Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
63bf37144c963e4f66aa5fa5c5ffcf25_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63bf37144c963e4f66aa5fa5c5ffcf25_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63bf37144c963e4f66aa5fa5c5ffcf25_JaffaCakes118.html
-
Size
110KB
-
MD5
63bf37144c963e4f66aa5fa5c5ffcf25
-
SHA1
6146454b17948b7b2ee588f10ead85046bbf0e2b
-
SHA256
e1753d7e6c459e5c4c62aa6e6d9850334922d58fb2d6d45c0b7ef413824682ec
-
SHA512
2fff93684cd345dfc0cd6063d473a1b9fba831c846d09e3f15f194981f51a5a2addefe54b46e3f18f15d753c464359a4a3d010e8e6d04c379afa1acd2ac1cbbb
-
SSDEEP
1536:qlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:qlyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000fd1addaccaa00b97729925591690d791cd368606f404f2eeab96689b9866ea19000000000e8000000002000020000000eede807db9764371beaf08209f38f9d45528070bd6d537f0623fd53043537727900000009323765c615c4972685513eb65e2eac7ef3ff1b1f3dbe8d1c8470253d5af10757e94c481d3fffcabd71515f5b2f84351a514147e362492defc81216f88da2609a5b51d9849460789e0bea9e5b739f6aed147adb10460d0d5b306f0f2f3e0885dff03048686e8865641415cb2344886d7c6129de8c18f15f4753f85880d62d9ecdecef43941ab0310a285c3dccea2b23a40000000724f8499a79f9af2203e181ae9946cce68de9737edf5a433d54c1e977e458da536930514c1ecf2200d497c7c146463beb5c15d7958668f18d04ca43b69096df8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f5d812170cf06ce5235113e4be0d82063d731deae3cca00b83ad67c65c605fed000000000e8000000002000020000000d7d65d0f48613d0683ba6e8ef0f03d054675f1c9e7701ea1177feafae5ad0351200000002c33f009d002f509d3c5ab19aa12df67eb0cf6150f8c3546baa85567cebd2a184000000082e47ef4c6bba28eba7cfaaa94d3afd955045f84a2af2345de739f6626d2879dd810ba5dcf6f4af98803ac1bce43daf702d067d3d5096b2172fb70fef5db03de iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03bec9791abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3656211-1784-11EF-A7E9-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1596 iexplore.exe 1596 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1596 wrote to memory of 1268 1596 iexplore.exe IEXPLORE.EXE PID 1596 wrote to memory of 1268 1596 iexplore.exe IEXPLORE.EXE PID 1596 wrote to memory of 1268 1596 iexplore.exe IEXPLORE.EXE PID 1596 wrote to memory of 1268 1596 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63bf37144c963e4f66aa5fa5c5ffcf25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a9c023d716fc8278aa0649f54ce450e
SHA1343ac1c54df5dd97227683ddc1bece2a0d5ef050
SHA25658c1466da88a181e85fb11d77d83df3f7b753094acbbaf679f5f0d703c3cd633
SHA5128237b3f1f12dbdf0cc5e7143ad73cdfa0b542f40e65463e8933e59be5c105e9d6cb41f77c145312561349134514b65686c02735951f90371c570c7f39753df5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eec93da489136d83e3d4c9c5d318ae9
SHA1c28e5f42996b055602207db5a391669c3fcc6238
SHA2561d7a132e14ba4b6a9371a349a9b3f57f1755ac54434066cfe529aeb9108da2d7
SHA512e1922f6db18fb71a3aeaf0d58888707feeeba6eb10e43953f61031b60058bffa7080cad9c6e6a1c1c4fe73a27827adbf382a58bc40c96eb74df263d8e57e7066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b701b25aab817e3572a5d5aec3ebd3b4
