Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
31cfcfac670a7599efd86a98e7f56a8f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31cfcfac670a7599efd86a98e7f56a8f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
31cfcfac670a7599efd86a98e7f56a8f_JaffaCakes118.html
-
Size
126KB
-
MD5
31cfcfac670a7599efd86a98e7f56a8f
-
SHA1
e62d2ef4a20278e98c1e7187d48cef75d0e7699e
-
SHA256
65a7463baf4d6655ba9e4f340ae265c6f2caae67e5bef6f8ae100e2f22f10c1d
-
SHA512
3724f9ae0dd5a1129a0543644b9145a03074f5605fbd481ea50f4c5e5e5b57e2206d67e6c2e368cbcd13cfb9842be3f577c4c49c567ede6976e4c45d6d56ef12
-
SSDEEP
1536:pXQ7KRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:VQ7KRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105dbe603aa3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000006970526d52bbdcf674747bf9b56873ec7e167999e35e3bdbbff7064c858fbc8000000000e8000000002000020000000d2066d56d8377bf6bcb28ecc5c4d35e45de594cb8a891d4d1ac79628a865ba2820000000bd19b533f3d7778679d7d38b751a88a56a76f5d0bf3cf3b6565a07b7fc0dbda340000000963525b9f70ac5c382979491186f767bd2ed8550f1bec9f479c8fd0366844a5dd67778c2831fb9ade3290e86e8cde2025790837825e058aac571aaa9785a8613 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421549244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C4229D1-0F2D-11EF-AD44-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2524 1720 iexplore.exe 28 PID 1720 wrote to memory of 2524 1720 iexplore.exe 28 PID 1720 wrote to memory of 2524 1720 iexplore.exe 28 PID 1720 wrote to memory of 2524 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31cfcfac670a7599efd86a98e7f56a8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53695e07e12e37ab0a502aa8108a6d810
SHA1d12ba6f030caea6be0f5384bbcfe700f8ae185e7
SHA2563d6536dbc05d3f6fc2631f8fdd104f924ab8b89e45506f32d6840e11359e8390
SHA51265a652f0c63cd8548f942dc60ce0a9b6789a65ee95a69968dc0c0048a0135dc2c086a939289840475d3dfe9d5848a13477d2e6f0668b303923921f89b26a2afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57789d88c26da287bec0753724e8e10a4
SHA1639406f8beb8993df9ca94a2c6a201a367bb4c9d
SHA256ae29ccd7c5226abce0a5d802e386e30100f5a852e79392ea1468289beafcd37b
SHA51223a36f2bf1605c08e21eb31dd6a86b964fdb7c0bb92971d9b9df9539b6ed42344e100fbb03671d29dc3f6334dfcfe37210f3681b73353c9e52d7404783d8d6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58422c8aa6d4b91ef3a1f950c0cf8db7f
SHA1aeabf085442520a05db1b89431cb630e45ce128b
SHA256633785f7b6d4da7b2fe944722035abf4667b0fd8321773913462365c65c5712a
SHA512a9f440693e73f04c34fb506948cbb36d0f955c8c88aaf65d2c2be26060f1197727776597a6fa72fa0769659d41b0421515a21f3fe88924a5300ed244587df14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e61286e6450c87d7455a4a74791d27
SHA169281ecb0f053bbbdf4e7eebd9bff35e3b1f320a
SHA2566570b106d7011412f1fd5cae5a01fd737619e65383249afaa9ce6562652cf0cc
