Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
eccf25dba7651a9348a5fb5844f1d9b7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eccf25dba7651a9348a5fb5844f1d9b7_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
eccf25dba7651a9348a5fb5844f1d9b7_JaffaCakes118.html
-
Size
15KB
-
MD5
eccf25dba7651a9348a5fb5844f1d9b7
-
SHA1
688f24bd5395509a83285e5d81ddd9879c2e33b1
-
SHA256
192f79f7b556dc01100761eb510e67f7663e6b0cf6d39f86a430bec0829e3db9
-
SHA512
3298b20369e91b72429be6c4e714886b3455600064b6550bf0060b46ae667822f8acf06c64f04bd0778860a2163772dee31bbc48ffe81b853845d8970b796e75
-
SSDEEP
192:RFBdCHhx17FvlrlUHdWq5mHlMu1bcF0kbOYjkXPMJBpB63JhiFdvJ6bJCagVBIa:RFcpU8qu1bcFNbeXkJPA3JMPAbJDgvIa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A170EB61-F7C8-11EE-A1D2-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e8b776d58bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418977026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc50000000002000000000010660000000100002000000051c425ad79277ed0621a9b7e20c22315d4af5f66ff8eee55aa75ef884cab739a000000000e800000000200002000000010171b38eac389ec837907a46a29ebe6379c36c0ee2037efd2a4e2fa563c691220000000b3dd13f4a8abe2140685ca7852b1fa9bc75b4678c426623572654b2b9982781040000000b86acfa89863209da03b5b40fb54740b1f1ffb42974a5ce5e6f3c99cd7a7061d5770999904464ef7220d3275b6f5ef12ffc66d7935b83cd6eeaeb62fdbf8bcba iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2544 2932 iexplore.exe 28 PID 2932 wrote to memory of 2544 2932 iexplore.exe 28 PID 2932 wrote to memory of 2544 2932 iexplore.exe 28 PID 2932 wrote to memory of 2544 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eccf25dba7651a9348a5fb5844f1d9b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c2e671bbf900023d8006ebead51024
SHA1e4fb7b051e1e4bc88875250ab99d600712c984ae
SHA2567a2e272ff2843ce530ad5c7ea03dcf0a888e50a2c85cdd4c1f55a9aa9303847f
SHA51286117ef02d492792e40e199fcff2d54f413cd79afd3336b55805c4553df4080bf2e81e181aa86d248031e9eaa29c773713bc0668c0724dccfc7609c9d46c49c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6c408489b3f53eba7855de82212244
SHA14c2010af6f4c34757be636191c88acebfdccfc40
SHA256a9a5a906548bdf7c4d76af59aae7d9ae425c49acee7e37b2beb375fce80d5406
SHA5122406e778d8edc0fed484183518b6d16910744def9325f7589ff169c561cfb084ff56e467466b0b7cef9075b0991fdd6fd2f9d7a7473698f00301813088fa97dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574116ba22e8322c45a4a3449fc433d77
SHA11b85afdb317461c26dd002a34b8218d3c8c7716d
SHA25685cf6a1aec13e2251032afe20e1f6c2f3a8cbf6c0003fade3f26c1d68cc0540e
SHA512a6b58cd0e9e0f4aa1058304d74820540cb100f91076ea4c3d94d8d26a142b0eefbfdcb6d8b1a48bf3b90bcc3797f2c42ffe590b9200e75548a7482a4097e62a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598b942a6ebf17f8e95c7590d4d78e17a
SHA115dc4384156661e1eee41823e4b94d354827b732
SHA256278110fdbd0626c8a1dec498ea396a49c51cc32f224e6b1edc0de11759c75203
