Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
68b822497c75073d3615ff47093128e4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68b822497c75073d3615ff47093128e4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b822497c75073d3615ff47093128e4_JaffaCakes118.html
-
Size
40KB
-
MD5
68b822497c75073d3615ff47093128e4
-
SHA1
f9b94402cc50524abe9440d69d6dab7e45af17b1
-
SHA256
657d247c90b9a7d48ca7fa01d39083d55ee9d50de0c27e381810ca9a00cfcf63
-
SHA512
402d0d2eadd0aa901c008a2db340e5babac190f15c33fc936a961c25f40a03638571fa14b39ee6293a9356fa5ace7c6c07b5652de6fe396a50ec7711da124707
-
SSDEEP
768:hIRIOITIwIgI4KZgNDlIwIGI5IMJ7StIRIOITIwIgIfKZgNDfIwIGI5IVJ7SEWbj:hIRIOITIwIgI4KZgNDlIwIGI5IMJ7Stx
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0155d5690acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000041e47994c960fe6a51db5b7b2d31cb7376e9bc9315341d85139bf784626b0f5a000000000e8000000002000020000000c57054ea246b8ded7110effb51ffb884bc01f116d2b08b43a2f6ef64679757b9200000004d97ec0eddb64588d13422dd2448edb5090530a47ea14d36bf782c91c0ef442940000000c8cb06275ffe20dd89a9bbf6e462d84a74d9c973f8cc7876411a20b816d2f1597d448a9f7881bf207602380a6410e294d9bd594bae2059fad4dacfb281d4459c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81776291-1883-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1232 iexplore.exe 1232 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b822497c75073d3615ff47093128e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae98295093547627c600a4244e5dcf7b
SHA1e527617253814d6f492f025fe1c250c4a9f03ebd
SHA25652b7d0c43fdefaeefdc8060cef5119fab835cd6ba5670272ecde485c4a76f2a8
SHA5123ef85b5786035090952b8c44e048e86a4b565ead96980673753f728873dc19f414f690ca616bd15ab7f793489918817ef5ba7d603a188ee4a2f53aeb80208aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1dcdc050487a9f1388bd9beddf9dea3
SHA1230e43dd01a3c4ea8c81caf71f34548c116d3f12
SHA256b32022997fc63da5b7c6f2e48f79a77933bd48f83f61ae5202597457079f9e26
SHA5123faff881dc362b590420ba6cffcbd48e0fca49213ab35afc68645d6da16d972f2c60b6ec10e519b72d293f5d3c1846eb57cc833505e85f76bedbe868e2fcf718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de817904a173fddd4cdb30921c1e9b03
SHA1dfa72c9d5af4707db1c8801c173503e1b4a73a87
SHA256187fee9c65e755fba90a2c52a34bab2bbc2dfcc8cf9028ced103d774110622a6
SHA512a35985ceacb25706970ec672c531e9490e7ec49f57532ec260eb88eada2bb7b8baa6a4c480878941e3b24c2004dd683afe316130baf2828f0aaa0dcad49c30d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693f4d5e7118eb9d7b43456795f86813
SHA1853c9bb832bde0ae69fd254cc940a0cb25d6aa4a
SHA2567454f3486d4ea4cf24a05489b5ca7962b39417ab1fd71576d3cfae206b15192e
SHA51208770b7f750796a39fd96c36d792265e36ce1f51b39faf204673acb967c48b697565b8a10db373876743e251412c127eb921463195796ac20746c1386d2176dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43a8964368abe8ce59d3d4f681fd004
SHA1cc3e9840d7e5a7e87359b24882f190e52f743bf7
SHA2567c30606eaf109a4642928b5749b54a938b2ef6a0e46646b209d360cd96fed18f
SHA512d73b6e66f3ad3f4f44458de450f6a67c1136e89324fed8fbb0fac717d93fc77585117912f2b49d5fae39bb92251c3df0149a5994726fa18704d4e2b896e6a034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551201b8394a97a732296a00c3ba4f294
SHA1af6d75c5f5bde53c9f7a3b8ab629653b901edfd0
SHA256b50076463ce4558e942858c506b49dc33e53f1510989cef24dfda9e7f79880d8
SHA512f093e28616a5de6025889c06ea56e35d585857c08a2bd763141a997bc67a494cd62142092d65d2375533696f61f22bddd5ff7436839c4f7f383f1e40ca90db67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2d16998ccf302808eba327f47694244
SHA1b0fa9da3c1b6b4f772cdfa83a9be5dac0fe2f6c2
SHA256a7be26476eed9ec7a7eb56f318993afb77f83c10e451418b8bc7a4f99faa5d84
SHA512d2fa23c030d3c02339f25e10b8f6af7f3b286981b16604cc804e73e98b9d9c34a337d1a1d615012baba5b8b43e2f11b0253fb81cc6ece19b1a107363154464b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bd51d3f4902013f11af64c62fa26db9
SHA179b16f04876d3079fcaf93db6e060333ca7610c1
SHA256f58e52ebac0d3468cd7f8aa5bfc725bc3f9e6801ca436bcce2827a0ad1fb1d0d
SHA512089db7790e4a29ea396e8c714b610def4edb88b0f4202e9b9b3001fa82b3998caaf391f309c9c68872b8bea410e2b7fd28b6190aa5ba6380e17fc8d3f28a90ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db85d05988aaf2b41c75760df3b4a050
SHA1de3ff1c98392f20f8f8c47523bc10a083a80b671
