Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
73c138beb7d68ab15612d5130888f8db_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73c138beb7d68ab15612d5130888f8db_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73c138beb7d68ab15612d5130888f8db_JaffaCakes118.html
-
Size
4KB
-
MD5
73c138beb7d68ab15612d5130888f8db
-
SHA1
b9bafd71ed9edec22541c7d1a53fe8d77b6e8278
-
SHA256
7bc789e3bf288d086a94733d067bc9daf86693e806ed4f779e6f4fcc8032335e
-
SHA512
85bdbc44013645aa77e7325a2ee76e6f2e6ac267afbee748de62c139cf33be192a940c1def6e73152026a31cb19987ae840bc06c34fd6fed11c2879fa5c64637
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oruqpd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422845172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD09D1E1-1AF6-11EF-A4EE-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca6542b595d6b641ae995911a0676cbe0000000002000000000010660000000100002000000031072257790941bc3218fc17038e6d571bdc182e3afa421d8c82aed87a24fafa000000000e8000000002000020000000f5064f2cbdf26d354d65d1e738147f07af0b76073ddbde816e7fd4329e4f4a4c20000000f0a851fdf06c32aed7a7f73882f31a0eddb59e13c9124d18b3235e8a1508cad3400000006194312104d246d61bc51dfe0526cbfb65e1874d111a131cac4c838d7b22d20045ee85f357d8f20b3fc7f59d4d357a52a45348894807f1403a203b29df0718f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403b8ab103afda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca6542b595d6b641ae995911a0676cbe00000000020000000000106600000001000020000000864244fd4ebe8f5f72d73bbbc6494cf9b35188b7291b918af5ef2ec805b520d5000000000e8000000002000020000000f2ab6a20ff39f833350b9a812535e88fc671c2d2fc287f7b22a15c4ad31869319000000091cec4a339fd1cb123a64685b01d57a39cbf27e335e2031943bfffb795b8c824344fc72fe95dc16879f2088ac0d9356cde04f5a768d45c503ef111128292635097dedf4266222bed0af625e48aee3db7971e4a9f9a8314c6419509c6d307ee90a32b0c828ebe587d39088e7c9a5dabe9976eced2323cdc50b2899cb4aaf2bdef233637b8a3a8dd69dfad5812162af49540000000bdfc7e7b4072c049caaf7e057c3791df9a1f8ee087cfdbf877a9599a1fe10efd21aab6fa711cd9e2f928f99f7807145c79e94f46e24d9bf2d19ca39f96f3f728 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1120 2792 iexplore.exe 28 PID 2792 wrote to memory of 1120 2792 iexplore.exe 28 PID 2792 wrote to memory of 1120 2792 iexplore.exe 28 PID 2792 wrote to memory of 1120 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73c138beb7d68ab15612d5130888f8db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5748078688752b1b8f60b09175c53d8aa
SHA1386d1e3f423f159506df05db6819d97c50963878
SHA25605c3f2234de61995be4e57489e0f2be1136a363cb00a5720f91ec12b6c194715
SHA5120fccd2fd6942d30ee38d3515285f7bb92afd4dcff9510cd64f9053c6a33cbe32d11e7c5fa9b8df2a5edf4dcd4a51104a85b25218f444f65520651daacbea8f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9c956406216b09ddc42008feb56d46c
SHA167f4cc084a88a09e490b7f5a1b89abf0de6d777f
SHA256dc83ff0ae49524308f2c0e6b71dd54e5b8dfb4b12cd9bd8e756f36968464d8f0
