Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
ffde8e7fc1032a25d7df7ab35c4e0fea_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ffde8e7fc1032a25d7df7ab35c4e0fea_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ffde8e7fc1032a25d7df7ab35c4e0fea_JaffaCakes118.html
-
Size
20KB
-
MD5
ffde8e7fc1032a25d7df7ab35c4e0fea
-
SHA1
2e7869eb64a3ae1b5587bbfceb8e655a950cfa8b
-
SHA256
e4568885467578c409e6d45c7b95af79f3779dcb3b7c6db3c03f6bd958fb773d
-
SHA512
504af769c457c37304444ff5c0a89120472902438cce299f2a6703ff9026ad9a39dbf51e00b69af933309be2d2bd9fc395c188e12597ea14b152c9a5f89e307b
-
SSDEEP
384:mcGR0j+IcY1ttUKBSIkE0ShF6lRVJJ3nDql6eIF0zGWLK0:mD++Il1ttUKBSIkE0SD6lf3Dqlyw
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD382561-000A-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000024a02131221e494f33940ec5eb8376a5fa3693c044dbc9eafb7f01ddcfcdb782000000000e8000000002000020000000dfe62a812fde63e3b7290e968a39712e8916ba4d51f5acef50cd1c4006fe99d520000000087462c10cbbba1b6ecb12bfb4eff1b8d5364bcf4c1cbafacba9589e7c5d7c9d40000000f9180a95a6e0812ba2ee9a57ee03d2f5a186cbf8c4fb0b16b185a5f410b6d2e5b9cde3db1e5aad0bdb2ff51edeed9d1c3c6fd202b1e7b04bc14602335d5d35e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06bfdba1794da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419885084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffde8e7fc1032a25d7df7ab35c4e0fea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50527a9ac520df2cb7c763d59d70adfa8
SHA18ead295d0364c023367e10085da0915d1344e36b
SHA256138a1f13ec116c55f47c3fee4fc4d3ff32ac06f541b1c6fa2e13b430ddfda007
SHA5125b7fe02efcad3e3d08f50bd3b93bad909798176f2771204678f7076b5c2375ee2e9030b10be63aaefdf86538cf676494b09c295f6e9a5db7d45d207722d914fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5999d53c247bc1e9d1b7767cdad392fb8
SHA1f45a8c481619e515545224b51b1e53b07a2e12b2
SHA256c909d149ca77febbf824fdd28bcc290f99a7a6253ca049492fdbb154654cf60d
SHA5129c6124b14852b46d23641c7cbddedfbbb3ba3dc0074b0d16de51da57483937426e5d93ae3543c70aa7d6840121cf3a82a31fc2091f2087206d0e2619a1f553a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50daa5cd5d69284891fd2f9defa867450
SHA128bf92f5e00677d5d8fa442f5cd5098f7504d899
SHA2567e48778b019d1546c432f1d48f16b110ea14ea2daf082ca375b9500b1322724a
SHA5127204fa8c1b512fc770c0577d1616332f76979527369cc083c16ade50add7c29fff2ff8a7c3c1af1a940a66c3c89ee4c83b39001fae7e482dbfcf50e1b45ab481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f6a7c0109409bb503f9613fc960eef3
SHA1049fe415dd760333c90f98058433e96b477d7b18
SHA25696c18a33331cf59848180a5493028e78a8be4f51a54256e5777d9409aa7a7328
SHA512895bbc98b3dea5a8907be4b6e7b27ee0fd800c5c2ed82c77936bc240da403207a130e4d3c8e37c9739bd240a308f7d18afcc16f0bedf07a8e5e7c683764ae7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5279c1da08715009c6ea92cdac6758e21
SHA1e58e093ed1a03019e12dbf6f91fcf44010d856c0
SHA2568c1112253343abb91b04e35973a91ddcb3c91083a76834614245976a7c1c4dc2
SHA5124891d39bbfb27e142553cacbc98647a51646b821b7391e740d3cc7f24d774eb424387ea714d3ba83d16e36f9f01ce7e419b016a12eddbfd350b5a4a468193770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe13d8919aab00ef3761a83dc1b36908
SHA1c521342cfe7edbe66dabf77cff293bf285c50113
SHA2560327bc0c0b20d5139d3cc09d9aba9e943d4aafda442ef5bd3ca3b218fe7f5cfd
SHA51264fbe8c651de6417cc3c06c31be1c8efea30fe6d0ddf48468df8c6a8c55a6f54577ac5c533b7dfbff9b1700b8e12db3dcc1fad83e6c0a32e266efa520575c7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55eade162b5947108e711284ee8e42214
SHA18a43f99d3e6be08d309df16541e0c5882e0296ef
SHA2567bbb14f03758d5a7a142e5b57c102bdb8c97ebb902dc095e2e35c38fee679244