SHA512d540d0325ad54a5826453dba5ed4f0eecb2b9f219d5f0ec9fe37df1df4fb0ce020382277974eabef76254fe46eb83203da7fb389c5855bfa05d6e6cdc6b16a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5576dc23baafb26300002dc3391403b91
SHA1d050579c2e1aabb66c78e266b1339337d71c83d4
SHA256bbf98119e0b6e7419e779ba70cad4cdb168e7b2daa438f274a8fc186f0ea35b0
SHA51231b51635425858741125d3af2deaf3bf53caf2daf9d3f9eb1286ae0f512936d5506b6a22dc7cd006289c919de3c915e53b39ba0bb7854fe5aae7b39ef552c15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ee3874d6b26a8c4169474491cfbba5d
SHA1230f7f17150fe2d62e1485352e673d49826d2b57
SHA2560fa779f96525eef405df85a76da17990b76d02fbc4d4e098c92f129f9b2af5c2
SHA512a040ed30b4b07963f5f818608f9483836b1534b23ba478eec08e4da688fb2951cc8aca6f22eba2039e2ef7c5200e381ff9152638fccd138daf0ca67d64b04900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc5c9efc3c8c7f972308893e96e348d
SHA10f9e8b50c6956507caca8d7ff3396ebda2e22354
SHA256cf9e6a1d98cd7040a4bc255605fd83f282cec247277283cc9f2cb3f551ba75bb
SHA5124ab53576b5c1f8c44259ba486f81540b29775daf5221733f1a0739973f10fbc75b06b1a6ae8e0002d2adb207c8ebefea97406752c0a93f6c241b31c9c23bfd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c6a6b661f6febce70837e29d78d2763
SHA1eb5435f5c08002806d0f2f383bbc2f2a4ee25f57
SHA256aac51b73add51c82be867097114ef9e83179154b5cb66c33b590a10b6be168ad
SHA512679aabb514ce39d988d292b44b00900a11a380d6f19808c7e682c9cc9bc7a00e70921663399f5aa952720578fa74fe24af10e02c7e8e241a8032c7e37bc57ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0b32cb9ce38887e22faa4ae60ba177
SHA1c947ddd2f4011bd91fc9acb5f44fd0fb28dc1520
SHA256345004696df5c4a583a87f8fe644c671145774a251ca803ad287aabf607d1164
SHA5126a8b1264bb2b79aa5d1929f3b742cecb8e9f392f3eea27f197a1cfaede2c3e4fc9d7a4451237e00897527b6964e7f4e1142ae16ba4966b9b558fd34cc12c2a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530b3bc4394d1a2223be272a6977b57c5
SHA1c9ef0ab0e867f6ba594cf8d4fdbc28d4fecbb80e
SHA256bf9d7943d860b2fafabc575f94c2db8ec63fc7cbf680d368b3ee2444d1cb3aa8
SHA5124dd40f2df30dbc8fe489e7fa7dc4d6bc18fc411bd222616ab82eca227d32f7bcf8f865ff829db643ee5f6531425e648ef81f96327688eac6e3f69c479f6c57a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd4ca6335eb459fbf5fab96663da63fd
SHA124cfd5580beb11d93d2b76449d6dbe1508319546
SHA256cb65ee7d02b684c8341c975d6fcd282467ee02ee8157a6481cfa22de19e479fc
SHA5121b0de029bfb3a320d20ef87aa38c991e32a1047b87530e28652c199fa141ed53dc55ef4bfbb29ce4c469eb0565b37b059c3cd340ed12363b8d04d0c776513c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d48738509845d66ab6a763224932632
SHA11e446c7550ce22d2d57dfd877ca6c1e86cb74af9
SHA2563109e34f3f775c5ed1ff39f8f8e76e0ff080d70a0fc738bbe08540d63885ea3d
SHA512aa8af402b490a4a1a92c93bc469b2a4bd52784cfd487a88a068699934765c83fd1317b1a661e0ef03acbf9913437f32dc58e38b6363661499c06156d74e7e5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5497d69f01052f9c71e3ac7c6c8003f49
SHA1584aaa1bc6ac14e253a4ffcb4fa77eceb8d735a4
SHA2569aa2e802cc2e73f3873288932445cbcf7f7df188dc6430199e92e76a934f9e3f