SHA51297b2828d39eeac073b934a999311f0b413d304b1e90dad2b1d22f1c50128dd142091a7731ddac89765e05b8c408721a6041d1cb6377fee6b316b94e3c4d9d6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5089d8d38a0f31a47074940c58a6af48f
SHA1aa942f0eaf9bb387ac52269f20ef554f181b7f7e
SHA256e5a822c5ebe113354b8999221ccbe827bee6c099099f74dd1e7c4975a9786552
SHA512eef0cfdf8502683f6ccd729e90bbaca5c42c40e05aa94aff3475f2f04f0554a845ef75731ed114174336ef94cebd874e69a70ed006e04ab2a079eaf7b605292a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ac99df32b2278741284485af5c37054
SHA1f0272637816305a3aa8466753b475f880603a2c1
SHA2561c9dfa75dbe6177be994c9f9e5dcb8bb23434c1eb5fe3aeb184583bcd7b1cacf
SHA512a0e4083fd20ac6f8d2171b92ae7e01d404d33a8db4f9a294361e9d7fbc392919cd72c0fc3e94ecf4952908f2d44d4fc413c766a23a5be48a3bda2188ae9318f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6e1ad61e7650ae52958038926b3873e
SHA1e71cb6cf9a69a8cffd0c4d42f5e2ed91ed58627b
SHA256e2b42760fb4eac6502a66af9522b7d9ed5aafb076dc9a8a77428a4bf1145fbfc
SHA51212c3d84a3dfa35064e41caf467023e9f4adbb7c033f9d7a88942e2ae4812af96c58574d91bc83096b7c27e9ce665fd9b3b600056f28f95b88526068fb40bd113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ec546068f5b7349310abdceb86a5c66
SHA1ebee9adcd8075fd5811add14662848d2ba640a7c
SHA25687e3dd7bc61755a0c9341e46d586e4cf8211b6f79b328ad5074b9495200f562e
SHA512e89d3ee7afe93f6abdacce1d73f1d231457709b5d81dae54fc8232de500a9b6de6485117cd0a37a501445fd88810dab19a21d19afe935fddb3c6368c31a3a175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ba62f5f6125e5225256c78a94419fc1
SHA102e57dfc95cedff40e24edfa60cd187e44b53038
SHA256270b4f405424417f9158f7332086da7788b4502e56fb94813507fdb18c5f9349
SHA512d753e1c49c42f5b6a56d1620f6a04e60ae6e2aedc97cdf57fca8d6ee40c8d3c122246656c44118656772293f8eaf4d71e1dbc4bf05e44784c089108f1cc4e401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a217d127361d911d066db459247234a7
SHA18b2c2e2532e542ae696ad82edfc8deb34d496c52
SHA256de412a0cafa3b3a3d37dae75c883678adcd01c8bf6771cdc522ff578c274be87
SHA512142e7832bfd812ef7ae09978fc2a93dcd8fb2c6ef19d176a59c87e24cddf6e7f3cf97deb4d333ef3c733b7a7e9880c0a9d0dc7ed5ffdf98322b5dc62941dea5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5027c9001515c8b7d00ff8291f48657c4
SHA15564b7a009a20514b321c72812a0d9473e1689a5
SHA2568cf721ddfede922c311f3519bd4432543bf9deca85c603373e6c3cc3c3ebcb27
SHA512f76bf62ba5ff1fdc1a5b03065df5c3ad5331ee3e3392435496f990ad53ab7faf0b89fe7ae47236cab500bc6fd5bf5bf041edff9993aec201071cbf3a108a8beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a92a24167cb07729dd7f7825c2ae441e
SHA1bfd34a66f90c4a8cbf203a3f0a01d51e85494509
SHA2564c3262c08f95363fae334cf998305f19b3cf2479dd1f4d09896d90a97a0886ba
SHA5123e532d8a5ce4def9ba87f127949959d9dc264ed8498aa281c489695e8ee192cded9b7e80bf4c2c949e1e4d7b6de57cc1c699bf2eaffffacc7470564d27f9a9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54df707b893f771b913659a3d0893eb70
SHA140f4558a35ce35989f50ab7bf00fc3f9c55bac95
