Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html
-
Size
25KB
-
MD5
3f20bd8389261fb04e08cdd80e7596dc
-
SHA1
6000132697763d3d779beb93f3ece6091574e119
-
SHA256
347653562b25d793b18d9071b997b8fd0171593c96871468ea11a8b0f82dd1b7
-
SHA512
b8fa13a510144ea78519ba7009e4ee6421a5134148d05abfc7c39e12f5766d6ced129de3293dd26c55c25f55906167410da839b72fee5edc42cc3f32a92725de
-
SSDEEP
192:N0dozZ2b5n2nQjLntQ/6nQieIndnQOkrnt8znQTbnAnQLMC7A4pdEkwuXMAnFnQP:SdolSQ/MKVBG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421759441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03b94c723a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000009e18e18ef5990d4660124494f4e5f0f34e4608dc0e364350fd01603e5f9ee408000000000e8000000002000020000000fa622bd89bd6b2154d7dbff75805e6996ffd9f9e456d71427aa5de20d85d37ab2000000085f1b41f284acea22e3e96fe32ba4cd526feea6ac81629cbe87e503a955602b6400000001cd68adfe077b8d9df74257bd15978aeaa3e8392dc6b413d7bdc2e561823b78181611e7e16b7628775163d9bb7e7dded02c30d64fb490f35a9dbece96a8eb0b1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000002c27f1e5d78c1dd1c773e413a131ba659e5ca395fb5b6636e0cef7259d71c695000000000e8000000002000020000000513f903ab93762cbce7641abb61bc109c3ce562faebc56621c71e05cc85168c0900000002117116358ee6e4dd7b4e5ef8028a8b6144d667b1f8d655642dfab3f3990db70e077f5b62f999c67455e3c7dc07b27a748774b69069d4496f1e8517d4aaa8db7248b407bf3359c7fba57fdaff390195f0a0249ac4641756fadfc127895d0cee11e993225553c0404b23da6813fa6a42d574d91a2570e2b29b7860ee57a0bcb48b4e9a170c09923ba4a61544b01d3c9564000000074616457619174cde84f425a552e28e3faf5b8f999624db58f5a4fab06e208b00da73fc6bc72caa26e9dbc531707522c0d84c3d39ccf48406891856dbe6e52a0 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2E7B1B1-1116-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2904 2876 iexplore.exe 28 PID 2876 wrote to memory of 2904 2876 iexplore.exe 28 PID 2876 wrote to memory of 2904 2876 iexplore.exe 28 PID 2876 wrote to memory of 2904 2876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba5de859973eaf3beffae881e73c744e
SHA162fb1baff5ec6592261aa29227163b5d8c1b4b77
SHA2567cd4a52eb41ecbf0039830d0ba643fe105b4963c7deac2bc5ef9c794142fb3b8
SHA512f555718bf0a1c724daf6bd45486197f97155741e971c358116a2b0bf8f62fa65cf9996d0a18c53a61de7ea4a17a1e2b06bd1e26263162faf554e0efe220122d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87703452e8524677037f6d8ad01c7ff
SHA144cfcc78074873289728335e8f82f8440877f73e
SHA2564641781e4aeeb81af079f324d1cddd6791aebb9f1642fbd75af53ad8920ff8e7
SHA5126becad232d3f59938e2aebb390ab110c045962851ae83b42d0d53a4ceae3cf8c77828d384cc2f738b82f7180d7de3dd5834d5636b345921f4d81a51d66b98448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061a736b3868f724edce0b314e60e000
SHA174544edda6987a3f64a1731352c4cf0208ff5f71
SHA2561dcbef6d33ce12b13500205c125ababbcb35435096b1516e807bbe7101849648
SHA512ccd5df81dcd66ecfaa577caba98501562256b2af29ac9be65e9a926be7d2394dc639e3168dfc87e14655631ca18b005f19e82ca705afe021db69fec57fcf5299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d2889144fd2ca3342e819baa96fa1b
SHA17dc99b525f6954431cee9abeeb910893163e9559
SHA2569aaaa19423efb0f15772f20e993ef576c46f4e7dbc8f3b15bbdc2f121d17d1e0
SHA51284031737bb97c0aaa623be27fb30d4c906a6c72a7706f25d31ee731218462a6073967e9f283482438a68d04140cedfa87ea8d6b0ae1fa5bea49b6cb0c36e4f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deee91c277aab19714dce0d502fa291e
SHA1778a18578188e8ae434af3c507a160335cda732a
SHA256e16407c838979af9509d7859a2bc821f6395f02f608e0c5b578320f5af0c9562
SHA5125f696172c7aae27b9f093f68a88621a592fea9ebfa82dc2b9c8445ffcce4793abe0bd3e274d2d15fcdf8211aa33d3e32a0de1dbef2339ff30a108c8c475e2c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0b05366b598fecd8261fbab296e1650
SHA1c4913068f6d8cbc94ac352fc393290646ad4118d
SHA256bdf25e70c1cca382b311f31bdb4442f0df845abdadc48786b739dddc1e152717
SHA5129be1b28fae6426e867daeb118b54c606fc71da5ca88d621d88efe6ca319370e6155cbdfb9f7ca71622160c64e6289cd7d1e5a438e22e862488f3309f3750dcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce9d5f5c64d75da493c5b2f174f1217c
SHA175aed577bf695ab62e1e89122865706a349f0127
SHA2560be143a01acd230de19f53e7ef73de93f99f6b8f2f49c3dc3f10476c7c8a256a
