Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
692d91b657db75718bf7f32bcf678fb9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
692d91b657db75718bf7f32bcf678fb9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
692d91b657db75718bf7f32bcf678fb9_JaffaCakes118.html
-
Size
27KB
-
MD5
692d91b657db75718bf7f32bcf678fb9
-
SHA1
eb8bf9076b5127dbe157272946d8913e82374c53
-
SHA256
32cd5dd361ae012af9529b355ca875866dbab429832dd300ef5b357e4b977636
-
SHA512
fe63f24d78dd2db996df23d3ae9be3acf22bd583f48c89f7f910d29a3e62140736ad8200dd4dafc9f1a07e7c682cb5c68657f40ee0061e9bbe350fb5f3ce699a
-
SSDEEP
192:uwDMb5nrynQjxn5Q/KnQiexNn2DMnQOkEntK8nQTbnlnQ9eJxm607DNQl7MBRqne:SQ/4DYQboD8SvJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30719b26aaacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001d3b0aefafb7b304ef5aceea0845907694f5b5fc8bc86518c41ff515110dbb7e000000000e8000000002000020000000244091bdfed4fc8d01b7bcc9f8508219e70a6669490e8f617bdce4f71bbd9590200000002389be954328baff86e7096a2ff7f10e78a0ce43edc8c9d23cf93e9331aeb8f9400000005b43e9765ca8107875f632c19831e4cb1530d9b0aee2adc7392e3969dbf112f851f3989423676dba6758c51384f088e20a720c6565f005bf64e7041f5c25ae9a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586809" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50E7A081-189D-11EF-8DB2-F2F7F00EEB0D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2596 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2412 iexplore.exe 2412 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2412 wrote to memory of 2596 2412 iexplore.exe IEXPLORE.EXE PID 2412 wrote to memory of 2596 2412 iexplore.exe IEXPLORE.EXE PID 2412 wrote to memory of 2596 2412 iexplore.exe IEXPLORE.EXE PID 2412 wrote to memory of 2596 2412 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\692d91b657db75718bf7f32bcf678fb9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739db36aae9f7bd868dc4fc5df1d9c1e
SHA16abdf634037a4e51a026d311f557bfa7466907c4
SHA256a78678abe0846143c9a479e089d64f70cd1f317218767d08c1fce8c504f63f56
SHA51263fcbb71d070ea0f74501afbb18263d4cca7fbcb7334670a4506cb55bc6053da6526a46d643d01dbb5efc49aad7cbc50474069fbb68c57b5aea840a09a464492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55812ebdee3b84e4b41fd8e7a4124354c
SHA19a711872dfa7ac0061e04218fe0ec83d129fc1eb
SHA256adc4a18d044167ec77441605eea9aeb52cbe3918029196f266064bc6a4297842
SHA512556ff358abefdcc00be7d7942dfd8d71052546ba8271320066e6f38a17ad4bb43f92a9f37d645c166351ebda2c3621bb7184b0ae1146f0e07ef8953ebc46338d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5176608dcdb3f95771f595477019a42f8
SHA1eba738c54671ea256b33578114d3b8280de5599a
SHA256415d6ecd193f1e6d3891c90ddea218298de59fb9fc2b9d44ff4e802e6b39892d
SHA512ff5c2fe3b8d9d7c74cb3388d9d95ec1fcbc1cd1da1bf9f0dcd3397540ab60c2503297ae334c1ae41d390c5633d15289176a13072a2d474b4f9b6175a8d4176d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b573692f6248b5a61852f7a42f83ce
SHA1eebb38a1f9ea04761b46071504e31633e857c2b1
SHA256ae340f8d8ad9cd6bb0de68a50863505bfd43a8188559c71c4b3424dc21259416
SHA51242c0de8b85edd2039c7af9bfc1a64622ed4a8a5ab250b92282319f6ae0918e40c5ad769b5e0a12644c2b7174aa99579a1fcc95cef0399e2e4669804d7b5b4255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f8d028b7532817ba1a91c63fc403ce
SHA1e2dd22fd2c77a2fc1a81c4275ac7a74653f96a59
SHA256cfc129dc646edb9f088ac0a7baa507bb5f836ebbf38d5b7b7da2e765661cfa64
SHA512cb21014e304018f576a6a2aef77d9bd490fd56f9305f79d5e1af3d3e6b746249a32ac298a70fa6406ff76172fa19ae7298ae134ed53898c10ac772f56dc8e44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5bc3bcbac49ac6a20c7f1a170c552c9
SHA1f9168a3cd16210a9e35836c4d25cea49392c04a5
SHA2563ec3e27bf75490b585d62120f8fa3fdb86d7c6b216c5bb0ce3c05f2fca3f52de
SHA512a0aa073b06f5a73805a7a0d26190590fea70cf93f67e8e7f0de5e68da6571ad62c6b0dad1d9d4b1c3ba9def77e6b7174460e5d8e3c8407d32edfa70409685300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506723c5fa486215f3344042ab647764f
SHA1d0b5dbb2e1fca89153015c457336553fa73b1f41
SHA2560bbd82b055541c1f2f118da73f6ddb064820580e197b58bc56d3d1cd813868db