SHA512b4d854b34a3d833224d099cd971d3a1684d287338419a96a37d35533e81897281c18243be34f39b71120d7fce209165ea6cecc930b071349a75c87e9dd51a733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571277720578bdbc515113a58bc0c49ad
SHA1d2a6790d53b54dc06e097053ffe673b4df2f50e6
SHA2564605ef95213f77d0405d6f26ab627ace21b8a69e1058d45142ca50976fda5f25
SHA5125bcbb5f0843d92364a32a60f1725c8f823a22654b82399dccefbf90297a97c70b90a554f041627d5d3352ce43cbd32cf2be5f582243a8a21125e0d6b16e74137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570687599d882b787f1ddc1f8b4a4dcc7
SHA12fff921af9bf8d6c24100b14fe58613eedb1da4b
SHA2561b4c4ba3c69991e9b5945a262c3648c8cc6ec7a56a707723bc93105074a9ed42
SHA5126bd10cdaa544712c7069023d102b7152a5880544985e6db45603e6a7da1a5c808e5dcf28724bb61622a99d081e93baaf3cf667c9e27ed16589695e22cf6d8e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ce4e458ee00f0caf4194385545ba8c
SHA1ea5ca32698ad93795e97755494e0a8707fa9ed5f
SHA25651d3f78b822cfa340e633dc7ca0630f6bd1c23cebc2734d7aa906098f6c367ce
SHA512e436f281e5d24df3164a260baf22227a696068f1866ef6783e1a7a47a43d854e4f67d6968bcc29a6d55ccc5f1e21e48ddde93c36b208a4750df3ff76338b8067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047bac03150d1c33b6168bc0804d9530
SHA10d927ecd18543eba2ad134d15757906708f04fd3
SHA25639f4d71593c608d466ecb880dcb5fc33e8ad62afc1744519bfda33bc600d96b7
SHA512262e6e056f1a08da7cd222a609e39b81d763b6e69f827f75068e6449ffc5305cc4168dabbeeaf980fc3867b989ad06f3a83d4414c0b806d34dbde3b43d2bfb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d8de496b1fc5aca706e55751b62ae1
SHA1669f74a2e3eaf613cd1feeef9a10d2f32cc0dac7
SHA25629beb626bb9d21c657f6d081dd4f28a4e286ef043300c48b02f20c10c6c183c7
SHA512920945ed313b93d07945a3bbdc395c9f7f8709adc5062196454fea40f73a1c0e61c475d8513fdc33cc601a729ce35dda523ccaca01daf0ab63e11d6e0464c4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5220dfa0bd7a44b2bd2300544965238ec
SHA1dea5d32b51513485113ee50dc9a4b6ba19418d0e
SHA2564e674fdbef9a44d130c3749196a8d4b8874cc4d64dec00c958f38f0cccfd28d3
SHA512aac9424a3fb1c7fae15938641a58c0ba05ad81d8995ad578e4dca3828004ae3d540ea5b528bcfe86a83824bd2be6c1b661c628596cb259f75b4b1d8eecea7f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516c37567f9de4edd6357f564717d3258
SHA1b663702a08f4b587b09642a5aebd7637f28edc59
SHA2563f8fb433bcc5ffe046020e3ce45ac3051499af0e803ce1296432af9e5e9bdfff
SHA512d59442f794b25b0c30896afca64b5d375ec8a3c08659b0e353565e6d937b23603f34314f69ab65b513eec5796828a7ebecd91e82ff6ec3604d3b9a03035e8494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e66661eaea20f492b8b33ff1b727cb01
SHA1e71c85f083192236abbea091e8305b9891276e37
SHA256b4e48d180bd780bfdc8c56c0fa86099b880569753916fa7a1480e1da9c7087c4
SHA5129a20f6746d3a0e159dd23a5baaad2c58d2bbd981a5834d259e0391bc02ba711bfcae6217ca5e37415339da14670d21a2f4c75463184de2cf00f215352da9f212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd506540f0c008da7312bc6bde95de6
SHA1cc28daa7917c2b8bb2bce2a7884862cf49c00bf8
