Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
6b905228031a48cb89b2c919d5d9c5c8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b905228031a48cb89b2c919d5d9c5c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b905228031a48cb89b2c919d5d9c5c8_JaffaCakes118.html
-
Size
448B
-
MD5
6b905228031a48cb89b2c919d5d9c5c8
-
SHA1
835dc73121e53cb45d9921bf2e921144d80f1ec7
-
SHA256
bed085e25238982f3c9d62592c2f746aa0c297cf5fda5dcd97e80ee0859b9bb0
-
SHA512
4b5e1711f89ba56ab9e6028f7ea12442473a6e21c9cf3deb27a3cdf06f4c8e580ae4ba4eaac1dd9138797d9210b9c978c5281903a6dd19dadb40e8449422d654
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F960881-1922-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422643823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ca3ad22eadda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ef284a3b919154e8bf06497de1d44d600000000020000000000106600000001000020000000b307bb388299a88e7ad6aefe59efed96498d2a3e01d5cb0c94137c6ce250385a000000000e8000000002000020000000f525e8e7a85ca0579b41db0765e19c244efab7c4121178c5aa91d1c7459f9b6e90000000355ca00e0af081c0166a6e86066084b0a8e7c4a8569e54370e58ab23a902b8137a083e3a921230d3405cf67039ebd31cff950d93c5774143d24ff9021ef0f789cd308384fd47566bc6d9eda5f939e6133a7a5df05d61a82ab925dc08a70497fe8ad6e9ff373f01dbe6ddf44b59edfe9f4515ccce532535f0dad66510ef1a58387e60225450409c8ce47e9d26c26debe640000000288134a8f714d80875b8067133283170dcaabf8e502073f2f6338b91c64483fc1b6332f2fc0d6ebb6c8b6cef3f5fab8b865fcc64ee7067f8579433a6fc62c805 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ef284a3b919154e8bf06497de1d44d6000000000200000000001066000000010000200000008e5d56e5e1c4c94392afa6963d90b6ae07cf411958794034108f42828966dd3d000000000e800000000200002000000094e27d126273e679ef2f45c9d869133bc7243d0cf4d33fb596688399e2af235c20000000712a1b4a014b61da1699132b50af5e63312b806e843d393c03f7f33e3fc03bef4000000028b2cb2e42760f98b7395b4c2c26ba81f6eacb81c97a8e15dbca2a66453dd04f1632c0b3431e0367e41c4f18605d9ff67db9a5a2d959b7534a976476258fbe3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2128 2156 iexplore.exe 28 PID 2156 wrote to memory of 2128 2156 iexplore.exe 28 PID 2156 wrote to memory of 2128 2156 iexplore.exe 28 PID 2156 wrote to memory of 2128 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b905228031a48cb89b2c919d5d9c5c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2782488d961fdc92c97d4d97b19d657
SHA12e908c72bae7349547a4abe1aefdec9c86533393
SHA25644a9052dd36d2682077eed24eb04a63a8070fad4da70caac2db3d2af8fa70186
SHA5122b869e1da23adbf0ac77a19a6990eae581f5490163173b7a9eed246ed55b656fc8e4f733bd3114604486c5bd57b04b28d79f8900437fe165b3e3f612eeba3bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54887f8737fa1e434771bc347180d3b78
SHA13d146b1d30733ee3b86b30c4b2e3a2695ff6a9a7
SHA256dd53fe2d53dc104ff57bed4a82d6146fb6babb0bbed7020c815e45b42c15b816
