ab710390ac886355f681fd46633be5a035e6089b95081
SHA51276bed5d2e7bb8c3253350191c24ad96425cd221ce2c23749dea10faaa781073b66f10d333b3e9fd118df4f6cc022beb06ac3515a22fd0fb95baa1a0dabc4fa7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fc2389f2647f9702128817a5e3ecba4
SHA1249054cc21d36ce0f44e0e049ac3aa75f4923552
SHA2562a6deda88139bdaa0d0e89a3d7902e0f55dfd65073c5a43879d9974e21fcf13c
SHA512bb485d6c62fe500c4601fea10d635f7c5f1e26df0a8c6e53b15510a2c8330eb6df3d40851468ff7552f8c9bc7866a8d37951c75c5b61f30f69d4e3fedaf712c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f0e8a551cc17f9c9dc648e16bb9d5f4
SHA15c8c9b091413c776f688d5870df56b386903afe7
SHA2562ca0a85049556a453155994f7f8be0484b26c727e816228187cd732407babe36
SHA512f6152af50b63c330859d42fc963ddb663277fd9308252c53d973d9a62012fe56260fd1076189b274f1f9760df824e4dd224423b169174de2a6a10f4a487f52ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd676ee3655f997f411b9de3024f68f
SHA1b09b8733ce2b6ae497000795c228c3f7d486963d
SHA2560bde9175c5eda2e02ee3da971cb0a3244654a5710db00a1543236b4032a67b69
SHA512c59135395c4bea4d1dce8f5a15bc65b1359c355d169ddf8a9ffce2d486a34c8271f4ed3eb5636c1b8bb85089ff39929f555df627b95287c6d726303cea3a52a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6a7c3eadc4eab1ba2cc4f7779716196
SHA190c219239659baa6275fb606592ce528a070d359
SHA2564679716c27572bb9a917cd97f6b94f61d400832372e9203573bfb082ffe99bbd
SHA512795a3bbc7bbb54ec18ea63c398370b203d631683141c5f5af8e0d86dd8aeb2ab592c3ee26483545fb33b27b7b2ac94ead1426117be365329ef068b6512da9431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3170960d2a91ecfd187121a8abb065e
SHA1fcbc226bdb9d36bdbfc673aa3ada209d83253c88
SHA2562e4f051b0b228fc0257fd0b966fe865290a2612dbe6f1142bbdea4e4c77e769f
SHA512ead19987a9a60884330bc2e7bd043b9410eb79271d45489c9b241d27753c95a3ebb3c1d5004762d55003d9108a9356380b7a2028a34eab3903d2b01dfa96c26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e101715981c795960bc6860a13a46475
SHA19f4071e055d76f93d17001f9db2d278f13a1aaae
SHA256ebe20e1f72a14e654dc2398a047ba16efd8dca7383611387a109500b61e1e73b
SHA51251058ddcec5c3fb509c2520cbc70cc1d765a94a9e78616201560f6a54eafd39a5ee970a7db0f16c2d59ae86a32102f20d16cbcab29cde317d3f3811f5cf952dd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a