Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 00:31
Static task
static1
Behavioral task
behavioral1
Sample
6559f7985b993a90d6eb81e75b3c88aa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6559f7985b993a90d6eb81e75b3c88aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6559f7985b993a90d6eb81e75b3c88aa_JaffaCakes118.html
-
Size
67KB
-
MD5
6559f7985b993a90d6eb81e75b3c88aa
-
SHA1
f6be8d08fe4d2cd1e820653ba941e6a19855a9d1
-
SHA256
dee381db93185ac0665b955a8596159f4ab750ef813fd1de2020a9e87bae927e
-
SHA512
e5894e6e0b3df21ce32643b84091367c5538a88ca539e5ee3d76f8dca4a6e2788130be6dbbdd92d4e266bcfc004ca02877029450399834e07b3467baa5ee49d7
-
SSDEEP
768:Ji+gcMiR3sI2PDDnX0g6gpMqoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JUETzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000235b21187e8992419b09441783fe0bd900000000020000000000106600000001000020000000e5ad7eb7ae20caaf04298de96f2d62c17a1fab780ccf1bbbe3a709ca66e1340b000000000e80000000020000200000004d3ea2fb49d8b7486081b5c96cc2bcc8c09795d245433fca41f9a3a65ac67a972000000070992b026215d780b9d36c4c81c1a9049d4b842c77ec70e4b8b185ed324c75ba40000000a688ab93ac99f06dbf11720485a19dbe452e3432b773f0cf9a2285c8cf842228a4109ad1ad42639f69f0cf7afe25b353c6e2640bf7e3d83f05d05ca876204914 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422499773" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABACF2C1-17D2-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90758080dfabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2860 iexplore.exe 2860 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6559f7985b993a90d6eb81e75b3c88aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e4574e0b5e89dddd827c39fb22bddc5
SHA123a195d6d2f2a2d485d81f1a5104a47d509b9c5c
SHA256af50980b5ff4df0a34c133bc19248116c45ffb9ea74fc20fe7f7edafb56eaaba
SHA5129ce1f24563ab3769a69eadeae4620f217edecef869c88a49abd23ad7bb37b6bf9f8d62082248f6a3881f0e73503e86c6dde334bec9fa0b0d3b788db3c624b64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f0b9d460798372d99d829721dea0e37
SHA1b5fc63d5ba7d52c83b9518f99276515a9a75a1e5
SHA2567257ab6a626f69296f24f8bbcfc6d2754375ea578bf39e0d198555f9988882c1
SHA512e94ee548796572ef25f98dae91b8e6a1c396515ab3a08411a358c7d83f53fae02c3bad948942a345a20ddc6cbe5fcc27ef34fc8627a4e833757b4bd23bbc909f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9317865f8a916eb04f3ba40270efa7
SHA1d4fef9c82201e1e43ba2923efa08faa34d5f5c97
SHA256bf606a1ec11531ca8684ca5820ec48215296b34f1310d462648e08f0e9f040c1
SHA512d3cc2426cdd23d80b7bc3498058bd7fcd2c0931dd03afda9ab28c0cab9ecac9f62b6aa287cd0b3d98d9d310710f2c6de7381b277bd73dfb594fdce44c90383b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c5fbc5686cf9046e7b780de63bfc71
SHA1787be5d2106fb381d946e13f96de4ff7ae6c122e
SHA256827d5d50efb99845f9e2ea9614bd4e3d6d870c22b0b207c46dd301368d3b7b74
SHA5123e7f97e39468f8547ad3031fca5af1f298fb1d31c84ec428d14c0827bdaeb57c315031ba65b8725c523e47243ad098d51a44488b0164f62eca7c74b7a2007ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b673a1de59299c6ae8073b0bb7e75a15
SHA18e44498ae1711b69e4bc321520af63679ca75b97
SHA256e67df648d545fc447eb34537583e7b318fea13ec9fcfda562eb82ce00bd5a288
SHA512560b93269b59f0c88560006aeb00f01944b42e20feb9256c602d2316dfe0dd5c21e44040d44e6afe34c146214879f00bf1899535ddd87e20b54391875eee32b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e72122ccdafbba86b501b7f16899e835
SHA1739badd7d3633ff79aefb0244ac630502a8ff461
SHA2565adcf4e3dc31eaa972ec10acc829b22a164c7514e030cb28d763f8e5b68170db
SHA5128c55ddb0771fefe783f9a4ff0be63161eb8f075b2d533b9b6d8c4cbef80adf4fe3b285469e99b15a38c5f60bcdd5b79b82b84aca501fe977874e648f2e4d392d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597a5ce0691e343031dce1bf36424600c
SHA16df4f58b9eeba3eec4b4a9a6003463e51e555b0e
SHA256e9d18273bf127da6f3a31ca9067d65ec183c245997aa93a982a02f9ef382d42e
SHA512316eba799f25537c43ae227dc4cdf63dd1f704cd078eadc629230df31a503556773cbc3027939194673dbf50d2202e4655959402bd4dca7b1e614a959e9f9468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c7295a4c5765b46deeaf729ab2b62c4
SHA1059683b88150ce8c9fd7738fd43e09febcbcbfb9
SHA256083fb7e80dc4251de6c7b1934dfb05bf3329a16cd95094c29879ebee2c186d19
