Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
28b0955aff6fff7f558e25531410b029_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28b0955aff6fff7f558e25531410b029_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28b0955aff6fff7f558e25531410b029_JaffaCakes118.html
-
Size
42KB
-
MD5
28b0955aff6fff7f558e25531410b029
-
SHA1
fb2f133449bf9409e4e0ffc4930a01e7c964c74b
-
SHA256
573462c59991626feea0dbb04d4532cf1c70e1ac6050bca2472ed611a50a206e
-
SHA512
8bee5d22e35f1ac1abcfb0724e02437846740228c96837818e0376b13e776544f5314ead73c4b6c26969ae3718b2079bc37be15f9898226c65ecd3668f367075
-
SSDEEP
768:OayHHvPWloFJPnob+zg3fK4f1Yo6wTu2SVyr:O3HH2lSJPFzgis6wT1r
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FC842C1-0DCC-11EF-AE65-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c1aa18105654ac01422de628bd2005214be3b25c7a57f88bff6998d94b93f6fb000000000e8000000002000020000000493cacfa5459c6d3b80615ee84b65be8bdfed29908e419c152c074bb993b48d420000000e32ac7e00303cf7c598334678d074c20e8690a1b957c0c40569bde6dfa4fbf6040000000c3796e8eacd571232ce91fbf398270172c65326cf1d09069454626ceeee2784ad768b53f2d8541c46d82eece3329d0e4065e9bb8cda2ab24ae23243c2ee4b021 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421397557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30bc184ed9a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28b0955aff6fff7f558e25531410b029_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e24dcdd9e3e3e46d818eca56fa43d3b
SHA14a7a57037e61352bcc8ca4b1d39c6f285c80ccf1
SHA2569c1af07808a8e26da8c3192ec92dcfc3888b87a741f1241f76030f60ab16530f
SHA5127226e6158d274b0a2f44e10af20b8d7467b542b1da6cf1420cc15a06bc62d392b21850e232125be6721cb3b863fc3e9037329b6b3eb15b608e56f01a48b8b702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0d2b1e72aff1c8f67b22abac2c355e
SHA12af655e1dbd4d37a3e91f6a8f340142dc543e81e
SHA256e80a2596a9e90ae850ef55e178f9e434c821812c2135f30959079fd153513aab
SHA512932212a3f6751af6a0f268f6c8d288a310e28af3a6b0372ffa050a4c52dcde09af1f7a4bc5aea3585fca93b85dc09150d6bc3bb7af5aba9e4e7cbe0db7d9305b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d10bb186d7f1207c435db066930c12ca
SHA1ff1dd73e0221bfb31fdcee810e5ca57b1e1f9b34
SHA256418f3619364103a739fd4aad9798d05f542b11dbc4964294c60a20fd4804d218
SHA51274fa6238c70f062f5b0c12a73bfac21331307057ca306eb6dfdb9456d8f46b1b4e318bb03c7ea90059a8a891251e13f16088427ec5687e1a908923eee73d45b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2fa550f0453c4d0a231ad1624d81cc1
SHA1443622f154c59e2cdbdeb564ffba5f81f8e5ac4b
SHA256a1f0570919e7b6430985929bc5608352aab3be6d3f8ad8337291749dc990e529
SHA512fb072513e00a63f43f6d5af8fbdc38de222db19f115587347868619cd5b230722da69d6f76f7e4f92b44c8d6b7ddf650aa246ebaee3104b5303b09bb1b47b06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5795b600a2145096f760d2ff487591f2b
SHA1c52d5031e1ac45bac7b9fbe7859947f1351cc03f
SHA25689880aae9647ebd4ea92a0bfb0a7c5a52e49af81e178db61e4fd19aa142704f3
