Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
2983fb4e498609d6db945c04bb8ad7e2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2983fb4e498609d6db945c04bb8ad7e2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2983fb4e498609d6db945c04bb8ad7e2_JaffaCakes118.html
-
Size
879B
-
MD5
2983fb4e498609d6db945c04bb8ad7e2
-
SHA1
e6d6556ea1ec5d110fbb4fc477f81ab33bea710c
-
SHA256
c3c404541e3c22221f3077590c8a926a8ab86b8058ca5ae4019630027ad2a8d0
-
SHA512
41b4139a5bd5f03b03d1dfb406d92f6a5941e2883a3c52ba843b00b19b8029eb7ffe6a3c40918792b43404d909ac5c12055ad0fa30560e68e174ff35a2a24c70
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7075ce22fba1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000074fc40d75e4a47b05022700d53795d57a4f09343de389965d82baa8cf50a0bff000000000e8000000002000020000000f0a5142319ea39f7aa12f8a49fc115ed90e9bda0907d7aeadb0ad227203794ad90000000123309b9d4a11ec3fcf332efa7b6425d3ea3ed03b04fca0ea6503ae1d25b0e2ac17910fddcebc66cd20c5952bad5c0de73e4bb7febdf6451c1e46b63562b2f7c7d6e450a2cae0fd9bcdeb1a0807aa2cfa2ebb7e90ab8543eb21dad29b6ac3de6bf6f79b50568c297909fa343523c9be0d28ae5eeb3a4b49557f0b12b41629bc32a0441bcd5e40be9e7ceb12bdad42d834000000002324145ffe003225cdfe6fd41bfe90947563e11ecef9e2adfd9d32b54b0c5c5085ad3946aa2162f89befb3a726d4f8c328179ef484ba0dcb2a3e4b345defe84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F3D30F1-0DEE-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000efb78acb003c8b2ea6a09e3f2427560d74458b924fd9b3f51cd972d60f962b0a000000000e8000000002000020000000519fd6645c2de00beab7bee916b5307d401f40811054dd24bbb1212dc0e030dd20000000a9001b39a423b7980ad09a9c459e46850075df2259b10aa5e25c1afd7498ddf8400000000b3265758d41488ff264632981b88700a3d6c9fa8c9147887a7cc97c6e87da9b65b5116cade5bde94f2330d59fd2d90b934961132c6f0e79237dd3befb56bab5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421412160" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2788 1288 iexplore.exe 28 PID 1288 wrote to memory of 2788 1288 iexplore.exe 28 PID 1288 wrote to memory of 2788 1288 iexplore.exe 28 PID 1288 wrote to memory of 2788 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2983fb4e498609d6db945c04bb8ad7e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9d61d7513035c052135d4d9b6a71fe
SHA19cc69f5f8f911c0316954b0d444315493fdcdd60
SHA256789eeab5e993e21511f5f4f688eb3ef916cce5fd3213bb4b97f462e29621e944
SHA512916aa9b5f00a3e959f2d67d10554cc99ff8b0fc465efc3eaeb064a6e4aeb436b811c8b725ac21ebb687cd7a94e74790d2b1ab6495e5cfbe279c89b61e2e56da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a48c1797126682e8fe58afde95a631ee
SHA10217b1f19fd1d6b5f310eb871ee994c3967a8922
SHA256aa6267c3dd9b2e927d0e7eb22c2e65636662af60824fac108ba67edf7dd61e43
SHA512886f481178ddce54eebdc68fd4dd0c911765692f627f603aa63520134aa67337eda3a3d4898434f3fadb7bc1f74d6cf658817293b2840f48773cc4ef878b9a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bec239c74c9d7543a6a6973c3cdd797
SHA154a6bc791549bc14d0ea1854a8aa2581daf7950d
SHA2562eee9d0fca85816316907d42b8428806f0e3cc60fd0819cb60ce47867f3a6b6b
SHA512e739c48374fd52f35965c7ed883ed67a1a73180fce838b688741b464e6978c901e7cba0e2d4f0e7dbc9ba7c48c2df67d228c220c4cc606ac8a441be58fb15afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d5191e2731b8e3395fda367fef142a8
SHA13d4f9b808f9d11e6185e93b04545097bf1f1f62e
SHA256b07a7292d73230dba379c0183edea857298f5e1fb277c12121be5a5cab4f071a
SHA512be6635d1309456e71946a807783c5c140dc53a5ec67303f6398a5b01ba9c8d59d0aa1a9fcf1a287c50085b7b0df21bf0b4878c1c6e35dd4de4a73d8461ba7dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230247f7c9d0c1abaf70171bf6bee382
SHA1671d25777dc5354014d01934f837072988281772
SHA256e7985fdf6ed6a7cdea62bf0aeb583a1ab3da6294479b1ec0d302216c9a49287b
SHA51233680595ace7b923f147cf363831dbec7d9494d741acf57b1fc142e505fdd67373ce106d8c92974a1e59c5ab17b4ac454a3da723bd0b66b9ad2027825f818784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc30bf4b4b8cc0b0eb1a36472386111
SHA1ad8badc28e764a7ac97b6d00de84e80b2659a7c4
SHA25652fda1c465abcdbdde7a4e76f1db8c74522ba226aebfe4cbf16fca22bf5a03b0
SHA51250d2964dddec80e32256f380f0ec616072ab136a8f47dfbc18906baac0d7cd99220c0ed37fd4dbcca49b172da5bbd37976a987ae1bb1c18ec9dab8adc15b8d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f3253f54d82d260a94316ae7b82c9e
SHA19b4f1e586d787b94ae5069bcfda116f79162f5fc