SHA512c67d7896c80e5bdf2a1695a38c995cc99f7452f0c1511fa55bfd91544c75e3e85b7ca5317c9f6c67975a42511ca2a03a413d59cd8257a440f8a7720947e859bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d4fb8984ee841fb7560f5925f62bcb
SHA1c1e4c44c5a6928632dd4ce562c98ee1cdc65de45
SHA2563c94a8e88ca66bd850a5ddf3d2cfea1b00a97a32966d6abed04e6f80efa5defd
SHA51233406d60092dccc6521dbb2ab2b3e44d73fe1734fa1ee6b6a551cfea344b597aadc8be015ad793e2c2bf9bc852c81d7ddfa17de89209097a95898ae631410915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5127e5ffdf7ac05f325cad8b4356687cc
SHA119441ab99f203aedd3c29c44848e70b996261cef
SHA256662f19dd1d63eb52073f6c7200ee8ad1bdd51734938c4381c762671c899373e9
SHA51293da4400ce7140a4a6e9fcc8304e40fc6dffd9d5b2a3b8ceb588a8c2a8ffb2819b20d17d816ff727250ad21c13e892ad27c6d9a3272f0f689dd74e3ce7b86fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5958dcc4b6697fe062b0a31a642c2e27a
SHA1e0073d72bc79ab465c99ecdecca9569eea07f640
SHA2560eee558cbbef83fde30c5cf6505ba42ff35cace1a9cc4cedc6f335f4b05d20a3
SHA5127b353b5e2bfa7177cefe6c079c981ab2f50395a66903cda6c612ab151476a375772de1d754cd184ef474b51f6d8db2a5c2327693295b2976641f9bfbbb07ebf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5334cf9efbb2a406d4cb4b7606af6867b
SHA1e2889b6789f4fc4b7b8a1c84fbd62ff7370e30fb
SHA2564701ce05deb916b4d97c34ceb6fdb259169ffcfb471c0542192f7bbae7ff4698
SHA512fc15abe39af968f459dd5d075f7a53af61c3fc6afc806edd43668fa45e81cee51d9a0c4e128b39585fdd99082f2245d7845661e9b8ad2cce31fa98f1711386fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf58b405b658428faf05341ed69d2c02
SHA17967699f5404371a92b273c7ae103fce96b4c952
SHA2568a1c587a90a6ffd0d60fb93dec60624e5f565ada035ad68ccf55ec2796622343
SHA512c068c8e60725ea3546bcc5d4fcf9e35582ff65c21743d6d299dfc4e6f4b50c8bf61e28f7f9a8d69bf4cf52004bdb09f3962e2c35cc8bf1958d617d6c60af43c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5274f0c7e9f39a17db5c03c57a1273d87
SHA14fd854659cd88b02320bb9a216826dafbeecef3d
SHA256520068ece88db5d8bbd4c202e0ab53944274835ac2a7a4dc696251f3ff1557e5
SHA512d2d1a3f602969ba5711d11456b2abcd5d2c4a5dd929f31cd993ed5dec62700a8ffd52f50ec57a36d9a15148ddddb49914f73ce7a6039f239daf08be2b21d5bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae47f366b49d23bb20036523718ec163
SHA182c6eb555543c5954938ede46685969734afbdca
SHA2568bf9020eb579beee80a7e6c2e670cb5ce7e57d0c0f752f140a1f85e36928e024
SHA512eeeb4418ac2c8744a3eef192599cd5c0c375567e190a5a306686478aa7820818acff92044f800f84f07ea3dcf05f1fd2f2e6ba660591c5c597d837ac73c91251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5678841c1c30e377f686525e2f4836f70
SHA1c7bdffaf19db913d6a384729a9fc4dbab1fd86fd
SHA256af043aaf07c5724f94db006fea6205fbfa44065355fdb796fb5e2f6e006ae071
SHA512b3df1b476b88197fad612c754c6bca51df95df47498f593fcc8d2563e51e6fd5d5c5516f28543ba0a10b02601a38888dff6f37998ffe5eed99b48705d1165eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85066f16909a2cb23da7e59eef4abfe
SHA125f7a3f5cece711fcc46af913fb5c63b0ca9ab86
SHA2561058900c92c20ecc576d2886f3094a5244bae510a2e6d5237f70eec6b401daea