SHA5121cabb73cbc89e3908274c766cc4fa0f515f6f498c58b7ebc6c9f5113c650f049e02251d453514c0ffc96064be10a587c3992f70b2165eae639b41fec72f0f0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5469ff900dfec45b462fe52e298bb6a65
SHA112092e558224262c4810c7767f22c221dcfbe906
SHA2564a01c9a65e365b17a6747ac893700d06cb2b4d2ff536e55a29bf788ea217cd44
SHA512e5d1eadb7183e5711cd01909aa697c12fd2c64058675dc38fbe6399c9875434e95fdc6c33db35631a5c7c58353281339616dda8786b6a6226ec350b20a7f2274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54486eec38887af9e31fcca1d6a6f5c88
SHA10299b6da5ed64f6756ec48927b5ca77123db800f
SHA256b3f702817a0106269aa46b15db56dbc5b4b111f1b2ad067e588f8473359d3594
SHA512c0454c8e04a3be472da84d083ff0eb2845d7d11cd4998382f860f2ae351b1562c58322e30440d7e90836b8a07aa6064923330ceffb2d1fa7d7fde38be6991ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a023442c1cec312c985649963d0429ca
SHA102eb6fcbb61b8df040bcee0ea90382cc54890d39
SHA256afef67bf2c7cb3127814430d023bb126649c55b8d5861691fe4b3fbfca32285c
SHA51212a054e1ad63767265d48eeaa07cbe9b59ada57074d8cfc6558c549cbeabdef0c419b1f97314ddde0a070ff09296c331103cbdcec11c4a214d97fb292283ff36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa618796f750e249f3616d3db293e4b8
SHA1c5ae269063ec7c149141a8758d1d068ee612d2ef
SHA25609a7836eaf5fb15b4f653c5d244adcf32e4a043505058ac21b1214208343fc05
SHA512406f815eb4a7b1b6bd6ddc00617917a4956124c8fe8e256433ef4def17afbe6a084c72ce0525ffb0bddf5aacc941697451a563820c0b438b3733295aeaf14114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c10721f3a129b9e7bfcfeaf136e18fb
SHA1b54ef30ec78b5b21e15e875382d48b777e7548d3
SHA256a934cce40835f7b2d64fd9297bdc89f9a682999c883cf70eb0bbca9ef13e0ab2
SHA5126ea46bcf95ef76d826b02105c71ce90e4c7bedfe3af709c90d80437c9e770778b3941a715c10fbffd8427fdfa58836e857a4e452d472077a35e4b79239d78a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ac74349cb9f63cba61c8fa34d3cee1
SHA1ae8c563943cbe774bc5dd7a3c0a740e70c22a49b
SHA25673c8c92376f34d5b78792487aaa8fde8df2d38f36e9cbd9e23fc4ee2981d451b
SHA5121ed067401caa20d1ea52aad473b7b64b6cc400ded22e020efcda9796e75ca092b6b45c0c98c00301fbb25693bd0f7a8f647bd73cf3c2a4ac7402ebfcf80277ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee151131369258d6179529c6adf63687
SHA132bb5bebe788784b298ed49885d212bf188e5979
SHA2562f4397148e7517a75b04c3ca84e1063893bde6b242122acafba59d21d5e7d1b2
SHA5124182ac40fc6ae7ec42da48ab51529edfcda004dd4894cefced22db3a8d1c6332f3b91991e1b90f00f3ed2298022936a3a182e6c8f9d38671be59bf5661faba28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c965d3f5c2b20e95d224f7a7ecded2
SHA1dd28814cdfe740d19af83cc4e851ecc21446cd84
SHA2564547cc8f0c78e28ab06cc55be32f46d06a596c878a5e3d8b98ad7e2c4dfadf50
SHA5129a90a73f51fc34a33c1ccb4a213bc12c34c84abce255d0b46a5eff846f408ed3f1f156859c7585e2744d30a4c8651f70a0890e40c483ec84a1d4cd6c0f708a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55932f5a94a560a60414498d7d0fec566
SHA133b54daf43ce5e13576ee533801591ce11d313fc