SHA2560238d172efb5674a8d325b80e8318f8afafb30ab48bc9a2dd82b1d62626a8f7a
SHA512886ced2c18e4a6c5958a70b2b22dbb2f927379d5a078db913a6933d197425469eb3020d95c3e2ebb242c8b8fa9d40606b4d8495134bdfbefa522788839937657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57573c1a3cc13220e37cc0a5460ada8d0
SHA159919f8eb09facc132f0d031c0afc071ed294f61
SHA2562006eb869acb373d0b749b86a1c041d577bc74d248d61d638e26e59f376eeaf2
SHA5124490b2318599f6f04680bbd78f33ca30be156367c1e6f7a5bf6db92ea8e85e11c34aab881ce45e654997a3640176faae9ed3486262720fd869528f492b794007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ec758054cecfc4a425fd4d74688f3c0
SHA1b1cd9ec588e3404bb5b40e15a48e6c97f212c789
SHA2569719afc9241f4f0befb31bfce682a4c3fedd20dfaf18ea18d9538bcdeb6425b5
SHA51281b6c6256476269a77757dddedfef77607db083634688056230a800602f8b44d02fcc9a4ff342e5a3222c64b7a589101ca7dee94ce50f4f3f453840e47f56ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abe013ad95f12a04a025856198038e37
SHA10ebeb69656b45a4c6cbadbbf363d46e70a26946c
SHA2569ccdca5ce65df33c3bca7fc30b203ae27d054f67dc4d61439e17797368b53613
SHA512421c1e34d9884f47602bdc51780c63adf53e6dd66ad739ab88c0fb39dbfaf053c76867d8b208bca58a0edd18bed70de92bf5c608aabee2200a3bd85582793e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682d922b55156abfdc4661710b29b18c
SHA180b945b540522417971cdc00daf16c3d1e8338cc
SHA256a954789092d9df1a780e68540f151819fa3dffd5e2bd92c8b3e6fc1149fb6f5c
SHA512204cdb763399a6ad0181714d632c896c6b856991580be50590c16e50c2ef61cf6c99e74737346e0309f0e54def107d288c2d2cfd45bf464d21f08e40af43d5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ec1ca91527c831854a4ca52b0447ae5
SHA1b3bbd408538ae21106f9e7b3357446c8e08c9069
SHA2569ff5416430a2cdff26d508da53239039b247713e97acca232a5153c16d6a752e
SHA5127310f1f1c18847b9b126a81b824e11d8f0210e56e804b29bb40736f50a958a42a63c174dbe8fada8de5705d1ac3f9ab950f6ef0cfc4f39c5a834c694027ee3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c990001bd755c282191ba50a0c99fb1
SHA12503a5d0dcb871408b9a652b73252b1c290ae471
SHA256c52b7fc2f8c11108c110ba9d554915e1c7f5e1201e5ef8d0c2b0c710d347afdb
SHA512f1828ecc304d62ca9a86eeaac1eab2de702ad9fa6e58121500edd8b722d823035dcef9aa8d16e3d1d31bdcb7cdb4e484c057bef07a8f697923890e7c377907c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5244b8356d2ce7f09b7d62742254faac8
SHA1b56edc186becb3a62a443ca3518c5dde9b0fde56
SHA2562e724782c68d0fd8546310ca84343d8f06714efb9620aa2e3a680ca75f5711e1
SHA5121ca046cc99e1ba5b9927e71dcd960031e4c08af81cb770acd21003afde934b63e83aa9195ea6e9cc1a59181cfae226267d1ce9ab586af8206d40caa73aed6fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f94dc7c4dd2cc6c6e607ea745a7726
SHA15c0d43095e1b93cd9ee517993d489aac6bef59e0
SHA256ae0f1c87e41a6b963ad0d5fe1d2122274229a310567a9498c27739f34db5cef2
SHA5123925b26a9e72f4c1bb6193fc51a836f1080b2ea88d50268bd18ad56d8d0ffd0f5b5e0d62eeeba9a235e2d673200a6b31f69d07dede3856c7659438c87856b9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589476f1564937dc2db416bbbb46a79a8
SHA1afed13b688cfdef82412723cbaa9ace243c11beb
SHA256c3016e7ef24fb18bd9672987364ba8ac1c9336069ce61e155c2873c9cf161352
SHA5126abed6bf871d15a89116d514fd2d1464921bc9118b9509913f1c2b2d0fab4a24e9f8ed4fd0ef16b721d75454ec5a2cadba50312f548adfc38c7d619c9d89ee3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c0063e95f08ad61f253a8d3dd4b526
SHA1da65b783248b1c5761ce3da88455a1a3311a1eaf
SHA256fd671240e7ed2ecc421feb2d14f255960b59ab36efc6418b607e843d54cd2ac4
SHA5126236b3c222e105933d2ba68869812e5af69114183b4b9d487008e62186d513f438c0cc115c19fafa607aaedb9bba91e085eca60b285649df49bc9ce2979f0702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6778682ad479ee5517d80ae07141480
SHA1d623490bd61e8393e5e2092f1e1729dc89643664
SHA25633199767b9cafb5e3a8fc850253a2b24a7489d1a0bef08eb0f9e70b9c5d705e8
SHA5121dbb67327a52c131f5de614af5522f529e0537d643bc03f65878b400ee8612dfdeacd679a76636538cefa045151089d1bf9db88fb9c1492010cd97d2b8a6ed80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52384269982f04860347136c5c6c6a6d3
SHA13f3d1e29510934031c47b3061c56b3aeea9f2258
SHA256498025e006ce93deecd8aaf7f29eee5a1f3e97bcd7b6645dbc331196d5583b8d
SHA5124293233cd2baf7efd41159e82250599a847777e0e3ce84df23660a4af7bf4b0c8f61a5397463f366623559eeca130deb9bef6a15b72fbffb9a0a8d0d56e0bdc0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a