Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
5be9792c2783e68e3ea3f531eb8c4d0f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5be9792c2783e68e3ea3f531eb8c4d0f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5be9792c2783e68e3ea3f531eb8c4d0f_JaffaCakes118.html
-
Size
30KB
-
MD5
5be9792c2783e68e3ea3f531eb8c4d0f
-
SHA1
3189cad82da890c7523774ec82ce8f55f9ca10d2
-
SHA256
99fc5a44687d96dff0b1ee6999d15a1247ef6c3ef64e6574b96bfdf4c79075fa
-
SHA512
f521b7cac653f799afa69ba48d0d824a6f187fb3bda3b0f440dcda312c4c9a4a815e1aa30a97ad493fdac5c5a884e43bcdad349d29cfa2929b10d8beb711e908
-
SSDEEP
192:uWTsb5nRHnQjxn5Q/snQiePNnsnQOkEntQSnQTbnBnQ0MCZAoDn253gbiYxYJ/dm:JQ/9LiQ9xYpyQ3ZbD9Ol
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25ACAF81-1633-11EF-9907-E698D2733004} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422321307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f369fa3faada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000594b1580508ba04389ab4d2aaef8424700000000020000000000106600000001000020000000f42d0a1f86e96ea420874c81b3cc71d27403c8f37e7190523396d64a000e2149000000000e80000000020000200000003e081788743f2fae3dcdfd0a94aba2522a00a202e2dfb578439280b209bf2f392000000076d2cc0749293c330ff2ad6db63f1da3946755e1729c33f38813e63fb60e2f1c400000003247a16e5816f0b3337fe42ac686442f9ed9785aaec9d4a57ef83517b55decf051ee8474100ebe55c28df714e39d79c815e3e0551ddd74cd361b5508f0479764 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1936 1724 iexplore.exe 28 PID 1724 wrote to memory of 1936 1724 iexplore.exe 28 PID 1724 wrote to memory of 1936 1724 iexplore.exe 28 PID 1724 wrote to memory of 1936 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5be9792c2783e68e3ea3f531eb8c4d0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cadbde8579c31b2df77e088e95b203c
SHA103b8706ebdf9801faed221b7c9b5d06c970cee60
SHA256756d5dd4fb74ec9681f16db058cdbe1733716780e57d4c98abd47040e8c8ea26
SHA512ff423dfc087195decc235f1c56291a1a6d397aa3a85870fd7cf5304334af1129d12f2c808050dda151dcf38a176905c2537d9df68be8eaffc98e5c8ace606b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf5482363a5e14631cceac39560bc54
SHA1cca3dc2225d805adb427e2f33d51aca9a84e73d9
SHA2569eb1c50217c53a46decaec81250da827294386638aa9f909219e0cd24accc960
SHA512da420735eb6d4c79bbb28939fe0671b3b48c5edcb651e7218afe4dc26ff9e616b924438147ffba326923bc010fa2a10e7996f6096862f7b46218d27ba1e0b028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d48c21e656808df32c33712bd2d284
SHA106d24666adaf2c172f316113e28ff4a5b546ac10
SHA256965f3f353412771db751c965472099245c76acaa7febb42cee54815bf662672c
SHA512b2614535ec954f60e7eeda43fa0ed60195bdc24ba54ea2258c9c7aef5f983c7bfe0c8a6c50b4cbbccc8e81a2fc55ca1b7ac4bee97fa8f3db56d83ca999923f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544fe4c4d9c95aa3a5ef386cdae01a2e9
SHA1b5da5d2748c728044e23acf8955cf31e73116651
SHA2569471bd580d103aaa9be9bbc8f1731b32d991679aa769675d5dcd4e4156e7c779
SHA512ae5fd75187b2eee690b1a5e77d2326b73e629bef15906a51a65a1d3058141dff9e0c8fb6f110db14f309e73d25c28d8d0c72d9382081aaccdeb766edd264beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b18984ae42bf0f5dd50ce2fe025748c
SHA1a8b8ba7c754471e3969b428a972faea09b7f4ae3
SHA256ffb148e4ae86624380c6b77348919d59c32301787cf4f6288f6e2feb24f1030c
SHA512c83257d4ff087621e825cbde254ee63bc0816855fb37388db85b711a9bbd8b77670642bda509923537afa54f8c0c8ad39c18d4f97342505ba226d1c013fcbf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd12875cbf9866c0d215e1fdf7e05130
SHA19fb8242c5e45d52407019cff52c5c1833268c76d
SHA256fad253ef1c3eaca1028599806b85efe52f27391632e0223a0e3ab6b01df2a9a0
SHA512b0fd3bfacdf9effcb42123655733cb7dc66d876993e6125bae1c2be713da3d1018e4e1b9d21dadd960ff6307c39b1372d5b39b9802879290876bec38f2282f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524134dd004e13e6254c0dd7f4367b8e6
SHA1d52f424ae397b518355ca54d0568b3c4c7ab26d9
SHA2569451d3268f1ebdca4c3cc9d955da6f4ae53fc5c49bfee499c8b63d0fe3789f10
SHA512a2f801485e22a79671fb9023050c59bd0196bd0d29c25600272a63650bba8c471f244886ab149ec6cabb04eae62a83bd7cfc7e8d7606bc9de0ddd11a11a919c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d17d386e62198c911647852ce081b56
