Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
4358ed0572bfbc4c100133d33ddb3db8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4358ed0572bfbc4c100133d33ddb3db8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4358ed0572bfbc4c100133d33ddb3db8_JaffaCakes118.html
-
Size
18KB
-
MD5
4358ed0572bfbc4c100133d33ddb3db8
-
SHA1
e38084fb140cd1620c133ff9a7e094740909cf3d
-
SHA256
79b9f4dd8bb4eefd0c72772f370d96500f8f1e2ece4bb2608d5c71844fbbd414
-
SHA512
f609397e929b577bf17f60a1b764b45ad58108ca01a333cf435688211882f660629ebf39ab160efe13225a893db1b9a901ba103f4030f7effd7369b2305d7b27
-
SSDEEP
384:SIsxT2vNRvomqBE8poN2RETF+ntaVAKadyL/7:SNQNRvopSk7ETF08VAKT77
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421887729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A47CF6D1-1241-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000affe939d6ce94940669f8452569b2b8236b0db0437747fff2afdd05c8e4a5a5a000000000e80000000020000200000005210ab788a3061ea204c220427dda4c25c9789cf6a5e1118f458432d62ca4c5a200000004902c6107e7eb4c0e0753f8a84ffa431113e798571bdfb197e6cb59a6e4b395b400000004962e28c61aca757cec079d3002b25bc2960d0d4472b4d7eb67861acfae133576e5070b348bf9267ad24e98f0cb8ce7730d96d281d56e48454e3d7542b41ee64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0871bb94ea6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4358ed0572bfbc4c100133d33ddb3db8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b15f0fa667d7c5e006fe4df43330757e
SHA16a246eb5d56c13a0426fa0be5109d594b5e5a7a7
SHA25612117efc82323e7ea2cfa3883bd6fb806d0a65cab0d2def92738ff3d7b0e5e74
SHA51290be06b3338bb7f5fefaada888f5a45b0f36bdc41c8504e7ff66cf571cc807f986dcf46268306f76b404ebbab8b41225c0ec342a00c3c152cfe0e3900bb7f01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a59332023a08af27f67a0706a42879c6
SHA10c992cd1e5d47ddbeb4fb5c2d27c879ae957b571
SHA2565b297dac730e68998c3439ebed249a4416893551ef884086b2358abbfcf60f66
SHA512fd6c6d096e189aa0db818129408267dbdf337bf7e6a2c06ae3eb25f069478fc889f82cafbc169724f6806e8baa5e8144fde5d1764cd2814687ccb9c4852785ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b64fe95518d8a3e1b4ab6bb8e1dd245
SHA1c27c72c00d0e3280a83560e5bde845c13059d258
SHA2567de58e0f533247b2976cec94fd7e17c32978ce9cc919b43ad2198979d7ed3d31
SHA51243475c0bc4ac41c7a18e79a35d272c9ce6758df36a3aca4d46e562b6e3d014c449fdf31c13c7b74556e8f6a1c6ed15124ee073d92483655f13a9df16b298602e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522726e8d7fbaff0f796d14bdcf721e92
SHA1c3e89200b6bc8e13ff125e2b3bbc4b6b3c0e9450
SHA2562618ef6514615877d13bdc66271c29ada61f7711da757ee3a7cbb043477e4e10
SHA5124946a7509705ce48b0943add35c4eaa33c38a65869a5d20046ac10fd829f9e54e801fad1320dc1e5bb73aa57a7379fb79462339479099df22b58012d90376831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f790276c54c08411d649a00621d918a0
SHA16e413cc804bf9aa38d7d9911c73fb9a656e8843a
SHA256bb365fb8aefc556b3445b3ce75ad0a9b84f29a793ad05f3a78216d6dd9ab5d09
SHA512d187328fdbf9e026bc495a9d4405637df0ff53d33038a022b6a49a3261218062fc10b1b769de8a070ca08a0df789a6794763c86debeb4ce673cd2d03df4ad135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501f96db0fc793e7fdeee272aa813b312
SHA163979fe44617d60428b1a2ebe0a45c67804f5958
SHA25633f6497b07d8d6fb6ff1c24f4b5f9e9eb3de390cf6d25434545279be15e24057
SHA5123e827758cf29ca69c3d76692c63b26a04e5b8b5def11c1bc842fc5a7b87e60072209f13fbe99bf29c0d62c3ed2d8e28041f1fb0f8961d265cd355bf20721b8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1b6bc1897eb242749280217ff3d72c
SHA1c1ca93f868d26c3e298f4ad5dcbf0c2443b38954
SHA256cb7619967ab780a54a61749d579586166315cbb5da8e35a4716220a4662906a6
SHA512e56b351fdc08fb4a50c3572bc7f5daa7d4df46dc188fad16c423a8a8b08131c8f061ed73394b2b7aea8fd358433dc817dae2525bcf23c1e228410c07aa66bc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e886644b31bae84cae0400b17a8099