SHA512bc4a88315c78a5f3be4e0956ccc0575a37ea1554840b4dd9f6a6a102d8c9e3a07b46cd6be5928f12bef243e0a93d83915add80a961285cf4ee7e66f43e7cf31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f31fe2c1d192fa711cf7a44afa42317
SHA1684d8437c5af634000f184dc813cf91189063106
SHA256c385db6a314a633885f75912277a7eff48dd486f43a657a21af7c4eaa068f986
SHA51267180fbe5a02ed3d1847f4f1926eb4055c690bec88aa678e24cbc31a18156dadfd8c110c35a65d597061ef765de27cb89aaf4a01153cd1afc3baaa44c7daceae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f6f7b3de8329640a272f610defbdfd
SHA136a6f2ab7a5b07cf58ec7572577023add7b298b3
SHA256eb0f757d87097f02d11a50066694b81b4a67fd11b449dcbec3f61a15912414e8
SHA512475f72b7ce744e2bec4190dcb1afb11c47bda5ea377d39b4822b9a4e08b727c808cd864c2dcc4a494e2c97dabe1de2b970806481bf2c0f858dcc2c568c2eae74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b6e6a63003160d2e6eee4d069b83ce
SHA1be631010e2301d94d4fa21b218e92d00f964daa0
SHA256f6995a22403bf9af16ac995d7942b818fdb534675b0c7631ab3b63a47b7bbb7e
SHA5120784a14a592515fc4d64d7b527a2ed60b2cdc0f99cec4a0a1d7566fb31e112c6d2c6b00e8ccf89e897823489e477317755f2c4c5d2249a0891d120a4db572449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560261a9f2e9458121326d80747fe818d
SHA18768d2c78bebe0d93bb1329cea60169f9ab0e020
SHA256ffaeb8f29025447041c3508a46afb000ed1fd254d4ec1b3e4b58f8019cd2894c
SHA512a36f4533eb8c31a05786be9bfb5788ab94dffdf2327b798b90b6d673aba834ee5cb1af756558c766e7f2c88ca5294c346bf5f6d2080d83b02f603d17160dc599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba43d54981377a1edf2945dac6fd2099
SHA13dca3ab54cc350630fe31b55d5fe27376de56577
SHA2569c6bc8e27bcb8117bf967623b7b5a5a85487748a4168b1853842262102c76b01
SHA5128bad65d92ec267ea72a7060213e0da38797a7c04a359796a1aa55f419cdd272a600b0dd5e1733f60b247e2cf00b40fb9726b3c27e6136796a3dc1b556037fe33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e489d677be4b2fee2f0d076faffd9b96
SHA1c1db5965998106e20876ed347b3a9ecadd9aacc0
SHA25605111d5a82191166c6f3d46b42758938cac67110f64ec9a7afbdb5754c36ab97
SHA512f5f2bff6f5a3c921490938bab02399ecc09d9292cb58720a7cdc3bf084cc8a23e377f320fe88c348c7ad911c05facf75e4c57081e8e6d61db349f5c17f925710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597935f476d29f9319941f44e2ffde28e
SHA10e3680bb39d65fc2b014e9eebb41978b6d1354df
SHA2563d2a057374711e98f4afc65e5345bed91d87dae14138ccbbbe2fde253f4e2d4f
SHA5120346645259e835e73ae6e929f26e92bc9f307b3c33d0470dd0ea2ef0d8f85c756feb220dd4da3cd2f59cd594b23b6fbdcfdfaa5f9d106550ce3a1870c4500818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2bf4bdd1d0e6b29a10835ce2781e6b5
SHA14ef3e7e265184a0439cffcde1e9f77d22fc0a416
SHA25600d3bcbf744c7be6e0a91abe3dde4203dde80f8b26ee36e1caae1f0eaf2d2940
SHA5123ee585dca75b1a90b2f4596341bdf110f777e756af244989bfb281ce667fe460058a3589e557de0c06f2d9f3e4fe4d39f3091cc8e59184f4b6a5849db6bb7f6e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a