SHA5120be77626854aadde3b6288463acb0f7281431078970e92c62431dc5fef62f40a58e32883cccb46c8b362177d310d35cacd5c3104f7ed791dc9b373ae73f97674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecf417cf778346c269ff092e4e31edc
SHA11c1129eb5d26f8f677ffb3e56e39f86ca84d9d40
SHA256198ce7b2f9584e1b56d0cdc5e74fc66dcbcb1ea79125c2d9e7ead006c17ab3b0
SHA512243956a775b5d1dfe91837987e94e249646efa0abb8d484845c6fd6dd6fd53acb8007e7034a4f941a97281bca822432f646c29cc9b358c1736c901cfc34c8e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec554d78ba3f0d77acbafe66851bc5b
SHA1fe3141e6741f4b94617115f52d93d8914c058d75
SHA256f5e9ea8543ea15b0d926985ef08bee60ad50d1ac31fb20bf202b83da342d0ca8
SHA5123945379309746c06e76906e95069d6df2bf9dae0fa6fb1e6e076abd122e7ed72a48735d0b413edcb26be69304797fb83e1d2ea07e536c9492e6ead87c6f92619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7997a33a6011f161281ee8f66a01ef3
SHA136ac5aada750df0fe084d2c64025f35441a1d18b
SHA256c1833d26c46bf0fd6aec6a01f7153ead419ae7ce8db4355f396b7a7b27c179cf
SHA5123faa96920a50caa4050fc4832e9fb43036dabdda6a41ffc9f3c088afae48526928e9e2a6db9a008f039806cc3790ffb5834462eccaabf61fb044d1e816755257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3627dc159f950eda7abd05a9216c956
SHA1bece73fb28641216930794eb2ab06d68def5d823
SHA2561ecd39fb137d1a97bc0cd437ace6921ed15ec974dcfc554f58f4951977462f05
SHA51286c0168cd71063f7618ae6d3e53e7ff4815e7fcb983edd6a90eea59e769c96e850e31453fedbca833bfd1748808eab1969c9472eaf38df915e5c861bfd6b7bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097175324e676ff824b91854d27a4e12
SHA1aa68506e9e2e3b590d713d2869d405411638dd5b
SHA2568dc1c319e8bf05bc84c775dc487f686675fc13b5390d7fdaefa3629e4519288b
SHA512e40028e2341c0e549494152edbc1f6d3941b736d9f7ac28a8ef69b83e52021229db91032005f07f83b2a75d375436e21c660dfdcf389113871977896c0762a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597e6fe2860da00d1c3ed609a3ba8ad9c
SHA19e3c8e5a0c321705ab398b3302d04382df1952be
SHA256f85b5161dd8cc9aa331fa8be17f44fc9a337c93aeca8d1066d6c6c739562b501
SHA5125cbe025d4e4f9cc916803210dbca8f3650642603e86d2619155bb60ec61e40c9c808b19bd031672938fa36a7ee5a9971bd22d7f4575c389e6d25dc2891584f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524da983fb84831a20f9f743dcf882e39
SHA17f5e63b46fee9eac26af9ff003b5d7ea42a1e766
SHA256b548506086a57520da56b8436b79bcf90862a4a121e5a7d3be2de67024b62569
SHA512813285e03aaafd4bd4304365c501ee9d7a2335170c18596650b07ff9054852062c3edea17ee33f950651d27135f861fece363186685847ce22fdf298dfda6988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5870d2e6911062d307a2a1956d0fd2ab5
SHA1f215bded26b2f1159954ffb5b9f70d4d1237c675
SHA2564d14dbd2bdbfe3d0ca5580a70910297c7cf78d43cc293a69e6d684445ca85af6
SHA512c06c8aaa586c8eb1c97e357eaa9d2c694d6920016494d110d74288eae7c4d279b11bca2fc45840cc1756a1069f09c48fcd89a0722cf01064cd9bf6881a99472e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeb80a54402149456cc954f330b8a4ec
SHA1fdbccb1552a9683ac33fc9cafd317b6155e0ad16
SHA256817b57c5d4ff7e95d1e2de1fe0882905362f2aac5b593296c63d2d7acb5c32c3
SHA512c28364588d780c65708fb9845adafcdc34fa9073f9a1f6a53fc4f94d478e9e36336fadb55f47f9f463f81318dbb14e3845db092c6fc026f9a5524b0176eeaf55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e9ce9e42c510c1904ffa42c82d117b1
SHA117fcfaa4179344ecd475e93501136426ee03f743
SHA2567b4d76285dc7fb742f9aa45293fe36074b3cc3e8e1ea5755d9c2eee15d781348
SHA512433c40efd9767f8c0fc231786b591ff517ba702dc0e7844f3627fd25ce7c115ad3ce6735b6b2c54a2dd1b33e482e0813d8caa075861015c667ee6ae643c8bec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dfca470472437bd934cfc5d894abbb0
SHA11de708add39c15e666a66bb1c47c3765bc37c706
SHA2567910b7192ebb44a8d5faffe24e847788375b4368c071c215b014ff6c872821ba
SHA512447030f0278f6c2e913eb28b03ae2fc79848c431ec775d767b3f3d178735ec27246e79363eb508c96813d1fb2baa541324fee1446b5446f3ce480f3501d6eb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4e2bdffa781a8b8046e9b06faceb1f
SHA1d517923e37725d1e2acc35a7a1c17bc6c2e7b5e2
SHA256acd01833325758f61d086942b573829c1443169caeec21e85c7aa5ec97a7a5e2
SHA5129611b42d03c93e88e3dc2b2878f8002a300f50c4ebf81d71281a0361f9e70af2d2ac478eba82415e650c00377b7df9aa37b0ef75f932aa0a5a74798a72120639
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a