SHA1e1bafd4829175a663275dd69dc7370bfa10bd4be
SHA25682840c412c03e07721566bc4f2309037426df17e6d9eaca54fb4f443acad5320
SHA5121c4639717330aa80ca3a9e0deb4017efa06ece36ee01e6fda9054f7f5db660e5e59ee1bdd3509fa97f80f29de833a306ae8f2daf706116f11fcc92f3ac44d2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce30b31b6a26d26c73aebda533049371
SHA13291166212f3818a1da563408dc8122dc27cc383
SHA256352e1ba8439b2c98e656929a364a73bbb26b14d0ac7e2d47a92ebbb23b3f8a96
SHA512292f8daf161958624c78c9172846fb9aa0b11f682c2dd51f6e8758248e1cda7e8dfc5b04642dff2083ebdf3cb459f7567ad48288baf2afcece59785431382e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a6c45dba04bd7de8cf0fd2c700fcc2
SHA11341e10dd258cf8e6e5bec6f5ca3978f97e17cab
SHA256035851f6ef17029570e7b394bcd33bc2472d4c976a6fd61d0527176479eac821
SHA5120fcc1491f206f0462913a20bd747f9d5ac3eee8a94e4cd05e4f010a8f68ff64e4a7996b01731edc9afb7d726cbfd24bb630edf2de980406d2a83d1e21a1e7090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e5884e99ede2e9b3ab0d03834f7ba3
SHA15d3e21b630d4a493ae9d8009ae1d15647f130c38
SHA256329fa2123720c7752f058a3768ff6cb6f86608f6da17d1e62ca48d12df29fe8b
SHA512ca8ca1ea94d6b2674330fb7e6cc3392d1a11a79fb33aea29400fd0c2075776a7a9b6798e4299a1b04e83b6352da26c2e488ac612a625a23e65c7bba4545f5d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f5bcbce377a35ebac90289dbd9d2bf3
SHA1bd66c5f977510f7d3ab4d8b767cc5875b52b772b
SHA25697bb9c936d0a273dd2d94bd2560c8b0252c2600985c3ba639ee62e696bf4936d
SHA51252300d5739e1a9660174e021a4ef58c509c07e346e97d13b78b214632589debbcfadfca7dcb19b536cdbd1fc5dcb7f82b9662243809f76ddc772d88cdac3fc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd7d61a86a8a8dbe2286b5a66b0f62c
SHA1cd157e30145064981f186ecadbf8e546bd413311
SHA2565c3c9943f3b94581f6e38ab95021593bf92170024987f40a16215fc18c847db8
SHA5126f0359205ae92932af192c87b7aef8930c92afd10a25488c6655e9e1b6b2e3c04dab91964a71b20eff0ac77a78973ed2c4385abbb12f8ee74d43d331ab3b7b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb6a51fd14163b46c21076c26e093bc
SHA10d93fdc64c2c654cd5567b8cb5a0cd2fe1c147ee
SHA256c2fa6530c44e80738bc2ece9939e14076a2bd35a45e25e5936d157c0669d2326
SHA5120765331e66a98192dfa511b1370f8f38b30525179fda0bbb393a28d216e95c9835bd6127b80649f635ea03ca75f702574e4f46ce7bcb348339da00007da9eb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee058a910b07472f16ef70c7a2fbd6c3
SHA1c3302ca7ad3ee1dc0ad3fdbb0b69a1c20d06cc5b
SHA2566c535e5ffe2a8edd67cdf2476783ca1855228645d95bba4b90c159034b68a117
SHA512424db9fe951d740cd4ef6762551753a4b93c6eed461026eb02b54822f390b0a2a7c1056535471bc41a590c297ce0037bb430dd696045c4a9f3f5fa467c4b66ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55597022b291ec1bf39c52e03bf5d40d5
SHA1a6e239efc86b106d9e259955226e3d8cec0fd40b
SHA256f9c434aa36764faa1877c659b098b8e7862ae72f7be578f19e323d96f1a9b3d6
SHA512b5938029a7adb62d42b769da47d512de73d1743b1bea0f8e4781fc9d8ce65b72a3cc45af50f58ea7434a239e493e7a014f082a495442797ad95aebddea764d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893a87d76a71243d095fdb6655a19b31