SHA512cf818cf584de89290633e7cf11b68bac84e42733f6e9e94c3f120d92ef0378cb9a29ec90c030c1fd3210909dba16c4710e5bdea423eb3dfd18cc799bf11561a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7e7d4fe7f46f8b9141d15d4853dd76a
SHA18258d1fd9525d033f01acfe38a1003cab264106c
SHA25697331357a34e0f507f9f2881228817b5c840757696a49df9c09cfd4bd900481f
SHA512027c56905994b311363dbcd61fe5e5487cb17c65eadc522c3f34e4147ca34988f0bdf1ea089a3037dfa7f72170458489a86df7457ae72a9d42d508493644a332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554881008031556d5a11eb8ed3617ca82
SHA1be219c2da4b3976fcaa3a6fbf502971a06c726fb
SHA256e1f1ddfff3a1e00047ca98a7181b2c151cc8b86bce28aef89a3ad5d557b9e69d
SHA51245c53cef325f03f418b0337ea619b4c12bfdf92b91bc01b8403a621d306daae28b53a6ee30af53936fd37462451649b21bc12ef38d0e8ee6b743bf22394d8db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53acbde31b1df33fd965d9ca00d852f2d
SHA1ee0be23c8506046738bc73d8f13594f33f217b4d
SHA25617dfdd3f9d17a57ca3602ec783fa425315576c18e5fc364a2ee260909f490680
SHA512ab2075166c9c58f544b999585a97091b2af50607ea87eed5f3f483a14e816d1d41a5d259503f35626cb1e4bfcd75fbacc319c491eaa12154fa9e2ec831d1cfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5192b4e10d1ab921d9a80f105379d5785
SHA1c79d2e0d54da57e5fb94ce69871ae8cea2e1ef7b
SHA2565d5b8647fc813e628f5c1eddf67a034a740550ca9a3f84b324a758d6bcf46c5e
SHA512a0f95803624d7531c763642ce40373c043d4650682190b7c2bde5f887d3830e5c54401455a9eb528bcf1bfdc73f31712cd2eaae50c46ce7fa81c035fe8ddda1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfd861c8f597b61c3d06bb7712aa0bbe
SHA1bc5834a1bc933049bdd2896c62b7f53147810cc4
SHA256d5adf0b46ffaa5d502ade04d3935788ab92297a8f0cd10762cccd5bf662e8290
SHA51238e2b8d68696fbd38c85f7efa372b2c24d95a6749344ea129d72a6282e8cd3c2ae67513b1d7f735718b74bde3958972dcef3a8e42356e9f588c3910cf33a2cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57728452b9f54c0c163859888d83302b7
SHA181025085ade3642cdab5319fc877863439d6be10
SHA2563869bccade0c2c756331f109801b90c372fe17b644970a3e559bcf5e412391a1
SHA5128a477690d41a5bf97374a81b09e7fbbb6c857b1e0bc023982e76ecdba3df6eac236193ccf9209e9b0469ca60889ff4afcb018d6b6e20e3b6a6125edc77544c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5239b005ba53c35b58a4f146cd70493e9
SHA1105ec5cc99fa7392e4778ea7233e0322ddc10b7c
SHA2562d016b9bdbf41afa6b6148674240a337f5efeeeba546c9ae7aac9cfaf8cdd436
SHA51228ee7420776affa621e5265b198aa92423ac2ab0e4ec5cd248f41547052c772b5216ea92ce21a219207d6cdbf29c946101a95e487cc779e9ea856f31de4468bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5057b43edc4e5da0fae7dfc5628bd3523
SHA1ad53650bec8f5902890fc648cde7c5a80ffdc7ae
SHA2567d610ac30099df5eddaf56d8ff45febd5777e9f6324d3f3a00b60ac45ddd2bc1
SHA512243fcf9efb481b2065e104c188a2fe9217cc421f95bf5d1ced4d65d40c4b39817ac69e46f71063db010cc9d286a0f3c7aae812b1987c84553811bf6b32dc256a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d99c629f9b71a0dcc21bcfaecb03863
SHA179a603bfdb0e1c490e625de90ed81e20e161a9a9
SHA256433b56b62c62872444df4b39f245523a09b3002869fa985ca25090f40a6bef04
SHA5126750e75deb144040cc24eb7a5d32ac1e607b17bf1533eb24ffa078fdde93e47fd90c6787f0255a5bf8ade736e0deefec50a010a45e79968c396b07fb77ba7492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b4698c3c07255553de874ee5d2615d
SHA104d2c76613b088a54cbb76de0d58dcc08b2c44bb
SHA25658de72d3a93f53e858c637c65a6f9975484fe6a38846d043ef93e09614893293
SHA5122a21659a49870a922301efc572ffc7addf2d503583e77a796fcb4efeeaec1983cc98909a277c69313c23cf517e6679f87c27f368fdbcdb3e6ec1b783902c1b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78edae15f4197186bbb689bd57f4f8e
SHA15d7f258105cc1074fdea0cafee7a49a3d9d78cca
SHA256f6a87e21beb3cd3d940954e1bcce138453cf39fec6b73adce6bc2f0ee31cbc2c
SHA5125afb87f2e9a083ce520f0300c645913716b5613e61c34bb1492304d815a3c9ed0ba0002de5e315ff514638f51bcc1f8343127574578dc776073f7ab6b1debaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557381b644c083ce297cf394b657718d8
SHA1f7a71b73d81643f5aeb3329aebb08600117e31fd
SHA256a02810a5ce6a479abd7c73f845309e9ef5fbbd9147384b07ef994b15509c5609
SHA5120caa324999601ceb1b55ba26e598224dc6ccc038af8eb6038d7abe848906433a9dd6b3876187ae77c5bf327b61adb41a77592394a034475b66e363c9069c9b7e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a