SHA256dbc9354c55831ef8a4523475ef388f6847cf733a3315cf05d23514c7edc2e8c2
SHA512d98c8393611f8fed36b94b4d070b4ee3aff098c6e8ba0a400a6e33b1067f07e314f69c597b2d0bc48c20ff68956946e9cc3151ddb738a704eb4d3285e7ab67cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff05d5d43f587142d868be3fe5005e1b
SHA17629c05310a3f0403bc234ae363ef958125de979
SHA2569178338b13812d4fd01a97b2ae825c404a5f9a58f3ea72c43296a1968ad54cd9
SHA51299dc1a49d2349caf7e1074cddbc9f7f49e62f8dbed1517bfff30453ce3dc292ea3cf464760e907c375b3eb581621ca1bcdf9d3d5f8f69f4674933cdb846258b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55fbac71afd25eddd22f06782c4b18502
SHA1512326e134ea6442f21484b5d4ec923d496f2d24
SHA256c2d5a9f625190b62b1e36734c478b71dc2edab578fa469ac0bc391572849e1be
SHA51282b060c725b135682fdef2b281b0e083187ee6783a829db8eb2853b39f843e1dfdf36c1dcf93f3e1190a4ddcd5bd2c121f055cdb9c017c181193ccc16b16046b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6008a8c0ff1225a9bb5351bee900063
SHA1981d7b64af4eb2578fa20d2f3132dc3186ac8277
SHA256a801c218808bc1eadb74851b5e0765a3ae786455c36145c8833f67fcbc5d96c0
SHA5128748d509958784b765a8aced3179df80532f9e506637440ddca77e2eeaa906831852169d96a398dd7433bac658aa71cb4a980120ec5042ff218f92beb9446f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5481c129de2a7d9443cce0b5c499605b3
SHA184bc1b0bc2b787240ff5e2ebc2039ef01c414c4d
SHA2565b9b976949701d9470d9f0672efc023fa0752ece355df30013045651ada1da97
SHA5123b43322f3dceb8bf4f0e7f6faa461de7051764964f75451dfbcffae2fc498106b707cd6df52889f6354fd0dd62e72e801271abb49d718750cb7fe0c67a4a80ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506b99675bd0e34ebb4e140c849399454
SHA10b3e4a43bdb8bff38aa2db89d4dbb1006030b16f
SHA2564fb833ba21240db80f74239a1494d9d781e10a9f7a449f55303b640efb2ff0fa
SHA512af64359fc46d482d0794234247fa44da54115f721b7ec8251c223a90a75b58bd34e2123ef84190962cbcb7ac0f709036977147de7267692239c84adb4f63c8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5654f7c146bd21d0398bad2beac8076a1
SHA1478b62abb68555477b09a425a1fca95668008a0f
SHA2567f2fe27260fe8bc82d63cd135c1a23a08e3d6f62326578d67e66649a30a4fc45
SHA51227e7e2f8b28ce742876bd653f3976ba0458919f2a5b9541e0cbd02d1fef978564b0c08b00b66c6dcb67a2d5e400d5de83ff7bd8fa406c72413aeb293611b74ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7ed60bc631e41198a62baa26be7c653
SHA116d675a7389a89c59f66d69461acfec98eb886f6
SHA256a1d98cd9ea416832be210dd919e96a1ae354075a2a8a69f307583b55fc1b9842
SHA5126fbda8e58f1c35d999665acdb043ace4dc891a6bdacbe9bec159ed42c113a7a9ff67692db309982b3ec1646ff38890a4d160211aa0d01e51c76f20af821fc57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce2ef9c45050d0eb70aadd4f81a3942b
SHA175e3205ce2e2e14e1aec6465f630985bfef0d398
SHA2564db63efbcba95fbcad8ae17eeb98715da607645827143fb2768661a8e01480f1
SHA5127329693b5c4caf500790d183e288fec2d1be7bb8fe44f328d43f76af9aa614e248bbccef213d9403c83812613a3601f3371242ccf54aa2f818877d39941e5483
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a