Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
427ecfbc7aa8178da515d4114e9d7c5c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
427ecfbc7aa8178da515d4114e9d7c5c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
427ecfbc7aa8178da515d4114e9d7c5c_JaffaCakes118.html
-
Size
69KB
-
MD5
427ecfbc7aa8178da515d4114e9d7c5c
-
SHA1
8d78878c9607341abcc740fc37d83d6ceed92627
-
SHA256
b6ba5db02a96a1f4c4734c62165be14a099ccfd7706ce9421734e4548a6f16d2
-
SHA512
ed6e457390373b54d1e4d63830063a5b9af8aeece7e0ab1a31ee13c0e58723178368080085af8536cc890204a91adf7c0bce4579e0f7c644981c075e58d519d5
-
SSDEEP
768:JixgcMWR3sI2PDDnd0g6sAVlHoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8o:JVZTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421873182" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f012729a2ca6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5C65BA1-121F-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000009a41f6a8e16175d32966acea5127a90b2f854939dc09ccc05346e462e06b853a000000000e8000000002000020000000370b436c3b8846c42518ec8796858f1b6c1348009a609f114ec2695028f38e93200000009ebd94d914cd204ace82395b70bb4b33ff671f37901901f6f5049242099d80464000000085c64eb91322c2541605981d1dfbf105a24a75001998994ecaf20885b39dcaedfd10fc7995fa9463965803ce7a0a4087ddd2c8709caa7212d57ef6869f8ef307 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e51a28609b5efec5f33ce2e22b1f62a99b5557b4f3631747ee5bcf44b79e39d7000000000e8000000002000020000000129af48ae83014db40d4526a6be14d9210a884a2a6317680c3e09c19e3a66a9e90000000005da7f6c2a10a7e2e33acf43fcd7322734ec152df8a43fa519c486ab22fb97f1491d9fddceb5c80feabcbc25ec5070cd60cb3eea04978131d46055ddda009f0bd68bfec92d79bfaa4c07ec8530fe6c05015324049a8b0415bc96b0721b25f6380cb4ef341a6c206bb3f687cf6675976db1ddd2198f207a63e557c68ea5df312ddf761c46c44f30725ae988369ac0e8040000000eb0d1dde680d1707e1b6f1f41fb1cdbee140dfc4569dd742bf12ad7a27993b3401a85cca5c313d9f2ca011dd121c3baa76dcf1055177fbfeb6968f37d140715f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2884 2080 iexplore.exe 28 PID 2080 wrote to memory of 2884 2080 iexplore.exe 28 PID 2080 wrote to memory of 2884 2080 iexplore.exe 28 PID 2080 wrote to memory of 2884 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\427ecfbc7aa8178da515d4114e9d7c5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b398801d8e8073ca38b82f9d0aa848b
SHA1be2066322f991ea82fe9ef64373bcf628af88202
SHA256cd52e5515cf86e052a9b673380c772dfa1043cb485ffc0645bf2d745bc754e5f
SHA512443218815621a71899c46da007f19f0461c9a62f4cb92448e15ff532a0596b2ed45bab5399344e6fa00a65d432b257aacd6892a0af5d0eac3d758aa6f6f073f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509bef4f033ca95686c8e3a233e2586f8
SHA1898794e4d3709e5ad7c41371f7a673676e5819db
SHA2561816daf7ac5715d530329f9fa7b00884298c85282f47f2ae02ff011f2bb17542
SHA5124f02c314a77646181f12532ffc973593b059322e29f98fe7b2f01761cd36f016dc7701a89f2242851ac8946cb0262ea8d415886577252281304092ace8364020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e89b84f987a83cd7f00848b2d010d766
SHA1d313d81c1f1cfe5ae5991a90400ca2e38cb39070
SHA256fe15f950b91714f362471e41a63e65bd22f6525920b566de5ee984bcf71d2962
SHA5127174d59a9a8b4cb04acf0d024ebfeacc347c04737b7146e50cb6d3dd87627bc52fe762d486a034a5d0640259decf0b292a5d5de3b47cb290efc6e5748039763c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e693e190f4969ea950effa0ac58c08e
SHA169b3f1bafde41b636853006c816d4c5825e0ba6d
SHA256c731584edec3c8652abb0c346957b9f9a53b3544cb1153ed57fa5f40d91b3dbc
SHA51244c7d20c414b465de7318e17a25fe94d084f989c5e127b1720d6b5fcc9d25d548a00c1791fa7d02fa377be15ef2e5323b4af613ee731b75fb39813e62f2e6860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e387354304bbc007acb063d4f86b70
SHA16da6a917b3e7542bce84be861d3b280fef825c98
SHA25601527101177f674ca5c27f23ef964dbaa5743bfae46f7b6c38d411814921985d
SHA512e016e782d9c9527b5138ebfb06212b75a0143882b9dc7556128132f20b99a95fa235f97ff5d3ce5ddec11658b8dfc506026e8ffe7a7031f5c16b60f4eb19378a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56718aae6a4d18cb24a2dcfacf4c2252a
SHA122c2df5a3f3e32f3488d33da2e2edae722551795
SHA256849d29eb3885ffc4c94c5adb96940ef64fcd0c6c5991960765f3848e8cf6dc2b
SHA512058fb8620750a316b73334142c332ca1ebe73a1c62a00a255d2a906cc83c5e19315dc3b8a7aafbb5c24880fa97af08570976de1b205fe10c0a940a6bc2f613ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a087e793cdbee82bd7f50358c7f629a
