Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
03ba11540b69594e6f2dbeb13508b59d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03ba11540b69594e6f2dbeb13508b59d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
03ba11540b69594e6f2dbeb13508b59d_JaffaCakes118.html
-
Size
37KB
-
MD5
03ba11540b69594e6f2dbeb13508b59d
-
SHA1
dd6e69faee3c0f5fd73e4d4e61ce1283f2b90316
-
SHA256
03304ba8f73d3d4093f147f57565b84ff8623f7eada875c1a5cde1134a7a02e5
-
SHA512
04bea1d4c6bcf23c212cd0b5529cb6becd7f1efdcb7b22a321aa5cdb861940e45d851444cb0d28c56a79bd2b760e9397f90dd0ae6dedb0da36763a3d0e7d1bb2
-
SSDEEP
384:BQ/rcKbkrGtEGxd5mPR7Lbe0UmL7upMwvsj:GoWNiR7Pe0UmsMG8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000006560619c0da75669f5d8edd33205fd9af72eeb34d2993497020daa15cabaf97f000000000e8000000002000020000000f2504bc442154f53be194b0a31f2c08c42d2852908b5fb413c90a7f1121a561290000000b693c7db87b2e7f3d4bf1a8132eaebd91b6e85d44bac9912adff8643ed66725dfd8e7bc6f94814d989ea4c082f571bfbf780a00604d13ad7dad5e1ed023b2d5d05d87e8653b500589626084ed0be5f0f948f7ac9504acda609bd44bc3a6f6cb9ad63761276ad850b88f54c1ab2a46e7f5b9e44f1d3ee82372f12b13b1ad308e2cf30d4bed5215f0827222c444fce9fa140000000d6ae3b31f948e9443cbd974b879667a354f4ddf4531b6fc5668ebced49cb2cbc69a101db678cab8f3ca385559c40bb1ab2b6862b0c8bbe96bcb8296fe86ccc13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420417283" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20edbfd3ee98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEE72A91-04E1-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000055f5ac7c3af60663d6760dff598e527cf72d101922da276142a6fcf9a5e46de4000000000e8000000002000020000000547a176a80270e909c506f68c35066b50e99f87c3eacda2757bed01eb935aea02000000039cd55f3e98010335391c3d174f32f297e73a99a251fbc822e6dabccfc7474c940000000f209e5118d1c2937e4793ea93464a263b7e294a5e28e9ca0da0fa34b4d901ccf646acb5f2aa15790aed2d954c20d26dda38e5c1e3a54896495b6240f1cb3c4b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2192 2040 iexplore.exe 28 PID 2040 wrote to memory of 2192 2040 iexplore.exe 28 PID 2040 wrote to memory of 2192 2040 iexplore.exe 28 PID 2040 wrote to memory of 2192 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03ba11540b69594e6f2dbeb13508b59d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc72487c959cc322b3a69cf826e89b6b
SHA1a22ab243bf9662bbdb9542283f536d00a14a0839
SHA2568d93870fe520ef031d52d9ba3501a56a5999f50975a5568491f777c0c0f0e996
SHA51246d52ef41e4b648967540b6d080737f676dbcef43b867e265ffdd2c57411f4174f7aa99d54da8bbfa372056f8ee674a1878e15845a24501a59a58d53ff353c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb74b6101b7fea49a18c045ef1bc95ca
SHA13ca7350763245b5690ae00ebe026dce5741e4984
SHA25663374dbe93fb03affc31e81c7d6fefa680bff5d90ff652c313529f80874b91c1
SHA512589e538631e6394aa0ecd41b91e1f676a6320ffa4c395fa15216ba7c6767ab51c1adc3bf6070bfeb4c2548ec0fcbd8fc12f27779b3dfd9b50bdfd7a7d821e146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c41aa6a1f404d2c52880de0a97f1fb8e
SHA12c8688534c333d7aae6d0ce502fce1ff4f63a6ff
SHA256a2533250d19067f2f390eb6c87156981582b7e236c1be09fbd5978cd33d676a7
SHA512072ea6b12bc171d0e0fdb85abe1a5be2bc19b6c4e2485a1e911afa4e8813490bcef27bfbaa3836174c721c346849b113cee9aa8ed578d442a06983094fda6ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f913ba6b5271f52d4eac3d4cc8b708
SHA1012b8d829934bf7010c498dd239940acc4bba438
SHA256c00b7393560b2e87eeb047133ec5941582865895a1750e6958ae88f00cca4552
SHA512aaa759cfe66372270ea1bad01ba66651dc5bc66e81a2a9c41ab4bda802c48136bf32bcb6834e7944c8c7a8072e79929c1f798d872481fadba5fa6881158a8c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53916cdb6562d5389e94c6bb58879db65
SHA1e8e19d8f83e55d05c0019da652ec4e22bc5f12d9
SHA2566aba811a8fdfab6c60888dbb6e28ba12d16fbcbe556af121af1e28aa62568cba
SHA51288d5e7dfc130890f4ad1b41a404055b64f04645e5be948546aaad9b591946f3f52e39090aa33c98aa468a60579a1b223108ed8525b6bd36bab4fa84e4d5f7613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf0edf754d79661e646048be389e73c3