SHA256010dbfaa079c8effc8f4b12041f6ee7ff89f228dea76c49f0fb29612318f6407
SHA512bc7af58b3336e2f9a21a76a5c813184ffa12beecdee8b70ffc5faba2ef17ef581d3586c13a6049578911c2392d2f3d27b6f8e254f529c0b861003687f036d047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5aea3a42579bdfadd980f246d52580b
SHA1bc2b8c0d4f0a10d4ea8cf105f1bbcc11a29f8a66
SHA256c5e627b35e79876a47890343cdb9c9dd8793f5bc83442b08c07244afe9409e45
SHA5125cdbcdd853ac4e8e66f87bbee26ea7b275555d5f38944e2f3b66548497a4c144b064c8f4303d5e1689d136ebf23cacc95ce8f35244c70cfeb5e01a466b6749ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df14d3f0dbdddc0c0578927c921c3082
SHA17f7705c86743aaf2654cca654aae26b7d0ef96a8
SHA256f21e420b7c1de8738f41aa7c101ed1043bb8d178e1d99b9b9dfe9c1063dc459f
SHA512a06400f2334fba87bce5a399183ffa8b350bbf9ab105512dd52ad98ecc74a1b40d669d9acb9e7fd2ce060b5a2642cee9a27d99ab1027b187e6748144a47599f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d5ab91292e2820bb5229eb80703c30e
SHA19cc3cdcce7f4351d92b1f108080d059be9b1bd63
SHA2569346a83f1417ad566ca6c9b5dbd39f652e3f8c572a62b0abaceddbdd42382dc3
SHA512dc236cb5f3150ace25bf546b412881085bdcb9a0d8f35a2a6de7822f8a6779cd1c362d12001ded7dc5511e74335052b37595f894b18b8e69090d1eb484cabbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f3716160d83ac2914c77d3ff277068
SHA163c4c4df0b8ddfe0b39be42f44818257bd642048
SHA256b6ea1a3cf7ba96ec9883447b2882e14f9e5a95177186604d1a69a4d9d0983fdd
SHA51229e860f4a768a700c64ee9de34b462b6aea893d099e2b514ad598f1c999bddc2a67d1d60504f99caf474e70bb1d9c0a0fcb061a90319358d1648b33714f1e130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f188bcbdc334239ced2f29c30dbbd015
SHA10d5519f6d787619c4a0d535e1d9422e3c4a92e40
SHA25668b0a3fa3cab95dc3bd11a6a6b3d8952ae96fa847f8cbf8ab9fdecc5b98641cf
SHA51241596616c87bdc12fe295640bb9182e6a355df9a02402be2e45bd486f6981b33de889987d3feb9939315f2a808ae91063606d2c621e10623d098418ca541876e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59686eaea540c214ad792e2f352cca746
SHA116b80f123d1b364c600e978f3e8ac78e8ddc3fb1
SHA256f8818c62732abbca98a664a1c20f11fccd15d93efef136d67ed3e3cda1e813b3
SHA51207250e9f9b35f6dcc3d460f8ba28e124c37ee457e75d99baf960e85ce579cfba244f287d48586749f664ec434aa96dc2900e2fc38fd9e217e9989a63aa675982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a235f79e8f59bf25897f9db66aa3fe85
SHA1c1aa0ae969bce6a3ac3ea44e57c99c34dbf6b847
SHA256fab6609cc9bd9add34cb3cabc918fff83336a687fdc65a71a84dd5f9799a386f
SHA512c2cdba0ef3c6d717351bd025d19ed73f4727bac5fdd7b35d8f2529f77123c857f90a03c251846f026ee11cb0cb249584b21ccd2bbe6eaefec85c08668e844fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2808e02cee18123ff0dc8cc400c0f18
SHA12839348b64409ef478a9d5bef11949723b1ae6de
SHA256d7fd8ad79759f58075e2565f2c0c3cfe0d87fe9ea69cbeceb222797b6096b7ab
SHA5129cb21f0c070bd06af68aeb669f7cb6af2380b3e4e4cc5960fd60d0f76b4813ca7a9c1591e38a725749c4e3a12d2f3b26625406430637b029e1687c1d1dccd17f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a