Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe
-
Size
218KB
-
MD5
ec04d77f3c7cbc6e4f5dde8450177840
-
SHA1
758552f247181feec35c72a7941563c275e17aaa
-
SHA256
e7a869a5a36281b534b3876c9fe34b715f6909baaec125c780cbdfca6387592b
-
SHA512
bbc6662a515017bba25632903a660f6ada8a3c53b14c06c3c460230301948735135d609dde53cd74ca4ee1af7c76b315877cdeaec92e57112ea6a55325799855
-
SSDEEP
6144:fwogBYn8DWLDCFbRm2ZZygZ5NBeGv94rQ4HMK:YoD8wsg2PZ57nkR
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sssss.exe ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe File opened for modification C:\Windows\sssss.exe ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308384468d8bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000001c928b9dfef100b70592b0e2e561d5218be965cd1fa74c8a6f63c8d4a1beefea000000000e8000000002000020000000b01776b1271deb77bd7d6336f68a84f5f399033d052904f6d96a8d649b3c850b20000000289ac01452f1bf9ed330d979a5def64ce9d9229998100aff8153aaa708c7641c4000000053521bc7590ab085b999aeea0e1aed79bb4db1e59e4a82a17ee1d44c29e45f3022739f98cfd94cbf42eb5fe7db45e82533805d00c4480722250fef4588772960 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71F79E81-F780-11EE-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418946021" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 112 wrote to memory of 2020 112 ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe 28 PID 112 wrote to memory of 2020 112 ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe 28 PID 112 wrote to memory of 2020 112 ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe 28 PID 112 wrote to memory of 2020 112 ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2584 2020 iexplore.exe 29 PID 2020 wrote to memory of 2584 2020 iexplore.exe 29 PID 2020 wrote to memory of 2584 2020 iexplore.exe 29 PID 2020 wrote to memory of 2584 2020 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec04d77f3c7cbc6e4f5dde8450177840_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://comunities0rkut.t35.com/#GLogin.aspx?done=http%3A%2F%2Fwww.orkut.com%2F2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4ea8fbec589bfc76cc4afb92d16d76
SHA1b5dac89e02104c842849d695785f7061651a0d76
SHA256a1345fd756b5678c219dcf5aa699d8b967ea0560ad5586d49cff30ea62e46c62
SHA512d64cccccdfecb990732948c583608491f836636e56c3a941362119118817f49c4f2edadfbd821c18a80b1e4f2fb93c4af21d3ba129f4e52cd030e66572b365c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d9ab5b66459d0bc7b9b5649db007707
SHA1221e7e7d92c3f8a39da7ddfe728e783f1e3af426
SHA256ea2c196c464d328d3fc542f62ba16cbb9b0ed484166ff1cc0a2b27ad345e5e43
SHA512c07ec18cc723c2545bc22b5ba2fa922770a42245b06f793106e8ce399abfb4d98e1617c05a0171737715994ece7a7ce46152ebb3868f170e35b8be1f45a8a29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecd7da91a30962d9282c5fe719eb0507
SHA121bb0d34489c52dc0be1418afae0c30257cabb29
SHA2564b1477bc85e7aa29315a97e7323177c270506e7d28c01ef5e4c4e7ee27711075
SHA51286da7049cc2f5021518d78ad37a8fcc945e3382a8b1af1450b51fb48217d28450fafde4b55d03e6fd93d83a6f3c0d3182f5e96a45546f97cb4a24a64e3fd8810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8eff1422eab7bdd2ab1929bbf44aa4
SHA1283df23b4594d0be42e68890561a8d9f80462d2c
SHA256ae37a0ae872e70c1c7485261d60a815725bf7b5810b6e197b24999153a46f149
SHA512a487dac0f5d55632eb0f85835179f370260b9089ebf1e47ec6c95d66ae4b5ee145e24eadee86bc02773d1c3403765916175bf62060760182df71ae3f50bdcd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5359c5b39c10d767659bf9b51598c39fc
SHA1215f461da56c6004a81ff44dceba4b7b6769cae5
SHA256ccca63a6c10b15dac0a26f49ff87e71297ed660825a07fe685da0dad8781f87a
SHA512df47b2c4e55e222f0c33c69af5f09f44860fba9e64ea6e94accf555921915d2a8a5aa9f32d5b5dfe95ddbf6b7f2a0840b6ca4e777ce673167e415bef3b79cf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56849d1087c8b6023bd0a1dc4cd3e4dd6
SHA13c4670277e511a6125854d0e441ac84e0a0776b6
SHA256bbc060ca6a5c2dbb44f4c494a3598dd1ebcd11681d69ac9213e91450c7c5706a
SHA51239451753ab30cccc4e2018da2c74bedfb6a0962f975a6fceb38dc0c357e1318312ce9ae34af9b2de6c6f1ecaa6ea6d049959f565d04f835679223568eacfebac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c6bc8a665d1b243281a574f2bc6fec9
SHA104a661e2cee29ed7820a79407630cecf2849784f
SHA2569b9f19152e6c2ae1e8e8e331741f9528cbf7b6d20deb11d96129fe21090200bc