SHA159851cb267bac8e02ae753efb83e05b472753a84
SHA2569f1145063ee84763af876770c966119a7351e73b8751fec3fdd1a6acfaece949
SHA512c9e0d599b6995d0de7f94f67a4e62db54673b2054665aeba50f1a4c700bc6f5319625f1ee8b63d3fd8fbdbd30f515b290f47c90b4c4f210d49f744b14615b512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d85608f2d7852a73a769aa75d85ae43
SHA113df39e064f22d779060c9aa97cc6e3a752bf59b
SHA256b7a108eb1f847827411c5260ffa60a5c4aadba0cbedc6ac2edcb1fc5d968287d
SHA512879cf17504502bf92a3c21ca613c5b3e9aef58c2797496ab5f3a35d31ea3271f2dc60026e00489b5332f68ce6a3ae51d3b0db597caf6dce6bc9bfc3462df4daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5171cf23d43b78f24509cd14a35584a63
SHA19ac4bdc22b3700a93a83e38e11d8f83ac907162f
SHA256a4685739e985df37745718383c4fb982ba3c84e4c72ea8c5e9aafab751516926
SHA51206a99395bdc6f2cf8b03377aff5f25769886efac5c5c241c72922346e32a6ad17e9691e8e1626cad9ab90d32060a00945bb2ad146444e5f9e6866b293f443a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b903404b03e55463adcfa6240150f499
SHA1fb33026048211e1d140a491f214b26c7be2ecce2
SHA25617ea4f90ba02e40c6b7fcee08f913326e3f69b160255c641df772389b65d82fe
SHA512e507d7da8503417531d09098e735783e29d3299fb21fde0a7a26b7a139d2d86fb740a7ff56fa55f8908b89a47d22c7dab78c635b150377fe93d4023bef1eb206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c113ed9c569c3816849ab51aea5a62c
SHA13d4fff12e3c5945a41ff5996634de0ce0b0a3158
SHA256359afbfe67491630fcbebf8ebabdf7ef2485b80a9e890ba557b9d05937d11a0b
SHA51241a16b8cfb76ed736bdecb44087b43dd60709b109dc372fcc5be1deb4da08b75d52aed83434a9e642d733f2cf2b98201e66398f340b165e6039ba87bdfc963a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fec60f3e6519734eb140161d3b25cf0
SHA147ab8f2dcbc0504be1905422eaa210a85f30c156
SHA25655a1f37a8ec51a8678503b68b61f311bd1d17270dc83786fe9bc0e1c79b9a08b
SHA5120170957301fbaf09435eae7c284461c0acfa924805d85d3a592fb867ab10266f6af67e613c05c08e3fa69151fe9b11c68fd942d5e398cfe186cf78c9bf6e2d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ce11d984910cd229323876a28a183c2
SHA1e90677a2718d4a3000da74da8221a9d905847f2f
SHA25693475d2c38ce3ea357663ed6b653bb5a78220a8e336193734415c6cf6907bb32
SHA512388540c598b1cef46945bb83b17cd667d27651ec29600546882947950c9340f86f297ac088e43b9b43638e5d672ebb8f1fe6ae61ffe1091796d25c18dabd03cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2ce148b4b145bb4d78d7c3cdd64ddb
SHA1d18cb4c42c848603f6ccb2f89daac187480cd8b6
SHA2566524d509906069ecc9c5fe5096efcae97524fc3cad8a9b49c0e9a3bb8147b478
SHA5126d123c1d1370e6089af99366aad4197623b7e9dc6a3081b2fb369e6f4f7fae22095021c8f8dcae04c7f626a76f203e43aeca68c7525107f3f4bca63c31f4429d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b49419589e722ce0c3488175177c1c83
SHA1fdd8a0d37dceaa5b45048d4b9e99d21523566b91
SHA2564ab2b44a0b78d31c004b6074fad77673a17b9ca05179d674afde54307e5165e2
SHA51265a9225afa806934178a2394d45d324ba8a98ccf9ac76854d2e4a4bbc686265f9327a6cf9022023735c3c2bae4d812090326ff9e30a1af752d96928850cddfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52de87244ece17ae56b7074ff6adbb532
SHA1323cf5a1837d2e5dc0d1c7837c03ccffb8941759
SHA2562d2042ceb70440d9efff45d7bcc12ab4f43e1d9a38693a9f612cf39e61a7117b
SHA5128f3dc0f83e10d4ff3614880885b9d22cf619d8a549c425131b145a9fed496f3e3a77fdce656933ded645e238359d463f094780d0d1e774e33ee9c93319f21a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02bd0d8eb1a1d6770d71c5648b10885
SHA17efdc8bb48b423d261f9a3de3623f8c67068cca2
SHA256a2bf886c54ccd9a984961ca6ce29a6647bbe80741af38ad31f08cd50a5fff4b7
SHA512f1acac7ac6b15b42c8567b41b9d971c2965c465109ae22f9426483fd0e5f9d312baf6a4b00c474357b5fd8047bf720ff3dd781219e91a9169b97fb401715e759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f169a048b28593510ab55ac55eac72e
SHA19b4f4502ddd6a760f3effa9eb07d30ac5ef75794
SHA25600acec7e70f7e79fc3c1abea69e77d394b91ff2d98a24127facea566978b8771
SHA5126b101b34626f0a9c55c8a2ede70a550cfb033d653d139676ebabbb045bcac5ea044e3ac5281a428d7a9993dd625c9bd8a605fe793093964b435bc2df705183b2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a