Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
65a34905974eecf8c2ca8a99ee42494c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65a34905974eecf8c2ca8a99ee42494c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65a34905974eecf8c2ca8a99ee42494c_JaffaCakes118.html
-
Size
120KB
-
MD5
65a34905974eecf8c2ca8a99ee42494c
-
SHA1
c3c0036c54fd76e9f0469ab14bd7b991b9692125
-
SHA256
4edb906a3893cc888f91db8b26282c29d0687dcc3cfc473bf33e13c3eb25112b
-
SHA512
cdf05972c5ee3a60d1f98acdc59bd7b6bc2989547a5df829fdae3ed1cb1ab01149b6e666afd7349524db361705696bf374d29e2f6d4ea12d940622445ac1bf73
-
SSDEEP
1536:SCbyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:SCbyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400670d9ecabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505506" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000240457721585c07450daf4f8bdaff246cee6f90d2601a2f9d99780a4312fa069000000000e8000000002000020000000aedbeabd4ab40e4eda9c12e1d117f84a3fe81fc84963189d5623e4fa4a43f8d120000000bce656cfc7c96f832ca24f7aeb737ec83cf4d2c37ad44b9b187a7eb1b40776b04000000028155f0fe9e15c5f879dd2b025bd7a54ce42d500d5333c00244987a15556cb36d8fe34e4fbb3ae0e1d85247c20572d6f60bed273a0580fb75d1cd72e0d7f92de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04DC5361-17E0-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1520 iexplore.exe 1520 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1520 wrote to memory of 2112 1520 iexplore.exe IEXPLORE.EXE PID 1520 wrote to memory of 2112 1520 iexplore.exe IEXPLORE.EXE PID 1520 wrote to memory of 2112 1520 iexplore.exe IEXPLORE.EXE PID 1520 wrote to memory of 2112 1520 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a34905974eecf8c2ca8a99ee42494c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538616f6721810f7357801009a2e6b81c
SHA109c0b7bd1a60994716828b1a6c0cc407b39521c8
SHA25611f736b0e92b15d458692f5cc4f4f07f51adbff1fd535c0351e02a91e1d3d1cb
SHA5122628dab0df52d3d1b40659b6d49d6d2ae6008a1e3f1ae665c334d7171da7c0061744594986352cfc119367dbcfd63d9a3f654423f30784b232a20fe3de9a2386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570dd91347dd0d9a2c8413d8a3c620da1
SHA14d1e6c886faf8446b1d7268f87822936ca424028
SHA25633712634cff56138eeabd57e6d065cb5aa7f8ab5448e58eed7f14929fed0787d
SHA5128b2e963809eeca0bc64ca5191a6f4122903d5c8f59f7055e3b22b10f7eab41074d4f7baa7320f0fba1c9d91c72008a46e081cca034494ddf2b5d2396c56e014c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e64fbdb79665775f12e2916d064c11
SHA160f00efbe724fd528cb61f0d7237d842a8e87032
SHA25626c5fba0cbec4c5a051cc0e530caba08c62a84835445ba0887039f020f0f34de
SHA512b7f365dd745e736a056f527d4f02e5381757aef73f24db4781262cb68bbb070c83d0dc6e6003ee5b8e98bef1aebae92655a6dbf3d4f4f9332eec15c3166b03be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559db23a2b02f276ebad24eb89896de8b
SHA1f62a3fa707c3880b0e267828cb63d569e1880053
SHA256924406359971a08e72c727a38f4929d9e9395d209fa51b6c37d65709a6e9deb5
SHA5125534d48bdcfe94a17b463ba03d4060a168a07a9905b9a9a8da50484e0f51d18e7885c96189cad483d333e51bb94e10a2e2adadaaee5a7de1450cdd1fcefda454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e5acb2d41ad2583531a25b2b4a4fbe
SHA1311754c1dda18035d5ca18e6250b06904434d74b
SHA256f610e34c5b49b5de67a3d706ebb5199502cea1a40d299380d5e531d4a8f35f55
SHA51289b56446b21eb54bee6f16942b8bae9d5bf890f9bf228b2711f53ec02a18ade1931ded79e8b6efbc22693b9f01680d36cb0c613b3a296263bac2c3174971bed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca8c6d6d040501008f8d4f50926070e
SHA12ba1a39c9df55e1f3db6c4406d43fd4411e74dc1
SHA256623acad42009bb157f0ce053013999636102f7b7a3ab9b76585b889ef1f80d1d
SHA512b25685db55c565be86fbf3b38ae66e3a483aaaf6f15f4e7d4cb9559e7d000bc2f05a021847e03af227eab0e747e19a2f12e689571a07b510bd4be8d1f154a637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e5d2824f97a52b6bacba02b9556350
SHA113acd2c7183c172958d77f4bac57e13739ce4c20
SHA2560ee99399150941d52f04c617c5be53667e97f57b0039f1f6f4e3ccc9f9962f85
SHA5126676a25ebd59874ffc1b70acaf6537eeb82a1343cb1b65e9e5613cff138201afe78e0ff2cbf22d3d607640097b0dfb85c81634e5343ec7678a16095163b8800a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b183b8005294390ef4981088ec0ae878
