Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
63d56daf01f16660b6b434cb186a33f6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d56daf01f16660b6b434cb186a33f6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d56daf01f16660b6b434cb186a33f6_JaffaCakes118.html
-
Size
69KB
-
MD5
63d56daf01f16660b6b434cb186a33f6
-
SHA1
25ab31925cdc624ad9f221ebd26b6098648a39d9
-
SHA256
71f18fe6ee5535ec9909fcc3333dce68fdceae9a075abd867c151dfcf0b6a44d
-
SHA512
3686b78ce4cd983b593b21c6e3630c8aab6e9632082b24ad6f881a95a2165d3285624322eb9eed29c1e71925dec4a96a621e717295a8292c5eebbb885a69eaa2
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6so6hL9eFiHoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J3VsnTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{121948A1-1789-11EF-9988-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f022d4e695abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422468163" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000755e6eade86cd47abfcef2c02e39e95000000000200000000001066000000010000200000009f6013882702d463bafd3307cc36490e62d7e193bf8500dd70343d38e5318287000000000e800000000200002000000081cb011843d29f239a017e2c7ffc95c317363582f81c3a62dd8567ad37b68be320000000346fff1f207523c7b5e783cc727a6ac0cee05c8d43332f5240d1ef3febbe2ddb400000001efced7422fde6d53c55661b91f9965649c7652c88562d590bafb9669c8d7e6bea0753699e726577f6f33eab1be24a61550523b5db00764cbc9f8bc924cf81de iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2172 iexplore.exe 2172 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2172 wrote to memory of 2532 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2532 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2532 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2532 2172 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d56daf01f16660b6b434cb186a33f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c126caae55b70167c0c91642b25e1d
SHA17c7488ebababbb8fcdd11c4516f458b79282317e
SHA25688d68e2e2bd73bbb0dbef5d7f003a4992fa1e8f3b5788d6beeb923212f07c6ac
SHA512edbce780a85570df32ed312594f08d8851b605807eba2d6c67d7ef591f90c3a127794e4d34639cd0106566302e15c463228fae727629cf08cba05951376eea15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550b7943247632403d4bab304da4c36eb
SHA1cc5d0718d828d54c157cb8319ff31621b075f516
SHA256182460bbd7de6e04cb9d49dd2c93d44744c6284ab58ff3e7579fe2f44b1ab211
SHA512cb50eef9b4fd43ff2962a4b4f7de00cce915722222ec3c05cee4670b841bb8a7eb4f8cf96efdbded8dafd28ee999c5e438f3ab46eeccf54ea664820fbdc42711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564ee18a17ca6023782337948440effa1
SHA1190650d7faa1055437c6b0943aaabf843fca7fde
SHA2560b2d056dd5abe43e18d5e2d65ccbae1bb483ba9ad4f5996c609b6c3f4612390f
SHA512849272d67b3e27230ca26323ba9df6d46076c3a2775d49573e559a42c67f9154bf8e70f90733263799a8f0d929c87bbaacaf254e326e8681c2def81c6ae9d543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ed9d6150185e44043f9e3e9f114c23
SHA11d522b7ab1c475c1c0f81d519bc00cfc72d2a129
SHA2569dafdf160e634e529ba3987d08090d1fb757e7d7d276e5f9871bd4b81bdae31b
SHA51223660108db9c6f237cec1f58103a393f3295b0775fad95bdaa336821138d32ea512f8cee9a1666483a54c8c494cd51ecf2c0d5ab18d69d6d3ad72eb24dc77ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d83fe5bca2a879f194dbd927fd12ba64
SHA1aa1be3722d6c352612d78850677d1a40f42c015e
SHA25601661835317d38bc7d24ce92babffa9bb390f739bfa45db765632809b2a26218
SHA5124ab1e694df03f6566c930c932a16423b9f044ecec7f72ba99f144e5e1d1b2192956d84fb098897eda3bbff762ad365c8664b8ee7fd912aab2076fc5bea45dfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59691f20f0d6a208d08a86fca28759632
SHA1ef08238262b8bf9d2a2f11fd34b4feccc476fac1
SHA256c7d5e09e139d03290c338a6305b6447182b550f9e75e666adc64bd47505c1404
SHA512004e5346a2d0a57c767578b0ed0dd62e413b494c3c3b46016d27a47c0b3326398745e46de69975aa8dea0d49eb0c9eab698adb70f7b27b6caa962181e450c724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55459768a6b9165751e81f9573a1c9833
SHA1944c5155f071b682ded8bb78330a1d63fc2b34f7
SHA2565dea7d9737913591384a1e387d53914872fab3b315a5c0a067ac5e6dec7e438b
SHA5120ecd140a394f6819e83affcc8486d91e87cafea611998eabf5cf977ed4d957c85afa3f368c4a8563dbd50c900b90a9fe7e87ab9a53ede869a9b8880897249a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be398d7bc9b7e5ce4085637ea1296b0f
SHA19a8f2fa33fd4e139b5da3268ea515ada8dee8db2