SHA512c656faaed730a373e83596fe7c161be98c68df6ce3c2e173dd87bb3c14e9e4f73ba70c687380629bc41911c1261dba374040b90b64702d54f7915c1264934713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0aaa698bd1b265917df4c2036bf1ab5
SHA131349e731ae3f7b16aafdd514a7f6803f178803f
SHA256e939fb218888ac85f9041ad52286588a28cf59ee2d4cd68a82985cc6976d1006
SHA512cacd8542bf5af991b6eca520161d52a00a48741a983b015a30ded273785bf68fac281ef9bfb89105c7ce2ce2cbc56329bfbebda07289da054f2409a2c91484be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05f94aae784d4f38f591a043dd3294c
SHA1fa72724dc42929dae7cec7ac6ca1577bc1ee86e5
SHA256d2689417239ff9f74220b2306f160e8ff8a88d7a85bbbe9100e3e7aabe987d20
SHA512f99257229dbe5805c4edc879345b57f7280ce6499934ebb6a9a696da92ef031569d40641e041385034db35088cbca9ae920c99390e3b74f5f9a810aaa06ff262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ba7fa464645df141e230773a5d441c6
SHA17ce1bab3b74a6518e7a3a7ecfe39af75099d8a80
SHA25648fa3c4305566be88285693c09b701a53fd6061fdaf5d5f72eeb71ed857b46a7
SHA512b903b3368af6d6ca6ff30a67dd138206e481ed69d829bd4dff493047ebbc31cae891dbe7ba9f33984aa0f0f3d22352ed94083686a124b9d76e34ee1d4fe70ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d1898b0b377359c0e4249b31611e7e2
SHA1368d345998a73cbedcf7094a2e8654f33d8e5b37
SHA256902126b9484423335eef28514e81054ca2eed99dfae9209e2ed3c75b4339b4e8
SHA512c265c7734f0f85f92c9b35e4bb59ae6f171d51ffdfe014dba9e43dc6d609ffacf2b8b093a406cc1397ed2cc80d0f82c5b80ce5fe3ec1ed35cbc391e582b793c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da560a39944e38fa94b21bb844aa86aa
SHA1ddf6cec2c38dd5bb7f4d811d9e0e496cecd4b516
SHA256193b3121a295aecb6b802e725abaf3e9b0ef56b2fe893bfdbf1ff6ba3a194c36
SHA5120a9f00547c72a6f4e01c99d944daf9688cba9954b943a36146861bd0c1ce82754c9338aabe0ced6688f745eba2314f0163efd5ee4591b49e856d609daddc4e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5969a1201c52c432b6bb0ddca6fedcb82
SHA127464ac867684f4b51082db43108581b943e0047
SHA256ca1a42a7e0699b1d204d73669ae1bdab5202afb7921068c189f3e4a87aa0b486
SHA51252d05ec6e8f6c44bfd0938f604de3470807a6fda04622f0207eb1ef02e3dadeb2a33dd694b80af98ef323b000af8cb5ce3649294ae49d8fd05b453d95c923e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512624205afd316e4d84166ca1e76f18b
SHA158a6fa85d4cf292d39819718917fa7be1b6428f1
SHA256f8172e22b5f943a801ba3d92cde336fd45f880724dfdfc1da1f5876855cd91b8
SHA51231c259cca097a6d30b5a855c63c0c5dcb1afc99cb7ac2c9fedbecc56072e91ee293468111d8d6a06c3355e44fe49abe3b6b63908fca8ca643f9e421e7795e65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4ef40e2791402c50603c27607a4750
SHA15ca2f22506790ab961686d375fc4e1bdc6903363
SHA2567fb1104a5c18facc7fe307a24cec472c1b632720efadb698de8e4ae1275563ee
SHA512b7c587d8c70b98fd0f237086a944a57fa5057bf4347d06c69e57cc75e87d3cfe8a3e41dadd4e738b780333ec89ebf808d03f3c002fe81ccbd0b87dee74bc2b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb19a1270fd24adbcfcfe9a3c3585b2
SHA1c78b1a4e0d710cbaee39ffaba5aa1eb2a72634d1
SHA25646ae39e8e8b3b437fd36c878ddece2ad255c2759379062312ae682d933169846
SHA512de7cfceff8379be69b17dfa13a707f4d8fb5927d8e7992c3c1ef28ce92e6cfdcb5225618cdc8b02728a366bb0c254825fcc7498d503bd48595f68df742908036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5206a13285dee071bf08398b2761426be
SHA1a1affe241a9f5e7822c7d5d30e857311a86b2b60
SHA256c23c66bd6d2db9c65506c578a2f74fb93252622a3073011596c1992f28fcfa0a
SHA512061d120795571145624bc522b7521e654ea0c27a5d8e3da9346e09507aacf44919548a5d7e32247c17834cfe925e6fc7d554b7d8a1ddd2a946fca1d20ef542a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5ba1a987c4751ea3718435acdef62f3
SHA12e7ff5438f0c3efebf431c8cf90fa4a07692d6d9
SHA2569b67dec6e75949d99bae67e23446ad95e14ac0236f50fc4540f5ced7b82f2183
SHA51225ad55cb722b474399fdffd5fd621d477129b57c26c2ed44bbf9ff919d65a8683a0c96d1fb4b04973e047a5068c9c5de163b8e30d33119015936c17c7bde9f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c11d44c0d13ae3717ccf658564750a0
SHA1868cbcc348bb1232f2db0f97a870f8a745928032
SHA256e13e9e7a5e03f9184dabcccaa76edc164106c85df2b65bb34b6b5fd43319525c
SHA512630705b9d8c8e9de098ffb03d4a7585ce7442d08da21d334e6c6633ab49a68861be0294e7d7a26cac78398aee9cd321e40d9d81887900fde830eae6be91c590e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a