Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
65d4fa478f68b5e81a6935743ffbbbc0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65d4fa478f68b5e81a6935743ffbbbc0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d4fa478f68b5e81a6935743ffbbbc0_JaffaCakes118.html
-
Size
2KB
-
MD5
65d4fa478f68b5e81a6935743ffbbbc0
-
SHA1
698d4c4a425b464b4649a6d5da67bc25855b280b
-
SHA256
98a4b53769c3b767557025e118c7a396a730fe1f85a1b5fbad0a3af9bb978832
-
SHA512
ded24c04a674dc49019488421b26e96d9c24a380ae868d61e6cde8bd21787054d149296cb2c5b98c49daf0531253e1041434b7a9f12f3bc4c97c082c2c529721
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b30d403295513647896ff3c94210d39400000000020000000000106600000001000020000000645741a9132eba2d46dedc45911dcd653a81ea0c813ea5229b5f9cacae902b82000000000e80000000020000200000004eadeb188ce22e33d4e8703a72753e7d8e6f187e8508b87b190d76092231ab34200000002be3d9dab69b64142c39076d798482feb35f79290b132c59fdb464f7d637029840000000203039cd67404838dcc9a22ad615f0225510148709399f3d6acd14777cf6fc6a9ebd73af153bdd85da0503fc5aca25bd8b397a999a33292eaf5f3cbed0e86a7e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30757001f7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CC419D1-17EA-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2192 iexplore.exe 2192 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2192 wrote to memory of 2960 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 2960 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 2960 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 2960 2192 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d4fa478f68b5e81a6935743ffbbbc0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486029d7288e2fb1e4e8ae67e8916885
SHA1dbcb2f166a4368190326b4a44b053f1236fac350
SHA25619f95ca9b5d35760471e75ecab55cb0db0f2e7dd0d861596771cd7e65d159982
SHA51261835f2c4019182af31729405efb4862faa6650d069c5810e071cf7cfb412601c123b45cb660ec7b1a6f9b4c62e4b8da28ec529a4c7068fef71d650e7c1de5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5395f2cb7699c3e9772ed1d115cbf357f
SHA101687c2627d97deffebdca83aff27b5b0153b47f
SHA256709823bf7fb593bc52f592d37a21fee9d8cdf3190cd6d57ee88ddf79929869ef
SHA5123da0208688996affd36f55662d4922050c24d2f6776b01dd51e27ce735acea02ee2cf925cf821c06309cf309b6fc51c7cbfdd704550fbd30f904e7af3cfcbc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de284f8a66debea0ef869a882b9d702e
SHA126a424a4dce8562a0fa9c80e68f2b90078c77837
SHA256ec7ca104048d7d8224732858c13ed1cb286cf40d70395d98b16b61ab1ae7f925
SHA512b066556d666ecc6b5fd013e01ae36f00c6da850694c3e69595ea2c438b52a56a250200515d08d51ddd7c2ca94465b0664c5ce485682d2ceab5b743818b92f031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59634c051b2a1d19e70f487114eaa51f7
SHA1d8ebb227d6c84d9d79c5c19d52daa3b09f97133c
SHA25630c9d96bc8604efa8c71a24456e50316c34c1c3ff5cf31ba7ff564a1dedb0605
SHA51233a7e3b117118a7e2397a704da292538b02043135d9acf5df1894b5d9f999b6aa639484e93863de2e957d721f9da47b9d5b8426baccbfcf77cb7f8358991ce3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d00eba46a94ff397ad4a07d11f2e23
SHA17e1dd44772e09c68002cd7c0abca7394e6d5f5fb
SHA256e77ac2012f19ec26388a90367a294e1423ab8fe60a5f676a1af9e7ffe7dce752
SHA5121aa1cf452f0d73752d2eb95dae7d697d5af48fe422218637c2c555630e25a34aa7c80c08e252c209e249ec4e616772b121a1310fa3b7e217f0500e67c7e97e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a694eddf686b01dfb8a64308a8fef83a
SHA163b3c8f34edf4b3a350753a9d3a7d5142e5d9732
SHA256ef7523364394cee99e21e3f57a623c198e75fc712948f8c752e5f55bbf081ebc
SHA5126b24d5dc831bdc22d11cb3c014665a056bcccc60b08fa86df0ae29d792dfed0f716b74323f3b152bafeedbe8595ee5439a071b890769427307db34e725e89410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a692acc5c369d9580b761ec848741c3
SHA16b9e5adb5e097f819d935bd5c88b1b4b0fd8118c
SHA2565734217358b59d3ca6d0ef20ad745c09ba278e3fc656851b54b30b3ae274215b
SHA512fbf08f18a22e7bef7b8a00dedffc815828174188bfeb14cb5bb1eb37a8d726cada9bb033fde169e96ae0102ab3c23e9c2aee7eda02598da5d2afa8314a9d6225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5079f6de33d48073bbafd267b27c2d83e
SHA1568fd9525d2547d133d1c8b2d1ea2bea4672b350
SHA256b29e2cd2ff5ee9308a2ff7f370e852f96c20f788ccc018d6f0f20526465fbfcd
SHA512400cffaafdee715f257212cfe07dd96c616f95f8af4a3eac8ab02dd97358ff514267d6b7b4a2d3a68f9acda9f414648c04ba98e0064582c526b7adead9ef2a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9e413e38ddb2ba3de7859c2f070050