SHA1038b313e47c3ef72bbb688d8448f5a0b05796e6e
SHA2560dfd941286527cc56186250cc21451c4de0bf06c7f2d4ca296fc07d9c98d5855
SHA5126ffef73a92f98744dfbe7adbf28f3f9e3f2361f95eaf2b4215ef402a7dbbd274681042bf00b019282c7cb0a0bd4098b307503fa5a131615482dd719d7d64c632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb12804ce277bf46f50d5095ec8948c8
SHA1ad7ede01736e62326a09db22c17a3f5225903fa2
SHA2564334bc800f033578239b1ca3cc8ca07846dbf187e9c803150a9435e6578c84ea
SHA512305e4a1cb6b8f85432fa5518300310e14770e357c66f55162de53d0660309e21b60bb4d610e6e06c3d9cc2cd206ea34c2f73e844d864dbfc8a98f7057d17af10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5924dc056e9b6776c39e91d2421a15c37
SHA18f9dbdcace9e757b949641e0896bfcb65c05d5cc
SHA256b23b936f55636f04fc193f38d9b765f682e0e23370403debb8db1b4e81ba5b10
SHA512c563289c9842b8fc6bfd75b1de5f942a8da5c6deb2a4ec91a83d9787248bd9e170b65b104a9c8ea185d3108a4535f53542066980fb405ae1b445a5a22f5d8a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb83e8b981c588b718d094849f92ca95
SHA1a0e4bf7395d62de534dccfa1010c6e50d8ea0d59
SHA256a88a9fcdd74d20a05ec3cb54604546be102c0b07bdb77fc3a8bec87fe2161cd9
SHA512d6a8c77063adcf1b306e0c5c65caee21fdaeb73496c294b671ef47b0672c7cbac7b1413c15450a67787a6b033d2890d3c883485e35ff073daaa9cb91becc3617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db976416ae43b32991c8fcb450e899e9
SHA1e328b89bae28c9c3945246e26fd32ad3d544ac5e
SHA25611d74ab46949d224c2e3e530ab1f348340744ebc4b3fe808670e565268a776a3
SHA51289a5aa944a847fd4de75ca734b18b14f04771e2723c94aba3fbe710af1b766072dccd183dee24709779c8463b08be4fe5ff595d4a5b448a144ca744b4e842fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1871f514d4dce38a66e43ea67a7c337
SHA18b09c370047d07d183fdf7f748dcf4f1f7c64fb1
SHA2567775fa268c50f5d9707538365609fc46080d65dc895aedd078a5eeeb4c485bd8
SHA512beedd33e20572c36f35a30ec545c192aa4983fcda17bdea9c952ac1eac14492b9eddbe8f2115b65d00d72991ddb8f9f1e5488d9ab0421da5724ff1e6486783f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5329b1d037be31095063d30ae0675f855
SHA1f1af65bd54cf7933b53af2fb362336952a1c8e85
SHA256efa61dbe15039859c4ccac666bd56a6fd767d8c810519db5094612da2171d628
SHA512a66819a4c98d1deb3c9f2503838148ad7003342a664b6a2c1dd72bf599db56ae87ace8f4bfb68590e2cc52b13978cf2b1aa642c216620066a544db24a079bbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8bc789944abc281694f79e8065cb645
SHA1922dad6dccb0d5bd8249c623fcf5ba9c9b93b35d
SHA2564e23a2b40a1a7f5e9674e612744a5e2c8d3747694aaafbc96fd9b0b4cc160e1a
SHA512527ab4df99cca7d2e5ea474cbf03dea8cb06d16ff7c5c30c6cb9d946d1713a514064002bb59abf23eefe6987003fdd5209a15e99d9bb5f18494bc3c139e1955f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a44b2edb58d972cbfed0a1e48f00de91
SHA1d2ef40ec725906690d28464afa343a419455f622
SHA256750f943b76ac837d0a5fca6f40346fc18682a5cf2f65f840403b5717d95ee740
SHA5120080398b1da34caae520d97b8513b8dcfb21c1f724663fba4387311292acaaa43b86f7782a75da8bdc380756265cde6d718e88329d1b00b3cc27035f5009d04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffb14f85094ec6f45ce35d9e5a2557f
SHA1eef672b03803a4b6b951bb982f1fa1cce6be3bec
SHA256aa7347ca700440c561bb7a99db38949d3b087aea607f288a7cf5a10ea6b106fc
SHA512dd8120bd79c03a34cdb45aad17519d04971faa7ee66de687909ff982f3f4f06eabd6308ef2f37069ba22690be518c2b5a1a0de1df6611b39a322b03960977dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5119637d25362e09506ae6a728f676d
SHA1f457822440e8c95a755a326c7c96f770c33ae360
SHA256973fc277fb63688c34221a5e01256ca0eeb8add27f265bf70af708ec84844f25
SHA512b3824f69af7827b2f9cc072ece72f0ebc26ceb2f727bb48a38b6370904fc02d328c9a5ff0135cddd5157c1b49977087cb2de97ecaab50ca914e33c90aef7e1c8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a