Analysis
-
max time kernel
6s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
14d0ce85ebabd71b9426cf06e1cb6448
-
SHA1
61c58bf3126dbe6df852add395c9c6f528517b2e
-
SHA256
9406d6bd0eb5a40a59c9b7e8f66bf693ab8644e163755b6be8305df4500dff38
-
SHA512
f32b99293894ed4a7c09d4b2499e43cc7f5c0568b417fd16ac59ccfe0d06a02bfd235bd26098343a569d62612ab1c69078da180d8fb93b0ac91a518bb35a5c7d
-
SSDEEP
24576:apWpQgiVRBo+U5lG4v5Zf1yk9R9epmbGePx6w4e:aApbyR2lG4vftyk9tRZF
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 4 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000015d8f-18.dat acprotect behavioral1/files/0x0006000000015d6f-15.dat acprotect behavioral1/files/0x000600000001630b-31.dat acprotect behavioral1/files/0x0006000000016572-39.dat acprotect -
Loads dropped DLL 6 IoCs
pid Process 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2528-20-0x0000000000710000-0x000000000071D000-memory.dmp upx behavioral1/files/0x0006000000015d8f-18.dat upx behavioral1/memory/2528-17-0x00000000003E0000-0x00000000003F1000-memory.dmp upx behavioral1/files/0x0006000000015d6f-15.dat upx behavioral1/files/0x000600000001630b-31.dat upx behavioral1/memory/2528-51-0x0000000000710000-0x000000000071D000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\QMDispatch.dll 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe File created C:\Windows\QMDispatch.dll 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CurVer\ = "QMDispatch.QMRoutine.1" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\TypeLib 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ = "C:\\Windows\\QMDispatch.dll" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMFunction" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMRoutine Class" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32\ = "C:\\Windows\\QMDispatch.dll" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\ = "QMDispatch.QMFunction" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ = "QMRoutine Class" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CurVer 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\Programmable 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ThreadingModel = "Apartment" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\HELPDIR\ = "C:\\Windows\\" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMFunction" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32\ = "ole32.dll" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID\ = "{EBEB87A4-E151-4054-AB45-A6E094C5334B}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\ = "QMDispatch 1.0 Type Library" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\ = "QMRoutine Class" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine.1" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID\ = "QMDispatch.QMRoutine" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\HELPDIR 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\FLAGS\ = "0" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\FLAGS 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D} 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe" 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe 2528 14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5a9b857cd0348dc5f165522eca3f6801b
SHA1488becaedcc40e8eb825cde97d478c36e7cfe243
SHA2565a0636bea4ab20e58a48622aae72f8311754d142593bfddffe32c704977f8b4c
SHA5120a6f8c8784cec103de4a333f4f195920a54591c9582ece0a9f6d1005444733ddc3d55501066f1d2aad3790eec28757adc8f02d4442680af6004a76432342173d
-
Filesize
9KB
MD57dd8e8705a3f557d32be6d02afd7ff70
SHA1991a4ea216d6255245a66bcf520e3e3953e57ba2
SHA2569c9d689d96ea52820cd6d2293d4784a8d02916a264c6294777313c63b714bced
SHA51201bf5ea70fa2446ddecfa87e8c2db02fbc2d36d3fd56b8eb1c4ee0e5dc230e5a743a3b1bfce49df8f615824faa7ed06d1bca929128942e4668e1ddeb2af592ea
-
Filesize
100KB
MD5656524b4401f21e2929b78ef4c36db27
SHA1d91ff837d6ced5f0442fd0812b6c1079fe417906
SHA256d493f101ccd1d8804c0981f4fc630718b267d7155bdb575d6f619497956ea44e
SHA512d28b17c924fb5f172944c055a85003575300305eddbbc4c89460777108c87154622b39515ee1f994d713d790fe5b74a69c835bd00d0affc5292fa0150617c34c
-
Filesize
184KB
MD5e672bb14a3c63dc0b3635fa42f95a7af
SHA1504b07b3c53c5c2e19fdee64a0233a4727dcd1f0
SHA256b70108dcc385ec18600fbf2abdc026adbef7965be68f68b7a86b359eb2013a0d
SHA512217ca05630867d63df760c83f2fe1931245415ba34bbb1f4c118cbac74a3a3f06bd68ad79240aa23ddfaa347ceec2174874e9604087c6d1477ff70c3df0ae904
-
Filesize
416KB
MD500d07f5d8d5d89368e6f958f58d4fd13
SHA16a632b7e0b42550acb35893783390caece4d4344
SHA25617bb033cd387928a2f3b61753ae3d7fc222dee50ec3ad6533309565f4f72f270
SHA512bebe8ccf0fa23e75b283436bf7249837ecbbb7ad5ee53f35727f3bca5f5027519d6aa44e408cbae6dd6dcf16952c373e265cbc74c96ccbb94ea892cd1d3be026
-
Filesize
20KB
MD587e96b9b1540adb0c01aa48947967666
SHA1cf630e13f5ce321c54de09d6ed24792282b05aa3
SHA256f02409b2e367afd0e585a2e1c6ac4d10790fab5292d8d1c2b866fe04fab28d4d
SHA5120b0fd2d03eb7fb255e283b387b2dd08390ff1ce5f0d47ee5a698b809e73e1c4f484c6970817c64af00531ac938ea5f1970de2a2ccfca769f135adc011e96a3ce
-
Filesize
23KB
MD5f404fd8e46f36d4d36bff5effbd0a260
SHA1083bb57ee3d2bc4329dd255c69f43db370a14f59
SHA256edaba440dc05ff9ced592e9f8efcea6675b8b8980b042686844ae47ba5946e87
SHA51223b170ef4bee55dee84783893cb94190e27f21cfc48314d3bfd9ffeac9e7154d5c5fb69c3718450dbb62be726f5db63c8c0cbff7b99ecd9c885f5fb6345e95ba