SHA512ba9b37fe717e81e0a9e16f14c4d8e1761b647fbb9b3617957f5f08772424f91bae705d8b506dee425e4fdbadee225996b55a23cf41034bc5e0b324b1c7776e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a8293e1908de361c71b8cdbef88d817
SHA1efa81aa25be209142dc90827dc0e72799d584863
SHA256c094e9faa32fb2d5cd7ac6bbb9b5b3c897fa436aed4b5f481c4913ebd7642de0
SHA51212debebd8ccd6e2ca12471bd22100338e934738cc6d96e4c65c8fa8418b92f26f8ec183a6c5ffc45808989ab31bc4ed9c181ed29ed1f91dc9f86d9507b35d1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f5af2c7c73bcde560876c9416420f1c
SHA1ac738bf6b8b0c3bb26eec700686963a3e932c9e8
SHA25668033fa2a42e79e8b0c176ca013d851b84a7c1679e8ac904aeb00e30ebc4b9bd
SHA512fea9c5d106d1f58876f5521ef4d539fe52230f3c41691c7b6469409a1c540bae7bce5a76645745b82ebb4319082ab02159b0d9d20f2abbebfbf400d8034552ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c3e1b0bedac51e4e2d1602bfed3f028
SHA13c25dd917d11350bc727bd8ab179ff405d1a3e0f
SHA25665174ff8ee29dccbda4ba91db08daa86dd452361005583a890904074f106800d
SHA512485a55770f6060bbfec5ee668af35701fab316fc55fd54d7924317d0b7e7fd7c4f0a08b723311f1244cce16b092e38204b5b0d977044b33dbf13a69d8c3607a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f7b844b42ce42ed8e8f41b4a81a92f6
SHA15429dafa5286da1de619cdc1fb7e2d01ed9cf2f8
SHA25603662f748eec94704ce46f43ad908a4661c172a3375369c137d22d5e1fa698c3
SHA512d020ccec5590d0487b8225c92b6626d43a0b04143c4fee501536109f6e817c7604df52806c790e4b1702db61878a218fe50e29201277e389cc146a7f4b019747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510b28fb401c8397476c9a1e76c012a5c
SHA1d562bbf4ace1579ef5d7815f221f76e4d285ab06
SHA25609d8f99a88646b6de520fa378140c44028130256ca03bde141ee25e6c1a7bba7
SHA512a6a046070d55ec3cae9d1b14e50d412f2cef5b11c6986a7774fc27e4e834a7d17c4cda45a5447f3f6d43cc260be2d1c4fd7110aeaa14784da420694c5515777f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD568efb4af3c454d8578777ae575296082
SHA1bcf971dc70b6c9a2f68dd37e34ae5f45e05dbfb5
SHA2568bca7a34b2d317bc524dae99dfe9ac963f58fa2121dfc4e7a2e213c1223a71fc
SHA51286ead9831b9ef5f0983ac6ba20065d094c21f1e0af314b54d02783aaef0680d05b3c295ea67da11a67aec9a635051df1ea3b3e4b8f1e14d3801abf24bf5ff8cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51541da64210dd86a53a4d3305abd7ea9
SHA11b7eb603d1d8968dc602ac35e0f2fd114f26b179
SHA256944f902a8487d5cd21e8f3b62f24916c5eb5365a42c993153394bfbac6893cba
SHA5121877b959623548262e776acfc233cffbefdb108316730b13a3a28afaab4192de90120e91d235847258472464b0b3c4cb81704ae7ebfd8098354175e44732cb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3a7a7ddbe16c0b12ae912b1e9c95c90
SHA14c298f9c02f56404d938bfcddd526b92ec626cf3
SHA256403147ebf02b2a6fb03073e4995cdc44e22cc9f05dc03eef9ca3c97de0457ec6
SHA512bb6c86033e73289471e1a7d74097a3e9b416550137ecb9c654932ffd9a521609e67748f08d73549c003db174ee3ac648be7291de398640e1c07f7f21eb7cefc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd526dfae7134894603c4c0de301fa85
SHA115ba0f7ee566c453567cb3220df6084798b86aa5
SHA256a41c7f6e8f7307a29e8fea5b99fe098cf6aa30acc3216f1a53c8ca2e865cdd0c
SHA512194790bab008c30b97391079e9397a25fd179b54b03efb73841f46dda6857afa0f97331fee44725e04d8e61dcdb7b37144318008a7241ed0fdabc0344e66c0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58a13875974c91defe0f7a663b3be0216
SHA1b1ce156c8eaffef68ecc56e88f73c4b89c31412f
SHA25682031c5145435a8a324d953e2320cf84123dcc52db98a9c17269decf6938c776
SHA51244df73808c54d0a6dc4b4231c64811112329e53831f5fd7bf285091149d69d5ac1d8200df3fbd3ad084457617203d39864a083471cc046cde86d93e342e49e18
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\yahoo-dom-event[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a