SHA256c7ca748b0167ce8d83373a25d24233e7162e07c51ad94bfd177e896f97c63e3b
SHA512ef4bab227dee836101d84431d5ba2696109f91b5a3d70d0d34158b9dd20bc6791e7b2bcd9e718a04666699922e361e7eabb0082ee2e18b4bc65c7b1a4bc609d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b468143843d1dec3541f9cbf68c04f9
SHA1be279cf1d65a277c7a33eef5ac01e2910644ff6d
SHA2569534d0ceb67d707959ad2b311dfd6b9851e371c19e9742623df6407ed4e82d0e
SHA512a2241dc9268f813b582542f42399b621f92f91568e33634823ee933a3f2392970a6f80d89b5e207b91598ef3da94b8087ff7f9f417b71729d74701fb4e73d14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57336aa37e083a24625cc88bc139eaf5f
SHA1dd84157c4c15b053ae3ca27f9c2c7d92f667ff19
SHA256806b924c13f737a2091b523745a112bf0e361e12be0930efe3b2f3020a2a9505
SHA5129bcf14096bccb340f21db947b48a63dd516e25aa66c6519cd8e96d883d626c4504612e0f80daf09ef7ed67115c22633ef47fcd3c27da7af655522fb235ee99bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ea1da3a8e4c5b27c2fb348572d4998
SHA13a772d4260f4ed58fba653f661fd362e8b2ce458
SHA2569a04f2fd9fabee3c65078ad2abbc1f7bca317ecf028b286906bc3ba8a6967087
SHA5120cbc8774526e4dc23124a9204f4976ccf8d8a1330cef14bd69b0e44288756c287c56a8e13dab0cb46f2070125c6cb8db0ae8032bf50fda9b159f1df1623f129f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1193b9e327c27d99c9b488e725fd29
SHA1f670c4647a847ce00731bca0e1e31f5b47df9ead
SHA2564d43c02f2aed981046e1a67261394b8cf87e661168dfa274bc498ca1f2b0781d
SHA512f93a0d0320550eb3f3c95d3e3f3ca3060625cf9c8210fb17a5ea7c48b69a3cdab4f74f2ae43ed22b33269074ea9a9b3ed95be6536583737bf9a466f381a3f9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e24dc3ac3b7bb0a2e903ee0d5f92da
SHA15f6f3630364d80241ed7190f363808a442280fab
SHA25690ff53ea1fefe33178c07b1887789f8199566e507c6bd389996a5c88bb8d4523
SHA512cffb21dd7a7580d242d8c1ec557947e3aaf3d8a0eab5bdcf3122d4bdba0f77bd50dcf8f19954a802949578104e5a3b762eecbebe776235ad037dc37c9e9134f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba6da4c729de8c2173fff04e570e682
SHA11d1c88563250ba3053e33aa177e26ddbc966edf6
SHA2560da70737b9b952e36aec5d93e162cc8d56415afcbd1527606977498473f4744a
SHA5129c1243dc91d62c74cdd4e1340ba31551f0b44c6d899d8e3cc63b202ee9be5c141cecee60f5f08ecad0bc0aca7fdefc119566524922b762b6f6311c1357d4e6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb026a56777fd1abf342329a2d05deb
SHA14366bbaf6ecb6c654104d99217c455ce999d0c84
SHA256649d8bc0c3f0660f7b73ca20caae8b91486137642528daa92dd78178fbcdd243
SHA512515e0f6536f65fe9e18fea7337b10420fb55ed346cb866c63707700645ca90a1ef6b51abec71a1f8b95f59ac0b0f1bb6b8a487dd4f9c5825ea84e2fcf7bbc06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59caf59dd3a36efcef76033e0e3f9acc6
SHA1e979fa932f752bb2b246525f62a11e2118e2d93c
SHA2561a6ad2fb76aba29dc90ddbd4654dae8e5e6006df6b16a9dfe6dd4ebb3618cf1e
SHA5120b37c45676f958da8c25e5ff9afec24b76445cfb662126cf1d04b31d854e93d6290f55e045a77023ab00e341acfe0228b8b47130745ef5291d23df8fc40cf6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a34424ea51a9b5c69a3b76e9769a653
SHA186204aeae22312c3d21ffa35bc91e12b97e41311
SHA2569019e5ef8709afcd910f383c96cdf9d54eccbc200e80ff611a6434a3f4c459a1
SHA5127040acf4cf02ea26fe487f8edca3604857774a44eab812b4cc9d1ea73b6e8770b1f6f9803f496c69b5e61f48135af67f76525878e2e634ccbdb3e7de1b7d271c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156dd8b41d6915725fc45407555d0bda
SHA1c888e860a6a4d61f769782f3bdeb47d20e32ae1a
SHA256f532954d074236a5d4ae3fb9260541492ab6a3f79702403e083b5821126c20dd
SHA512777354acef2c4e8cd9e6cf8d144e68a87c89235a36aa10e014d39895154af58f43034dbe09ac95f6140f39a21397d1692f5c1a6482d91921fb1bc1933c73f1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115ff4cfe4ce580f93dbae9a995b080c
SHA1ffdf3a093fd31231b949b5a7d68974cbcb0e88ea
SHA25695d898013ac5180b7551cb873071c033a9460d641b0a402548798b64d04e997a
SHA51225f793e64b21977744dde7517c906972263a1fbe3662885e9026d42f4776d2511cd1834b19b07019f24dc7b1aa1154490d96302777182a3e0721fbdf8dcfde5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d8439a5d9c288e675f9ad35eda7575
SHA1df2df4ddae9692a01a71359d1779b8020d6575f4
SHA2562a8ffc71777dfb2f0a1330e227fb545a980713d84385701cf12138335339f496
SHA51202a40655caad7f28d622f203dfbddf29f89fd885b2dc49f8a986dc366190abeea1cc31824c37d7f629ad875658c32305fb4aad8c12b4b498e27e86ec20064264
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a