Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
3b1c2ceaabcc625390f563022c709b6c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3b1c2ceaabcc625390f563022c709b6c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3b1c2ceaabcc625390f563022c709b6c_JaffaCakes118.html
-
Size
132KB
-
MD5
3b1c2ceaabcc625390f563022c709b6c
-
SHA1
d4f69f9dd19f8126c1ffc65e37c3c48faa4f78d6
-
SHA256
1a0a4c845579733caa48e903313198995c83177cd33c9624376c969d03a919c7
-
SHA512
5f30619725fef984ba9ccb5ac17ccd2f802768a2df728451c0aab3cf35ac6d39b39635af323e50eb184144460e8bb03b212863df749923252e02d7dcf959383e
-
SSDEEP
1536:Sa26G5/nw7cLyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S5aAyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{689A89C1-107F-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ae187c8ca4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421694355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000002b1ef9993a829f3ee3c5f84d022f768bb19403f86a0cf800ee8728005ffbd053000000000e80000000020000200000007696294f5251582c44516316400c9cbfca4082d53aeecce141f1516a0192abeb200000007bb0ecc34878864d9a10a63ff6326060d938c2c6200887706b0ba671d313a96d40000000dc79d4d692d104d8f4985dba877af915ce143ee808977942fb6da4cbda780d0ab943cfb5da99f611949c9ed52436973d2ea0cf7bb8869cb6e7d3a72d14cf9d18 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3040 1924 iexplore.exe 28 PID 1924 wrote to memory of 3040 1924 iexplore.exe 28 PID 1924 wrote to memory of 3040 1924 iexplore.exe 28 PID 1924 wrote to memory of 3040 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b1c2ceaabcc625390f563022c709b6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee3e141a89dee897338bba3663bed624
SHA1a3dcae05fc3fa680474fca59a060a33430c4c113
SHA25639e00c658eac11f3cb9a8950546dd09134479a6e29eb066d7df01437b385601a
SHA5126b13d50db52de840a6678d46ad48054534115115527824e7a680610183e118b4c9cad5ac0795a73f13c03034226c7eb70d4398f8b06b9dfba2c160a04208cfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d949d85e1e92410c07410f21d3d221
SHA1123cae5e4b5c8fd6e8afdc3335fd4e297105d737
SHA256517670cb6791d768c04acc246f8fef3f8bdf51ff3d85f3d83fecb04119b5b233
SHA5129dfd8cdd90b6fc751896473bc063ad378b73f7678c783cab933f16b8cf973fcc492afeffec33755ccfebbe7582340d81a8e6ad071e0bcf194e32ac27c3ebdd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528413f6a5df4d1a4e027ce9af690c9e5
SHA13c35c7acdb6bd36adf526be1e3748db925812ef5
SHA25685cba291f98342ccd4271878e8cec2327d38f7df3e409ed4dfa23bc6a458f555
SHA51252f6e8b43c7f1ebd1a5ca9a8754a5ff964ac09c158b40e93c14fc35e71673eedd31069845824d9b7238e5942083389df96fb6488db549164052ef88da4c6ce57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b11d46788fe74e34c224e7566e9c70c6
SHA1dbbc168b4a05bc79d5d1fc4358a83246097233f1
SHA256b99e314a8d8607033e700bcdd8ef7708a9cd40609991e159e0ba15668099ce91
SHA512e738427670955ea4f0cae91e50a3dd0df0a23722cf6e46bd038a8e4caccae38b402ffc7ab5973c31aaecdaaec76b35630c4825daa136d4dc819bba654b70026e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1f9a1168ee61531fd2212826b276936
SHA1e4d7900cbe6766c9432d37c65253bfb7c78953cb
SHA25622bad48e815edf1c22394d6ab2ccaaefd6fa3440d801cf0aee5a5282dc93286d
SHA512b471413901cea374b8df7bb5dc2ac50c5827a4ae05085ad2afaea211336741f28fcf36c96c4e22bd3384055376f5598717484328ff54d85ab1da43801ad0932b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e13f8088ba58c3aa70a66f09807606e6
SHA15860b84ca5ddec68176e741057118bdba809f9dd
SHA2561e0de6d54cf870e73446da05eada1c5caea0d3c6728c50f645124c6ee85a3396
SHA512d5efde979420d94aec9faa299bdc77d27ddb32d1b248e75a7439ae2410433b16841e59a5654f20f7614972f8f2dbc41f602556a1b7dc0e471300c4beb0153647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028aaaf2c97731375437bd49f4a6cc98
SHA1fc5ef695c9bf97500247bfdb0470e5049ca11218
SHA256439e03e439f4ea1788c6fdb391745b0c49411f271ccdcf888b66a1b1bcc535b2
SHA512af9997224c0893d09d509abd4611f534343c411a831507d6f4b7313c93389de14cbf52707b8d0232e4bf4bca574bdd46f117ee2a1444973decaf75f771f2a4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ce055c6b2689cfc1b7dc759b1acfa98
