Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
07c44dca6c9ed8663d2ffc5b6856b94f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07c44dca6c9ed8663d2ffc5b6856b94f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07c44dca6c9ed8663d2ffc5b6856b94f_JaffaCakes118.html
-
Size
21KB
-
MD5
07c44dca6c9ed8663d2ffc5b6856b94f
-
SHA1
fe5bd143aee4dae766fd71e13daeb9940e7d51e2
-
SHA256
563773e8e42dcfeb4dad7c5137e502819f5879698d3c5ead0f781522ef32ebca
-
SHA512
72967a7c22053a02c8e5a8288eb823a1d959733f3602786cdc15bfdfff59c10d1d3c298b3dfb1d020b5d43528cb63691e6f28ec7e57fdb18d1a2d07e7fbed091
-
SSDEEP
384:ziCKhg0TVVBD8cO3R2XAfImEfP4ycbp53zVcrUDJZTOUua0Y:zi7TVgcO34cImGP4yC3JZTOUT0Y
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420558978" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000371f3fbf59f953b2f23b5d90b9da3e938527928155613cd3e3a8718751f327b1000000000e8000000002000020000000f452e36b31761181838c3e764f57f96efb1b2f4977c5a0d4dddde3c00b4e0d2a20000000b6e0ddd40acd2982b02999729f488576c2f33423208736a92e1ecc22e942ba73400000005bd4accf86ee77705388c3c1927f1d275afcdab74b0a432c4b99f2eec5d7418b4edc766767dfca0f2bcafe8c4a0263f941bf26a0059dfbc96ecf7315547b493a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80655ebc389ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7B6EC21-062B-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07c44dca6c9ed8663d2ffc5b6856b94f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096918444573ef3a8e8510ad5cd75d33
SHA101e86315b795cfa1dd4a13dfba346de070d7c295
SHA256423527be6f8156f558025fd2670783d70a6414287ab841862fd7582d27829e97
SHA512b93cd14286e540ef55a37130fc5b26f375ff426ff59ec55170852b1747a8dae8a686c82b5c577ab76818611f41313f6f8004705b9d073cba22e9855ec8b94f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a39ffd984188ca1e9f8a856ec1fc2e94
SHA13e354853aaf1c0193ca654a540c0ca6ec566d8a3
SHA256494886342ddefbb75f48d9e4a7d67717e7fc2057bb2408e958908ab45244937a
SHA51211a43412cc4f1d03ef961fa6afce4c3ef666dc051435ca438f2f7e8b64b65d2f76df8faef4841cce6b93dbc8b879fa51007c53a40f62358dcfa85531f9d2f10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a821a6135c3f86072641768a44c680f4
SHA17abaf58cd059d039e6f36ded23ee02f327310cfd
SHA256d7325cdd6ee873f1ff62c27f4414ca1ccab8aaeda4786eec81dcd98c34d04796
SHA512bae7f0ec3a6c5f62e0fda37e1fd5bf9fdedfb71289f8a50934e0bbbe8f6ba9ff4decfadd9f2ee5a2d3ae90d31ccf1367fb1467e162f8becba47a459675c511fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c866386cc16e454694d0a7dbc57cd1d0
SHA1038977e27eebb1552dbd9cf90819ae7518343dda
SHA25676b3d9ad4abf93e3f46b9860216917d0909ddfea877898dee433582f5d9e8b7a
SHA512fb5e87871a0d9efeb47d97c2ec36a6b180f44fa246a1c5d268f496ad3d752c51b17c138427623c11afc7b4e1343349865f91031e1d795db3003ece8dd4b1533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5835df59e86bd2cb51acfef86f55204f8
SHA172726606c281e81973a547e4ff3faed447c90abd
SHA256b3858f4732593fb043fbdd80b31b6d081cc0351f267e9d17f30cf2923dd740d6
SHA512b18476f198020da16cd34eca85cf7341c8284ff47bde25dceb80cb5292cb17530bf1316d6d84b08dd2d429ecf7ac8317780b9af1be08c07899770d4137448b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d2134fe44f5cedf7f762863550b80f
SHA111276eff9e7b7102f8918716f82d2039bb038875
SHA25652465a864ae12b0a1c0b187ac3c082164f1072ee87a84c94cc9758d5fa640a53
SHA512733eeb83831b8664b5f3c9d52489c1f6405e193d296cdfeb71c3f7fca9f7ef1174b312a0420bce291b0d8133ca3cdb5edd7f6c7da95f5f790f2abb193114d738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa3914b3f1676ab2d54ecf098f558ef5
SHA1d642ac9c3c0bfc9c049f2a27b6075afe558be52b
SHA256180855f59fc475c4aac4a49ebf43a1f387ac5a3d58c5b39430730accaefa0a12
SHA512a9eff7792ba26b09bc35ae42256e7a1be8a703508c6ddd2dfdfd48b3a8fcad487a858af1e5ac1e04b2851170494435d177b41e91f413e8a76223a6ebec441466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c94581b1835c69a97d4e8873754acf
SHA13d812cf3dfec0d6b8b58aaf74b5e577ae723275e
SHA256701290c02c91c9f52c0f9a1d2b3b47d2fed7da37a448c729cd35cfa77b25ad77
SHA512ab9e1b395381020667f6d17e9aeff6ce3437a5872277ec84fc10e1ebabbecec725411b82a20a3ca77b1481579e22a0c619d3541e904964b31f87b4efc0d2cb83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c7995ab86452e5af7ca4647cca97f89