SHA256971f112efcd176b1d83a41df073b601655dba8ea0af6c141b82cd6c42a072ca8
SHA5122deaf6593388b6a1d76b8e28085664fe6f3f10e5ca991cc0703b96add637efc59e4aefa6ca5d91d5aa70e51691254cbe5c9951f1999b68ec581dca3763fd8ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b1eb1e4fdf3bb86c8780018b9e9f5fe
SHA1e2335d87973518fac6c2f1df9570a0b3315b2e1e
SHA256b7322a9dbea06736734286469037e8c81ab86877e6914a9c61cbea2b81d7bd4f
SHA5126cb22e94d996547b86cb5e0937f77be72737d4f8294f776a0d283b41e55f3bee1f63828d942c7f9a6a4fdc9081e5a6417e3a67591a393132999163d476416b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af5ec92f06bdfac0b1e2fb2e63993dcf
SHA1286555659acbe7b561697a8ecd7dc857b01823a7
SHA256ac3bddfb82f0f234d43152d8d2f10e7c26d21b9361be2646d8ecc153ddaccf3b
SHA512eb074a2065fe232efce061efa35cb05316604331354ed8d664889a99bfb9f0946ea7628f06ec20030ba57bd3f84913a791a7f5a8b348bd607e5caa323ab46890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832b5ab092813bc9bf52141953572d5c
SHA1f3c12c931e4bff0c56f1d6ec79fa117035b7a14a
SHA2568d1e042d227896ab8ec5a6aeadc35cdb5c870f8364bac3ef3462792ae9915aff
SHA512077aca73119724ad5773bbcc04e8045f6123565b215042a250a4bf5751a252d362703829747d179a0abc8e1dd2a69acb71f7a77194593603d04241e44af356fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52502b74fb67efb94c0aab62680b5a71c
SHA166b7c7116be52bee1195ff6dc99f869f2ed1b3bc
SHA25677bbbd9559c8aa2bb119fa833ea270fa213fa1dc34cd37b3627d2bec5763e956
SHA512f2c61ec389a596b25b03c46f71517bec8f56d174e1c71e017e7a59a6e2f0f2abc5e5f612951e6cb48f3320b9812ff760a9e73a851839aad39234ec03fb182ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b7c436936b6cce926c11aa70bca2ee
SHA13ec986d779db31e5c75dbb177691313e391b4bba
SHA2562029c1477b29eac3f4bde0168f0cdce9c36f4af0d4497e4587790ca7cbe6b565
SHA5121ae8f811c5b55bedad2f9012840f0d929f2708b6e1b60919632d352ac298be6d77ac468c9db3ac96d1b74c84de280526e25ecabdcce3d0c28e60ce36db12c9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c6b437c4395db197bc5984031ee92f1
SHA1bd930f8490e87edcd2a703e3eff1900ba1dc04f1
SHA25685398ab131c02b98430cb8e20467d3323117738b26abcfb7a73f83286127bb2d
SHA512c7ded8c2959a14f318382c7c8115cb4d42917d9170bac85b1431f1b3fa897d3fb9ae747876d1aa2ffa7359b1f81803f48b62fbd5f7228b789dd8ed16cd298a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d417b8192b66c886517a0a1a3da756
SHA132bcc3253d8e895e9b147829db77c49c78bce777
SHA256dd5ec7b8920e768ae28faa79c828984388807b6191510479bb03fdbbe14ca3de
SHA512e0ad3c39feed840faf053bd8d85cc4675474d9ab0300e81aee922beda4ca41b5dc96221ef0d76e2098383196655141f2d31b52d4d53468944e486bf03b2051ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa0e70a1ee77fb01a8ff6fbc0643718a
SHA133947a1eedc3d526893f939a52628947b06ad5ff
SHA256e8b4198df842156de0e9e84b47a99a6e6b3fee082a46e5ad3865d4ced2f9cef1
SHA51293c3e238d9f30db9070728ceb79b5b9cd1c3b5304701ae59f35743f02605641909a60bf2111303deaa4a07b2aa40ee67ed68b61540314623da591b8432aa9b34
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a