SHA512126cdd175047ec519783c4b203df91a15c7bb2d31b2e18ea2459c0d3ecc136e8d0476d592417aee18a11f407f5d9e14a6b1208ee6bc068d08cf66aeee68b04a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee96eb6dad81fc114721bda18044b996
SHA14c576008ee2bfd10515f3aa27ac3f5224069a8dc
SHA2569511b7e3dd08461ee3626db9545a88b15f57cd8f10f3830ada29d961a2b4b650
SHA512d9f1f18d096b80dbc74487ef7cfe97b3ed2062edc12d98754d46a9182ff404a7a63d55fa25787c2768ae3c76d9d448d32eefbd0edc6430f53b84ae94f7f2751f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3e3cf109d331f662df6bac0cf43736c
SHA12f27aca3b75d44111e9ef7e24639f6d13a411fa5
SHA256a0403a6409c952d5d4eb0b89ce4e941a0bee942d85d248b15ddb08fa681667a1
SHA512d8a2c4a7f4985717a0a2e32516620fea5c308f9ff0bac639d82e7c71c03a53b3c89b193a73d8eb0dda24c52e67d58508065d031c911edc5ec10936c6a89e2e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522cfc6e192c8c71266878a2dcdc53583
SHA10ab0637378195c02246f4b99facc3e3dd80f34ac
SHA2567f98f433ed6788423fa841d4a6d4c8d32898e315e4d8dd0ad02af1ed13e8bde3
SHA5124382438ad22f11f7e52a2c5737178fd9e0d6e1c8737e0cc4f86bc3ecadb106eb193c9fb98fb9acf3c8194e64c7d7a6b8f2e45445e868a88c0897c865df347d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558acd15fb6b76e1605a64c365868fb6f
SHA14d6949fde2ebb05639deff020916161f4f5198e8
SHA256d0ec0ee89fcc756256f7ae66f34187a3f4d56e78ea0a389c58630a137743d1ad
SHA5121fd960b4dedc4cefb6a3bee3cfa63c1e5b1474922bf29123ac2ae5831613f47dcfdce41d6bddf0bb23a94a1a9e6af543c66740f3ddf2d91ed9a576e8066735d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d81c3bb06edb2c87238f0168c512f6
SHA1e1de0b2c846647021ce50e9847f08805770b5d4f
SHA25666bb48df47b367da8d99633ab23cbeecb34d139e41593f60760bd3b46f0fc1a0
SHA51206d90cc578f00819d983871cdac87dbb99843d273aa5875a4008769350cd7b16b56844e9610d296bb0fe37fbe2e4eecc83684f3da04f2366661c321719cc3ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f993f726928c1a4138dab1bf6465c0
SHA119863316e8aeb1ef09311c63a4fee747c35b55bf
SHA256d29c3267a7c7ad7bbcf51ef5ba5deae46123c4f10a4746b0515d90017309f87e
SHA512bf611fcad94e41faa86170d7fef31bc68dfc033c34c8105771e3f1f359830bac1fc0c465e2fb58a08c7c51f4d5e60ae461ad6fec6684c23cdd35159c67e9d14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c211f4bd53e77bf900352753b547dc
SHA1ffec504674929f55f268d89fa14e9a9d815f604a
SHA256bc29db4e829812035998490e02d17c6b5d4fee5b1fbc7a14d857fe78d4c6ff20
SHA512be05c1870f39bc1e3237ff512802801419f5ebad0c906863bfdb5c3f20e27b5cac36ba42d4b47fc9cd8ef67dd3b431db7af04815f386727aacdb767646f99ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb4e213cd8265262429b687301df071
SHA1844d5d7ca9f596a125a45a75df6225e7e1d9e698
SHA256cf6d6ec1f08fbe3356b20fd8fe7990f19cda62d3629dec8ee8027af0935b2857
SHA5129db73b83f8faa8dafbef36591e693197a920f80e7ab4501aaee2752beedfd8c6a336d868a6e771897aa7f14ebef65324fdab99e0ac3c704403c1cdab3c30fc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525346e5b537b3e4da12ab1de27c423d2
SHA1436f80e622a4df737c7e5c444076ca4626675bbf
SHA2567d274d47ec27d8169373555cc31479e9ef86c5f3a5b1ece1c644d9c75a51a331
SHA512259d9fffb4772b9de0661102c2370389da4b180ad7a540aee0c94504fef3959be688df46c30b0e013a7eb49321c3b77ae5f8c14e6bd435cb3fb8ffd088fc1a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc83d2f7adf5a117291e481ac4ac1ae3
SHA1a9e3a9f5236f728ebc0dc85c75f26435f833bf7f
SHA256972fb2207ba2ebb35289f27f053e12a494956633a766045d4fea8fdfd21e5fdd
SHA512a00243e9d2c62560940d9361d7fc135f541a31fb5837de1748e8995005ae3ea7816e31fa11cdb406a3eb5c8911ee3ada57407118d788b08fa9e0062e44b2c0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc9001b41af5a0678a3d890859b25ee
SHA1a8329c4cd8b00418046f8d582fe38e2719415a24
SHA256bda2e176d0d1b5ab3a6d294d0ceacd8e724e4dbf0f806b158b29540902861cb6
SHA512884626ba46520ed46b15be819e928de2efc5f8be7c069a621d3cc2ca2c303ba38decba72045c501a5594cbaef4f4993c9f6eb92a4ea75dcaa8e82758ed0555cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f574f72a9bf50d00f547e68b22aa6ab
SHA1c783c717a23ea192f086da3fc18d03855805b07f
SHA256e11a7e8c14c3abbb10eebc47eb7989265b8b40b1775848583ecd28152610db2d
SHA512ba2934e5f91d20d71194501c504d5e247fb873220c853e4f2e4229b9ca05d158fe880d9c6b9bd51b0875c269723184954d2fa3dd471a14713974181e5763a22b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a