SHA12f0937ec675172d9969b7e90d1b11c64a00873b8
SHA2561c950a3be9727983469224ba668654f35ce3b754980eee470a55faa25cfccf2e
SHA512ea5f318a27372a1792ee78e5dec6310ba56451f9d3c7ad1ce291c4708af56ad806b367288ebf9eb928e1aa1e96b68bf3b30384c770206f98b529301dbf9df1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625d325f181bc8447a27ccb4b3a85796
SHA151587baa02f39fb788e4bd36ef5e32ef914c8cac
SHA2567c54a8e624a40210e4db4894273013b6c9fa8abc9f5b0b6f1fb6d782a84b30ba
SHA5124ba48f7a18dc2c0dbb3b7b3d2529fe2cc4a1f5909b5f86d753659de065af01312391cc61a6d4d82bd042c8559f7f2a9c7cde87aba877b78ca3ba4c90c9ed9163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50714c19405038b6b2e27d2cec10001a4
SHA1a4d07f0ba5c697fcd954e7a404d28a7503504269
SHA256aa47efca1e42b7c3f0c3e447d0bf7ec634ecc5f38703bacf356b890ceb150aab
SHA512a55d2ad4f1f08b27f138aceb397f5562f2793d1f5c6100d70b8b6e4cab9ab49c15db1e5c6375799c1fab5c695594dcb1c688a8feba743bd92ecc6e76bb328286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c0e9cc1d481176d3a52c8ec1430ed2d
SHA1877e386a64953b8851b8397729ad241fb2a21050
SHA256519c54bdd90dedbce0bda67798cd6a560901de50871ec9f9cb7ef28b6f90c92c
SHA51274118e76ee108a2e49309b2f027f1e7ae56d82c52021f667d098c4ccd46c3ae4d4f2cf8e6a1485a2dea9faf8c8bead0644ba52c71c01b95994170872da25011e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a47a4fff1bd02b572be7ec322f8d185a
SHA13f6314cc6c3edc02404dc46959f379ae2d635c5d
SHA256d4d71dab3a950c6ab259c7dcd0817dcb36a497471b0e2a704cfc0080d66c70b0
SHA512c44fa6dac95b6addc47db7197eb1980a6459b6cf50d08afc374159c4f1d06ea6c24f9828a1e84f87cd1c62312e2f6ef2e6072e1f3d8b6acea127b3f209c1feb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d4c88a79280bd105958a3c40f39d16d
SHA157b0d18fe71611b7e6413555139f94c4f6006f7d
SHA25604778ceca7c8f1721802910fbe3042114afb197722ad8185cc92e2579448cb1d
SHA512ac4b4e2137d2809b9e94875240856b51979fe9801140bc1cd78b65fd5990402b89203aa39739aae12d622e593def05ca26a463952a4fc4f8d4a9d466fce149b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967c8c7e1a013e1eae759de18743b3e5
SHA11fca6ecce8b8bec77ef16223abbd0f26681e60ab
SHA256ac8e11bd63a55eaced419abe2510e975897c3216f5a710479a096a6f51dadd1d
SHA512cdf292478b1c0f15e86a14c119e51f2cadc8c02d42453320f8bbfd4aec8b237b6bb9643cb3d99a54cc0b1d0e6b27707cef8e01f6daa9f3488d53e57d2e4e1e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c6bcdbc682449a5ad371c113b31f3f
SHA14e90e298955333fb055fae076b37ad3237c446a9
SHA256c430ea51f69e8ea597bfe3a7a56bd4b6d09ef27721ed0b2227d5502a69bcd41e
SHA512f072fa3277f954ca2dfdeb31ee138142056d24fda26d9880114b544f03d50bc0b612ddd168ca27724664e9331f04fe65f874924febac693a0794713d257ad6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b86a36dd53866bee65a3c3af2d74bc
SHA108761cb9454c7903ec395783dcf4d7d8070e1af1
SHA256408da04d888e042acbdd1d84844643776dcb14e242ca96fc1c0c228ab4ca2ccb
SHA5124039f55554a79906d94c69cce51e419110eb34c9fe55eb2e2cb7874441b2971e9b8565adf9ab4e342bf4c3e6a51c9fc23d4b5ca25478a6f57c48451198cd32fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a7805b47cbc0af5ed7374b455837d7
SHA11895335230ef071b7c8c518f6ea5fc5d9364b5f7
SHA25662b984fec34903239e745bccbe30aaf4b70bfdda9a6bd57532ad4d805ced50f8
SHA5128d4445e2acd1050df5f0ad99d58c388dba1990f87bb27af9f0c6f81e764d14eb74dd5c66cc66bd14e4b1efe1c790add64cf3b371925753f28ea0c64e67ba4f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29d84616023069d26504489c0113f0b
SHA11b21b8751b873defecfd22066ff427ec4bfa46c8
SHA2569c55477edd191e5325b3508192c5445a4c0284b083fe12d5d4a7ceab128e5263
SHA51274b2166dc0209561cf99d04c3e32da7a45ae3f6840f9e912b727e4413c423b29d5469685f78480e0b928ffc30d88a42dc9322bdba247d1fb83a1b0c521ff5b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f12b34aaf90045fc483ec3769198ae
SHA15866b8602f31e5d50b2c88c3ccd31fd9ae0955fb
SHA2562e485d80b3a336900e30074488e642b1e58862e0d1436bc444b318c8aac33a8b
SHA512600f49be61e3d3511cf94b831af8db9f5949d13234e07a7f7f404750c1a10d4f06067d91935e6fd3ae6de4797fde7a92e8294f569f7f1645211fc5550daa220d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a