SHA18a3420487c4651e67807a4c0a6ae6a1e91b7b91c
SHA256e341471f69c161b1f6e2aa8328b991e8b17b3175098a00ffc7600202c2ea5495
SHA512b8963d1a2bb1d89339d9b8098abd174d9da611b8964c266707ab307451cb214f6b0d34b6abb863956a39da8f5384c6dc6e5cc636c36f5b387b71d10c71c96d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9a4bac75cd47fe38a68e026b0e67dd
SHA137fe9510ab4e122b4f29d59efac54801af0e0204
SHA256d4124c59d33ba8c04c1108811f0549c566b0870af748eed30cb7e3367bacdfb7
SHA512891a7285d09ad7b984a7ef3cf8228733d6509ab9c50ef9b7ed6b87292563dd8d490fe5fe4358fcca91183cfc2ee7bbdc45d9f8bdc3e9b0443a5d7d58b77116cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d52533f57a5754ac8f95d025179c21f
SHA175c8f0567d8fffe451e7b764a877d5a7f3742502
SHA256c5e647d9ae45082a77fb3c9dc1bc848b8ad9d30c7281c7bcf3a2486f523e3198
SHA5125186c4bd21c16d02eb41bd12c88f5d1102a4c5dcb933a05812f5a04711c7481569c5ef6fa4dca20d4342d9b318682eb6540c97c677849ed70c390ccffb68c674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58193bdd2a7bf102f6809b6219301fbea
SHA1f042240a39cdf74903d7b445cf3296ca9588e82b
SHA256527909a0d8168d4369dde19492a7551ecac212b0078d0b92721eb89c6274129d
SHA512b0559993c5c34895aab57f2f51abbe999c2c809289a98a9a0f423cca1da19013d7cda85ee9897ee0a6c4bc3c395c2eee5b5dbde941576c056b68bfb7d0f44e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9598b6991cde4c06610784360b04264
SHA1582bf6579982a60887a661c3c9c1f7b5ecc97f4d
SHA25627fdb1d9075f1ddc312f24883dcf8170bc4debb4bb4c8626999e6f57b8e0d34f
SHA5126f3416d90b1fc858b79275d2b2c7c437cc683a2022099413e3cd271c73fe9b0242fb849418701561e4bb824190e200214590430c22c25565b1eb22672800759d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52693c84e20c183ee25af2713a8949edf
SHA1b475e04db95f22ef8fe9f67dec289d889099f381
SHA256a9983aeb1d45532897091ca9f90fe81067f92d297d50af7bace6f64bb4d90772
SHA512095ee2db7375405e3d246baa9dd6280d6535507bab2da19c9543d1f6979102e50f76971e8c5ba0cbf240a81f8297d0f55b383ccbc0fbedf661d0a8db6c32d34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f4661902d5c1aaa77c842829ab3d1d9
SHA1c0cf1ebb5b7c827d68fa517b9f8f4b2014e0a42c
SHA256809eb0c5634f29b404dc2e62b37bd3cf7c715e3da0f1e40f322295f86625131a
SHA512692bebf79410ff8465cee898eb484fb5d98de82ee7abb1ffcf849e281f4430d951be251f3c57aebb5b8c2c8fdc68a8b2430d5d369ae67e22ed6192cd6a4a69c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4fc7da4cd5503d7fd2b2b437291e87b
SHA1a18f7ce8b66bd85680b3fa5291ff8731c3948f86
SHA256fa435e4b545318856e9051756a83c0aa7235945de56d27517200612f5d4a4079
SHA5129c4036fe26eb36e2bec24bc2bee147a7191eadac32beeaa5233fb5cd90408feb3ffeb7875aea0c32dad406653dfdb0791ddd694141f3942080f0575634c521d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3494728b4fbed587151779c957d3062
SHA17b8507cbc7a8d494693381849b9340f0467c89b7
SHA2568efa2d3faef3e845181b816c0a80b293ff9bec8a45037a9972598feca42f028f
SHA512c18065fbde86ad7737d3f79b95052d82fc6c955a2222d8268dc746b982414982c6bd2c7a3902239b4b68d163bfa2080caa6d38bcb2fdc5377af92d07bdddedd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb961d6fa571f2e94d031b4416baa30b
SHA19aefc196c383be3e5e76bb5187ac5310ccb31e9b
SHA25649a4d9c1cf7c9e5b505f12889a2666a18dbd8be4dee700233bbeaf0a5818a96d
SHA512ee84c7d1aac250c8888c21ff493ab54bd68645c5e583a3792ec13544125ac71b8e522dfd15826d6786b0eba2da63e5a1903a4ba024e609095ab74d40756c152f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ee72adf7afeab26f49d31aa376f11f
SHA1640ab2051cbe38d490e79af1901ed4b323d5e103
SHA256c8748de36d499108b491dce11b78dc993b9480645350c13c5ab0bcb11cdfa6eb
SHA512ce5687aabc7dc7cd11ec4a74539a30bb553c92f750f2a20bb97705e123798fd2bb095b9d19142966d18dfd7caeb2589ebc78d433721247e68f6c6921e97c3be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a74057b6360ab1fc9d6fc7a20053ae
SHA1d21af5fb8d6b77117b0e30a33ccfefbfb96e37e8
SHA25669ea71a7556b2e0e2991c8fe1b41d36bec8412fff9f4191ddcd0975d12c018f3
SHA5124db6da079d03272da9800b8a1ec18f1154732f720748142c46ff15d457855c411551bc43b0aecd165be57d622777a72d256cd9881c3f58e4c49fcd9c2ae69311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbd15b2e473f590e2ad1c0e5eb4ef3b4
SHA1139d9595164c185dece7968282358e23476c357e
SHA2561667b9425cab36cabe4b1e94c94a59aea1e0e9c8fe1e62d11200e6e3c7f541e3
SHA5128569ff43348747cf039e8293b2c1c7ebe82ca18d74c8dc1bd13fbdc13f2bf32560abbb9590cac5cf033a73eac46d546b920ef59b1721f4481b2473742aeafd64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a