SHA154b0ef80fdb4e3e552cd00ca3f895158341401d2
SHA256c20acc92b49a7a13c17cf1b79b92da4008a45375a64904fdef8ee82bc116880a
SHA512a2b490633113f6f6b742267f2fc9ff6668290e2c34f2181ed0fda7b9882374dabc03c6836e0bfac702db08003d5f5a35a6d8044a1c3b30ccab5de5944a931fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e3e16c23f4614d2be54565a5c944b7
SHA113906b1bddd5434c775c3644c67cb87b518ffdd2
SHA256e2494f8b5fa8b51c975fc08985e01348122e9926b050e8d62e5aaa5f4ff688de
SHA5128a7b30bf84ba2421165f4d057c8b2e340ef2be0205c6e73409adabd3a6b7d6e0c9f65d042adf62db6d3cd43bc92fd8e1e14aa82ae221b8ace820ba360aa1b282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58833d0363370c30320ee1f5085e987ce
SHA1a14ce12124217b70d07e505e003ff6abe7eeac46
SHA256a667f41a368e6038f8fd29a430fcb2853eaa19ebda1ec38fc6a44badbd14c082
SHA51203bdcacbfbeba24f4ae33ef0fd608a1494d48a199070c1456229fba12c274f600d7774c8f93fa74bfd7ba70730bbc5bef20534c6d0a8287d2dbda75c7a007597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5289d66781f5006cb8f6576197ed616a2
SHA145323c99b3468c2d79a1a0982d9101aafc972060
SHA2569b6c5741580b3c5d1f9a6bd88952dc59cbd18c9085eb92e8a40cd97c8b8d3b23
SHA512c20f93ec55226f61e179a5b14b058b88b74dfacf71e90f0a3eac564312046ad293b16a29e04881f4a9799dc0136ef658a664cb864b33d2287702308ee60ef069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5530601ae2a0d692024f78e070f845891
SHA1b6b66e77e39e565f309ed01f5ad034c71398d73c
SHA256b01fe2831397f06fe16dcbde63c3d7dccb59504959b44f6c183eb3816bff0420
SHA5126588188490d849876321390d5da717fab6ce4448c31d82d14d6cdc4280b530cb69a674c6901adbe57d51a5096bb109a5a1a67591556a3d03ca2e08b288c84a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8efa103c1b88c9b5715a0b58bd93fc1
SHA1dfa12ad0860a3a3991519029fe923c423eb12757
SHA2560233c150956d4f346ade8d420af24c4ebdb57945a775139772e2505edf9529d9
SHA51227b977ef92a2b068a0f774de967583a0e4df685b67b70c9daf70f5c79b001fea33abbac366708e222222ca2c104a93e1ce7ff166b701ce88a528f3e37a749e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922c4af7667aad89783d371a4f56fd6d
SHA179fa546ed20b4e6ac9c767c93b2f8c4ff721b5c9
SHA25637c8e5d5b90fd81635bfc6ae4893fbbea8bd3a409b7fd0318215aefefc656154
SHA512000e8b31a9a30ab5ff77022e71d1548d70fe172da43fc90886e7f58b4ef51ba709a9d524d1a4962d1289bf23711817bf0488a2755e40f8603260618d0e67c06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d99fcf6ea58fe2b1878f3b131f56ed
SHA1879a2b97e1359fc46b9b6da503362c7e3d00b46f
SHA2561a823b1220627b46800124288a5de1f69c9d65492fafd0659af23624fed159fa
SHA512650bc3f243cb7d1ee743b935b31d5e4ba0c85d6253783f83cbed12cc99ff6582e42e41a7e0cfda26fcbd0286c38710101e9f39e343a1a2dfab8fa1f5a7c5ba61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff6867ffa04a92d11e247fe0c9bf9c9
SHA1b086b98de25c6d40ff3d9a426529cee8cbbf0e50
SHA256674e63e1eed8eba070b89e176d0afc62e83b5aa2f069535a9ca2f06c609cce73
SHA512371bbdf35f21b94250007b031742e116dc56a966c4fe5dd7b1de837b9bb3714b4eb47891576eff7004b8a01899e86d8bbd5f266a2eb60951a809b2e5fe509549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee30486f61faf0c51468317b070dc5f3
SHA1d5920f7ff7d45bb7c100a145dadcd04d52b77898
SHA256e4345439aae5071869922f168f75b8e4cd37052e80b569042dd8c97d687f3e06
SHA512b3fbfc600ab8fc3ba7219687cc8c3753f8ea3458c844965db3e1854b1cddd8b6f2bf8da38614596351c09598cfffa990fca095bd17e49c272dbf3dfbf99f91e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d29933673f02ab2d9c3d6e4ca9c18f
SHA17a7e482d9b847157bb8034a4c7e7ac3a138843e5
SHA256f79ed189653d067592c979185fcede136033a6579bfa4b4b35727e1d282520b4
SHA512002ed452b3f04ad7d96c6235e4da0761f32aceb7b89825fe11e7a9bd438176bff78fa8a3214ac7b0303c45162f1e1a1fbe532c5cd803f7d162417e76ddcce8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b12f2b3dfda8d71cf1b9532f273c0ed9
SHA14705f645a11978d362d16ad75f1db971ddeda8a1
SHA2564a2370b14ada4c94df7c403c2fa9d5babf8a444f566596ae749bd860a84d2f44
SHA512aa0600cd4bac8345e6cfc41bb351110610b4f51db61527c0a941f1bc52d650711fe4204a667931331d2b075f6701a063e7791dff35f1e7f21941fc49962e036c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a