SHA123d14aea075a1f34af2faf465bf0c9a01d5d1382
SHA25611e25aacc42d395702803859ffef98e3daa47748527b5d9ad4ed1f0b8572e69b
SHA5128e171ff3aeb998b1c89dd087c108b8b7a807cf0616a8f4d5bd02ad5f3655917cd45663fb20c229bce3f8319b604736a85b65a9dcd7b1091d7a293460c91939fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57891f642b445ff965309e12e4aef3359
SHA14c5fce4ffa3399cfcdacc19f5c8ec7cfae7fbd4f
SHA25663339951a319cb9d27c01a706c2773bde7b260df7c3e724618648d1d259839e9
SHA512726e930bdc37866feb9464b4c1b73143a580e5aa51a631cd39385e3115acb245d47f26e25364f50f9ce27d645adc043e481e647bb551b1f8246252ea13122ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f837fbf7e77eb7d6cd967abfbfdfcf
SHA1a5f6cbc3f95c7e150a90a484d854ad5e5f1bfb92
SHA256c8667c56e77d39ebced9acc8d7c23e952a151aa6b6124fda6d7d606c9b0a3c33
SHA51267c990db855608bbfa2f9c645ce82add3d3868a29c2351a6e2a2a50e3b7a29af2e0c48207e71eae26cb581b12dea2ed40e353800ef854f0083e67c5d6d389b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57febdbbf4bac48c9efd6cc15c7d74ce1
SHA184f99b2ae36ceb3c56fc0dcacd1b69b3fad03ece
SHA256721e3570c43125ced8b86c2042372258c2ff10d4e4a7f44123ee1e9335b4b431
SHA5125acf5e88e813553ffea093a4eb2f5bb9889375331ccdb4e1a45ac89e8c8ca6df885e8e7f99e904b99a8e07f0f067fef4a2b3c53c2878a25f69aba56fddd1abe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55415ded4c7f083a585da455db4ae7340
SHA1971f99c46464d77446c92e520f16982cb7e3b2cc
SHA2565201140b3f00577af903c9fc6423052d65afdd08aef940bbe5d7f4e833c2fa3b
SHA5125ca8bd1682011593d3cc320aa6ca84847320c8e5af4e6fcf8f1f5ac45d48f20354629321610436c3f6a9f517d5adcd5278db5b450bf10115d92722764ad8fbdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cf63561f431bf3e34519702177ceb0f
SHA1e4ca2c79a1db5e431b3a90bf7784477e9be1e29f
SHA25649159878cb7ae4a4ef2f1d5a301b93ec7c3f32ad3e1282a5fdda70e77908d0e4
SHA5125bbd88ed1e6ff5364dba1ba72634778475d0d296fbbc75f472c557fff8a050272bfd0e6d0ac32e23fbd9a1e9dbd01e64566054164004b3d3660e5a087afc7434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2dcf69f07fa85476c49a8877b389c56
SHA19cffce6647ab22cc7ef8bf03a82f6f8d02fcab39
SHA2569b020430c0a674e98030ed44d6e2c3886f7bf9d21aaf4942d70c9a377775c927
SHA512f4c90afff74c827bb5be95b1e01e6e534b2d1602845c5549172c2499c09b42d0a55209ce7aa72e33313c14de1102c030e713dd7a48e6479f7f361ab3dadb7e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeacf298f19c56e9a7dbcb4d65c42e6e
SHA174a308ac435b0089f57676310b190c4e0990a640
SHA2568279d39b61377fcbd672232e578a64682095b5f5ca00dcbe4bfe0626ef60dc01
SHA512cfc99e8263d83729d764502b337bd0c2231496de0b93bc5d165975f58f497903b4bb3655e40eabf9cdb51f8e60d932552a590b883e5d0e97b7c4e0b26cdc1d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9cde77730b3776177062df2391512e5
SHA1e9cfc1c72d4dcc24c2884c8a92355b4716b52a23
SHA2560dd0fa984dbbd7c75d4086fa90a9caae64a14e346e05c9677cd8a394734860bf
SHA512b731aeae9ea1959a402ad6e3bd420a7f6155942b1ac22b3c57184d7c2167fa3dd34800d5fca9169592a3d5974955be675882daab9220d08d994644a83fefe24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51406d9348d9b1c470c57ab68d452c2da
SHA1d9aef156a71b814d9ab83ec6d65da835e4814d85
SHA256c98087da5e30dfe58f4a4317c87cc663a2b4e1d80d91587794c635ca875cebf1
SHA5126539cb8346463db40984ef421dc7aea8aedc73555dff6ccbef959661370d49084cb087c01eec35012a4768f4d531f18f2a50b5147113622182190a1a92cbb330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561e5e98462d9b0e540e44e4c29367a4e
SHA1afd2d3dfb6a3876f4bdae4b02ae2b268c7485a1c
SHA2567ba615e41221ba8694e6fd96378c2a69a5328d5fbacbe0428fd822ff0999ce16
SHA512664d4dd6329ad575b50d4860bd0309ea548969dbae2e17e3a8e8f942073e05dab0b680eeef138ac6b2d5d87769ae4dfe5ad3774af1e246eede392a8012c0bbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5176e8ee333bb18ddc4952f1eba9d6953
SHA1a90b42079cbe004d415366f015a0afd625e837b1
SHA256caee06e08b63f8073f13657b06b9534091ebc08ade0d4677cc26c24cf8e7328f
SHA5124558aef7be00c271ab86d7461134c7b07c040db78fe94569ee012e8ec2822e28c5cab1376cc2a57bf23d8cf8677ae08cff52ecd96826ef139f6c79ad2fb7663c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a