SHA154c19ccf9a9857e320f5c73be879341cfe38714a
SHA2563edd4504a2a35c52044507cabc5b9e29f4cdacfa349ed0782af093fc1c778d83
SHA512669255b2c114c2ecaac413d2672db5c09f8acae75e3aa5a037ad27993ed59465c19838583425c6053c58e80b858c88b7e24ef8e8bb635976e5b47030e45cef0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d436b0cb534101baa6824d8c9828744
SHA16d5ce4907a382f40dc1ed18005a0b8e60812f29c
SHA25620faba2993d245d0c84c2b91071771a2edcdacbcdb1f9a7e0c3b2efc7231079e
SHA5122f73e4009fac3f2c3b0299e752f04e440610a5ec6a11227718b369c76e737acafedaa1c338b53396e3bb6877c2698fa352158608c7cfd71fe127939293a56bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da340f0b716b6e1f38827a4aa201ea77
SHA19e6b5039f16ce57d0b5e8f79e82774f7e210f236
SHA25609917bf55108441c692ee12bb1285b46c36ed82609dca00bfc9e815ae54636ea
SHA51260219afa65246d2f5472264c77b8c71b6f0455cf9d87cd41cf8258ba22f5c5619c13d4f845d4bef22e3aa5925ed7eb8c355192b22501270813d96fea29e5e102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af5429e1ee11a900193cd1821910f01
SHA1c158ebc259c4df310979bffbe8dfaed152ed1417
SHA256585ce6976bb0565ed9762290d6648cd22cde5ec21400201e1b6f44c7158cdd1b
SHA512b93a2a4a68f6c5cf06b35aaa676f1a8ded7d64350eff4daf8e93360adf5c80b77b7fe7f77b60377ddd39fe1de6ab55452e81748486ba0fc82b111cef7e707333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59594b8c7a335c7976c83e5be52cb2b76
SHA1e2c78bfd261804c1b5277adbe1dd8228820b96bf
SHA2562311035a47607da621d96afa6dbf6de4c5e50249210fa98f5ce57fe9332808b2
SHA512637723593be471e5eef508d931b8d97dc4c54bed8918803b4299bce58cf5b54e47e811404e29a5a7950b185ac5d3700c5a8c3d2d2efc53d9b85509b495b3fa93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b9b790436a1eea1bdf59c7ee039e43
SHA1d538f2f6060932736a1ab78efae1d269a959ff7e
SHA2564c19ead14f349325d62bc59e2086bd77ffaace916b9f55282dc243d35858888b
SHA512f64b33d46819fee021069279b25bed1d0cbe86d82b49217600a46031922a1f1477d24f996c2d945514d5e8fb829a2ea1183c35e05b88ba43484a02b89206b7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5472f24acf550d210ae7654921a5af5bd
SHA121d5e81ed08a285ad724c1cda5d2097a74795f6a
SHA25613b26512d52d2a19e6c657e6255b910ed1247366a12be7ebb564b758c823f25e
SHA5120c9f5b4dea81cf89e634d6e4f5cff572270b46d6e986f02d2363769b31df7e380b7d35c108027bfed0dfb7e2821a3ab00750e7fe8580f745114860d609bff1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f54bfdf578bda29f7034b3c0d52a1b3
SHA16dd4dc49c6f31a2736cdd851e1f1bcf649f55c7a
SHA2568b9d1526b6941fc09427b44e882820d76b0810c5b1052ef3e0bcb33086c83b6c
SHA512be7160c5351e2ab5279cd0f16f3d82eada9b2ae166347f81345f506989648de6ad1bc16660cf71cce16575f2159da6c00819eacc2928880ffd15a4bb8fd24469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e53b2939fdcd97c66a74242157e49221
SHA1631f6ac3d48eb3a6149eeaf3c085e42c44a63299
SHA256b573ceaa8b4923c33c6ec1722ab8d32444c5cf66a00314173723cec5c60a161e
SHA5128e3294967a6c07642f99f45439e6ca5524c1e5a40afda3512704c65e6fdcdbd9f39b0f255f359de22e390d843f5f1a21ef87138fc5ee80d64417a915adba5486
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a