SHA1f07faa234b6b8f5f81c82354e5d06d326fd3ae26
SHA2568aa20acef8772a971fc4d23eb364a838fba7e4c0b9c8e0aa0164eca6f182aa9f
SHA5128fc3547749aa0e974c19de0ae8ed35f65926e44eeb20fc60631f4f8861f6ae5b67d60189f669ff66144edd0e94a8b9484f7f6fab5635d5088c6fc169e9a63621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ec7c70dfe94a1e62fdc8749fefd0f9
SHA18bc232db81a88ee69ba52c2d6926f6bcb2717bd8
SHA2567181660f8053e90b32aa7089ccf94cf822263a796c7d68d34951ada28975bcb7
SHA51246b2a1b888c889fb94438eea6ce096ba9a462b486bdfe9dda3e85111ee0db74ff1c69c064284683b8b097fa01578896010cf16979029f6015a74840658eb3435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be45ccf8cc4231c2a015085d39e3cfb6
SHA187d1e2ef276de7cc923341caca06005d9d8a9f6c
SHA256015d95109c9e7f0ba4abe41a7e5cd6b2185c47229e55c3c8e4b81c039d0b639e
SHA5121e955042287edec6a02f4ab4f6367ea55e7e670d01b6ed5ad71aaf8d954ed0b16c7637c0fcafdfcd43d8dd36c82e710f54dc22da628972cc2623033831dca3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da4f470ab93335f062f60443667a9a4d
SHA157d76b84cb27796148d5c1e4043409aaee38b5a8
SHA2560b94fbca4a7c3dfe0584353c9e2bd77fa95b33be29a15d583e4ad843339a30b3
SHA512ed1681edb4252f2e82773195b6dcc0c6b19d19662d5b169d311cfb0730aba8f00327ed912cd2320bc6d65a40f04a84875913434a062b81ccde4807b6d7efa882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5302bbd41c55f04fb8e7c2efad1b29746
SHA153db28dd1d52c03b444ed4f6da38635c4c763117
SHA256827926d1eb7b589255bc2d54be20565b6462feaba1dbef91326b81c44e04134e
SHA512de56e8932895e805da330f3e9cd390db748bbc1a28ce1c706a3b4fa6d5f2fc18841753266e0406971f43567a92ccb1a94d2fff19e06bb3bd782353e31b561afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de77a2450fe1f9a4fe23974ae2985c7
SHA1f2f3064e0d1e56cafaece5c7f147d075d5fa5df6
SHA256de4a53f3114bc77eb9029bd09381257dc0d5462e875e8b24b1e8ce5089475053
SHA51217dea221cedd070b4dce285fa7f26dea19e1aef975cfab4b06bfbe0fcf2f28b979adf1b75811181898c0cad501938f4ddff713ede89245e75ba866b77a22c5cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e3d9ae558c82d8ed530788a14df7327
SHA118a9723b9634a2b25740fc41f21eabc61e6865aa
SHA256bce164dc5c9866b432384abe2cf2ba59ce70af3bf21877c61cc367a49e649c4d
SHA512fd60d052f25eac0931d8e07c0299da968abbe271607d7a1f2074861224b4732549e0c886655d65b27b2919c2fc93c5f16a292c4268cd3bb130ad596a76ad66a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4dab85f584f3ab593c2c6705a49d367
SHA18e22a3d016910645b229d585d072b3a8e444dbe7
SHA256aef96320522b3a8c517f2aa0558c836c486fcaa44084dbb6c138002c7348111a
SHA512f48da856ab5ba76f84d770bb1f8ab625a571e59da209b5200c67ee7a7871976404395603379dc5773e2f11b0779f26a1b49c32adfa27e79d6c933d7c7f328ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d4c6f1d7bd0775a44389d0b5103edc
SHA1bd0f81a5a764caa3271a0652882e900145ff29ab
SHA25684efe47a3670734378bf5d54e031656be5a9ad4ca9ea6c182aa2e5592f5f612d
SHA512de9aae80d34e0c1fe15efd75e42f984a0a33c809aceaaa0195f9e983e1eba8ed0fb34d61276225964c1e4e05afc5efe40c68322062ac0c1cd56c7ea67366813a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f403eb48b0321446cb4c3dba0f4f206a
SHA18a1b9a6399afe1c6e339bf2ab1962cc650e7ce96
SHA256c937962045b930fc65fe6caa1cf82b9bfb86bcae98149e6464ec4e84fd32a44e
SHA51208df376d9ef3cbc8921daac014e6c731ca0df7083fa61b1327a42e9cc2f869824f90a4f20a29fa22901e32cb4ee7ba26b7b305a9fdc7ebe4885e413ea815cc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ea5fc529e1a30b47beb379aeceafc1
SHA1bd9c0b8b91ff3981bd7eea8a81dd8d82a6d5d3e7
SHA256d845235f77a638475600648b2db1c11dea44d6631c7062585d0be24b42f92c88
SHA512cdbd13627f0628212dcfd38b5280c77acf8335b5b11caf0383908419e8d9d5b5bcb81a39a851c10bf520f95d674a70e23692aed537ec15497e7c8f850e39288c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c356850fa458e1ffa62df51dc1d1194
SHA15f4f94fe4c13d3c645e624c9a7525dfc24ec8647
SHA256679fa79bb17d757ba51f482406d1175978e4119376186fc09402cb1138feac19
SHA5121d6379411e8d8a4ddf070d1a0753f08811f85bd5f3c07a75e9f08f75f152b6e74199c26f368dd4ca1f275ee10170061c54c211f845c768ac5507c7957aa8f4fe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a