SHA51236745fe60eb2c66e0e4a3c971e6070f6b822db6f8024eb82506c0369f0c4b6c4bd1bd48170224e1ccb5cb0ae9009c1c4b598ad4db6136c19d2feaac4dd2c1da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6db93d4e7b528a8c81b033b90a3471
SHA1c81f3c8ca0daef89554ba9a97ddcb36258308e68
SHA256f82a42c4b8807cbc0f9ef88b98b687567d89a701dd97c0ad9a5573105d620f04
SHA51299b288927c6bb9b288b09b08efcb6644cf3328185b3d797acac6549d93df9f411d05b4d1564306491c98f14d73017483ec8f742850c967d37c73aab523929f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502a85e272bb54ded049097ee5093b3eb
SHA1fb70cc2c4284cec40db38071eab05e7d5c5db4ef
SHA256dcfd3169ff7f13dc90f1e10158e1120b0e455b0e64024cdf4cb5086cd34c8658
SHA5123cb27cb10ed880c6a1273cf0ff23eb271a6de1bcf9287be6f0245e1726e0dea67717602adcb2c271d9af7d9ec3c85cd34dd4440e9c89d8fbfcecbee823a460e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518fa032c3e50278f073cb40b444f0b5b
SHA1ad3255f797fa7b8877181064ba2d0a08cc339662
SHA256bbf604811284d5381d64919f106fddc37334a64fb3f7d659ab12909f3cbde914
SHA5129cec2f33af93933ae2e7c4b947138394e55c6b3368ba28fe07bc2c3bf6bc03f24a7d43f3612b4b5888270e917a5fcd7e1ab1a815f1d86db129d18e328563225a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc91a97ab0ecb600e6d76544bbbae968
SHA16ea33f9c458bc3c8b19393a85570126905b59550
SHA25686f585426b94b9a7dfd2578d0fc305e5c03890faec904a84a2062103e3c5f24a
SHA5127bfa6d0a1cbc87647c1f6fdb6d25401a6180a7ce72cd12986ca05a5a98a2cf9e5c58a0f61013ae15f088799238a37272347cc4f7d97156b8b1ff2f46123f1cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508bf992bda7e7aba26211f5316d4762f
SHA1b871a637e25bf490d03e07ca9db86c87d53bf5c2
SHA25648f22858139141ee31704422d4c23d9c69b51d50ac44522ad2ca103066981241
SHA512d37aa368228b51d58a90d35797980df5659c3fdb09ef82f2ad18062922c943d24ecf5271082b6b17c4590f0deda7daa671c2f1ae247f377cf36364d7c4d260ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c35dc45e2bd91121934b84183d8859
SHA15aeb0c62cdd195d51633e51fadc12bfdb5d5eea9
SHA2561ba6e4c185982064faf151b2ac9b4c69a27e4a430e16e3f3b50110793dd236ad
SHA5123e2949d5c6f33ae8ed2bd0d23dc1da91b28680ee14546a92832c06e719c0f6487cd352162922a85b12159b07cb4d3b9141cb49a3292d91577fd6a03c170d833e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8022fe111b6d7abd77129e7295bb930
SHA1d0dd521d90e1bfa03d3be26c7fdd9631014dc105
SHA2568cada857c2abfbbb848f91a92df20064035a9bc1aa3b5b73ccc46e85f55c9c84
SHA5122ab730edf6a69b9112b734fe99bb742ef94193231d2d6225d141bf951c0ffa036c405b9fe121ab1795c161a516422afb8c5f3511c33f57ef4bb756421ca44b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5236a7500836d28e0b3b154c1d0765390
SHA1319c1ce414ae7dd5cf3e0d469bf5a9d7e2a579fa
SHA256155b76ef52e8ea774731acdf0393759739b804ec00cd12dcbc43c97c8b249dee
SHA5124228e41d6b150501ae5fbd357868f9eabd092e5ef3b5a529f04cad2dba13d00cd5cbe1f256f663a84b1b3a03115036f169219e6ad6900f378f3bcab3e4581175
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a