SHA256e60852216393b2b5f3d03874480eba39faf1a15fa71cbe4dd35f08079ecba97a
SHA51291cd70c19abf0ce847e82a6e10887f385934dc4cc75fcddedc1e2b3bd0c647b20df34b22fbefce53a4085c995b9ae1c4863236ce53efa72a8240eee52daa2248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a21f28e29a52af50b0a5936268cfe3e
SHA1f7fb2a3c3afee095b905097788083666d1bb492c
SHA2560f0cc3fb29b6ba24b1d39285017d1988c4f668dec79b47c55c34740ea31f0555
SHA5126fabe2dd703bd3c8dd1e249947d9bd2373d5bd10d22ee9ec3e5e54e53731aee7d163880d6c399de8e6b8c5c95cc89ff9c1a12b0390b3f09838d7e93eb59b598c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598088a9d34ac366ba23a54b66e95f082
SHA1aa35b111d4c3f074ddab7f29653deda251eb1cea
SHA256f1ac9571d06417cf4fbba8de22fa889a2ff1d532819cfe10b070066bd5a0dfc4
SHA512296b229f1bf143d09fa2ab06c880c8379d85747bb7239ec2a05047a488634d2c74892549aee7c465202315cd07ef716ab07a63bbbda3da0efc177417a70072a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558ef571001e19b6a9f6a0a34d928872e
SHA1c6892ec0870940ae65a1f6cb440cf77fbcf18ac5
SHA25667ff1dd956a9276a4d8c95733e83fa4ecb7bbeb86399b4df1353adcc57536c34
SHA5129229652bce0d2b67d212b1aa02d410da73a58982b5a0cd6b59d1622bbee2a7672f0489cb990d623a706b2c31fefe5236dd8a3560c334014d029360745e02dbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569db8dae94016486e43403f7235c4d02
SHA1d2a35ae4c923632ac58ff8f9073fc90b051a76f4
SHA256c8b98c0b17698e01c9cbbd34e811fbe10207f61c9cf625f126c9d7dbc49396b5
SHA51285d171681759017bd06c52754b4c58cd194e5942beb2a005d422157acd06c29d5e1cbc3b6a9815c2096665dea8092cc4a122e445c28b41f48bc04da60cbc4c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3816e3dc18f8d57f161cd8d00c4b92
SHA10463c593c179466a6a0cd44742b3b804623e05a3
SHA256311dfa34383c52b12b505d66e0e0e4212d120f8b0964d5f1640b55a45979c7c4
SHA512e72d2c56f534279beebaf34741e8231844b59c94b943e1f716be5bd2ee6b4da48098d8f8f59906fac90230fc6f650fc71b9247449e31b98a211f2b761d06db23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e256668406cb691cc7138264f7417b9
SHA109c9ec7a292710aae9a28c48a28ae568f776a4a6
SHA25664b2729d4e8e647b0d41db5779449b0f50eacd4f9c93eab47b717af8c6a24e74
SHA512c06b9761f31a166d775b8319f3543243b04f5f7a184d982f0f69baee36f389c028b93238f968b5477f42592e589078f69ffb259bb1224091b5eb7c793a28bad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5992202c26d4e43ceb9a796a66bbdc01a
SHA16f743e0c8594fb8c3376fdd063c188a80d224767
SHA2567740935b453f6c8727611e508204e9a7f9c0826579f0c53792f9ecef999a75ba
SHA5129361785fb4237e0905cf3aaed3a94aa9feb85af44e7f931753e9352ecd7cf5fd49fb4d7f46317a0e141ffac28db883071705238fe1c7c69deff906c36ea95229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca137679f4647696d7bb200f487db20c
SHA17bf5612d44ee33e512bf6b295452f1394f6925ca
SHA2566cc96a1db8341cc02c5ae338f512c684c1dbac8a91060f96c15bac0a20f8e7d3
SHA5127cbdb8dbf8c5d6380506a2fc16e926def4704fbbe4e8502bef5c24925e7f838037fcb61a807b84431c0802935e7c77bb8b88821162b8baf0144170293c7f75d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49aa6d3a4c844e8d6c7d5f2912635dc
SHA1ea4126ec517469e175e688f2a0734c8540c960ad
SHA25633863ba17e2babd6e6cdf128fa4f5aa668daf5323fc18a8eebfbec05a24de0af
SHA51226a54507afb4dab159b08f72b180bc724e4dc5f4e820507adcca2e2d5e13050a06037fa5f7b9efb622fdecbf0c91c1dc9092dad57b5a7ebf0869bb5ee244aa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a84e6edf4e1c60131482371ef15153e
SHA18bf9c268f80a3c9ae08f3e4c2e25c9d28aa3bc66
SHA256f8df9547b04653c915f4d68644b7adb43256a7b2ace37e4dd368637dc5bfb652
SHA512841ba4c79ddc9b994294d575b334e384fd4737f4878f4621646c91da8c1c4f0e12ae417937d5e3c812e077918f065a218588c11baab2bd09d94ea58005e5a55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575f34294438cc80405cc7ca988129b2d
SHA1561e12ff2a0d1ee8c9ab6f5477276e0714bd7cc9
SHA256d68ebd7c1fcd9c21a2b0d0951549321c3197146f3d5d5b01038ebaebe1fe4cf3
SHA5128855fff30ca3a1ae2b8f03bdef6c9c00736e28cf0107eae5ae8e86c9ee21e17518ed01b048caf6d99f538d131f42058605a4a75e560bea16d734e3a199808e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab02c3d5264cce737e73abce87dd0dcf
SHA1dc8b7db80828eeef6f6f01c8a1482202cd2a0b36
SHA256b436aecf593d4e411f9100569f25520b299350d803d97f97008e2e71f678cdc0
SHA512223317793ee1ed34b537d825b1e7893f070701d3bb250409bfe23a781ea4cfc826c769dbb89cdcb6ac2d0b669f0a8474aa00ebb325a6de07593d19b6fe1359ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a