SHA186332b5ad66052a4c056251f8bbfa0a680d72c29
SHA2562cae1680f020486e98f00fc4496022d87743c60b8fac38e36ee22001e5647245
SHA512aeff10823666615036a02fdf5ab13e2fc9541edcbc352da2cd8e11ff6e3c592ccd06b72dd996472b77affe8e5272a3193958af6b35685c09c51cced6b533f321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527503026ad7ee06d2833374f19e58570
SHA1cfaafaf02fde041b9a0b3150c698a6a867291026
SHA256d24332d6fde7072617dd086e711139bcd81bd5980beb998c3355a331d4019358
SHA512aad3e6131b13914a32d10e146dfc0df8c935fc57fc49bf097e089f33350d26bb94e0eeb260793fd3eaa919f44d3265e0773d0545d3b1e9ceaa5eadf6c423efda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e153f38fc24d35928652d495dd216d
SHA158f42f15e2bf42480f4b4d16c3d5c3b6021c5cec
SHA2565d188e24fe8b4d44023dea45d81dd6ccc86127e8dfc35afb3302bfef30158989
SHA51223f702c3581f44a28a3c36e05ab73b7b103513c38838d899b3b4cc8f700d8d14c711dccea4c51407cb87dd9c20b418423c774df71cf09d2a85435f1e25643efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfdc1110d907d520d93d4b309b711a8b
SHA1b401852e17fef0eefba6d55be36afca78db9f0ce
SHA2563274ec4c2743631149cbd01f028dda8de048bed29674408741b0bdfec6cecc81
SHA51285e0aa0b267e3498a13bfe56cd760639f26989572740ec2a4d53fe81a6a55b128939319dcb552bbde83840db67db434f7814dbcbeede589031251c5fdee504ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a984d068cf204e2593cf83be33eed226
SHA16be7a84c04f456acb05e83aafb57d013acf815a6
SHA256902259a6eab3db9cf384a17aadb40a22e66d4e4a0dd01dc8494b1a4aa1790e58
SHA5129c68c451663e2c783beab6453f61d02ac23561c6ea4111c8f1427078b0fd209be5e1d5948f1f46f0b4b6ab1a02783d2a999d2252e595ffdbcc8eafb8bbef2d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db2839b8e84f435c17fe83ac5f7598d
SHA19460c8b6f5f02714a83e061157266db60d6324b4
SHA256b60b3d52e6c73c892084cbbd7038d66be89d2600b25d99b5f0b17d7acab465d2
SHA512eca892b9b30842a977ac1de79b83be3b5ef02172b2e46f586aa36c1f7c2f2927614fcbdcc0707e1af94509d99be8ae187eb86c750f72e7d213aab3931b672a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dafcfe8b0606357b55ee3bf1c7e9aaff
SHA18c5032bd2d656a5b94d4e485aec62e223898d467
SHA256d7a1605acf2efb52071efa8c755ee7c9d6015a4293e297794e693423160afaa8
SHA512270153ea96b28dec733a8444ceb8f1205a6db3ce6a122ca24290a6f415a0c3a07b2390d94964a7c32a217e5c80242854f9eb1dee5ce0f70ad0c3caf44e930add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c28e56150ae9c02dfc044e18c0090d9
SHA12a60e4071bce21bfe906e78d0d8d60cb4e44f300
SHA256db8b8b5fbe4185773c1667c184dd63a5302518f1dbf8f0a085f72704650cfc4e
SHA512ccf1d267521a0b7078cfb40d65582e1a30d0696315512de3488179971e258a113f3e7e7ebc9f0ed48616000456af49fdbdee90589f34391b966c2a9b10f8fcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db942f80ae8b09dfa67b36ecb3f87fc2
SHA1d5e875b36de2926c7e3974447353958bbd754c11
SHA2565cff6d68a9d09c3344dae65fd0bbe36599ffd82d67b96ce830b07de7d1899fd9
SHA51267da0a21c7d3ca07db4b1fcd031ab48fa5ccac680d684e7f1e05acfda0925237de7f1913943bba2a4984708ddb135bcb2f312820163112ec64b8201884c4aa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c932339a1950c6f26460347d1985bc
SHA14f6cf557437d2a211fd7909b7dcb77198c5b8047
SHA256a4d5ff09eb586d251d59cfd3355cacd3b25f30ab188c21033ab63bbbe9adc663
SHA5127a67b29bfd0437fa4a4c2d82683f635e99fd99e51dda8c5049a14bc24dfc28bca8a1a28c494a3c480c3d1820338636ecb9644508a7f5f8b4c09f47482777b7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f60589f60fdbf9c992ef3ca3d961288f
SHA157972726a2b57bb3bec51dfd7b003df252f109b2
SHA256628c2ac711cd4f48e0574b6782325f8a4b51327c941690e00e88c7a2c05a177f
SHA512a15b1dfe96e3e1af29a0130e55d4bed96e798cfcd9b48b5aa6d105c503ee60d942e014c353e1fc5491aa5783c8be6f5ee28ed9a0e28aacfc3722065dcc38f3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54767a6c3b5a2d7710221758d286068f9
SHA1e4e7bd1a96d47a9f0ee25e41290d5dce262170af
SHA2566ebf21fbae9580f01b162a856477e1ed01fc1cba2830e985dffc6244613b5dc2
SHA5122afc4249862ff3d8f126810b55d0adbc7a1297897d92b6e71bf73f9bec9a008310a5caeaf59686ca07fcaa1c0dae98880af47dbc33ca2707c18865e063f8776d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b58f50ed1a8468c3ee662e72b1535c9d
SHA181f87ad9c88fd60dd022e8994ada895d7ba99a93
SHA2561b4abc98493b94f8f0449b3ce9a9364798ef5956ebad8c7c5397169f2619128a
SHA5123568312c2a16e00cb59e2302548badaf29b5deda860b0aeb20d194643826099966d2d185e29c7aa5e5537de278a059467ba40449bee3af64341794eff5e7810b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a