Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
081fca2269e346242eb972041573856b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
081fca2269e346242eb972041573856b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
081fca2269e346242eb972041573856b_JaffaCakes118.html
-
Size
18KB
-
MD5
081fca2269e346242eb972041573856b
-
SHA1
2396c0c33c8e73c7e3e5a411389fb3677a44fc0e
-
SHA256
33fb0f7c81322bf85d42d02e36af428aa101bb8cf4a3543109604d7a063e2b74
-
SHA512
3343b1053b7700dbf3714fd4277073294da8c79ffe3ed3f1c2b00c77027cdf32b9cfe14e42d761b8969db62926c07a7a6ad43f02827dcdcdfb3639b4d3311535
-
SSDEEP
384:8Ai7PnEyM5R6R236NY8kGoKwUVoO1drgUiRMlDP7GEdt:7ibnEyM5R6R2KNY8sKrGqRJi2l77pt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000806aa0b6011638d78e3b6321e49dd69739669516723914a9d6d53fcb29a11cac000000000e80000000020000200000000334aa81dd9e9835993cf006656cc2be21f4300347edae1ea4479e512dd5738320000000651c4fd583aa007aead3dc2fe7f23bdce3fa5f8c3322e0330f706899f8653e7c4000000051de9fe6e4c08234b2dca772435b404d2deb0a6baf9fca1872e03d0fab9552f895314f7b5b141752c39a315e3602815f953144e0638e20abfc91cb5ee8689651 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12FC7BA1-0647-11EF-9ED8-52FE85537310} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000eda8adea1e9e5274d408a170d18d661fce4ea8c84bd65f525c9239696f79e948000000000e80000000020000200000004125f0915a203906522eb6082947a8dd717a9c1657d739098eda8a80fe90f0b790000000b15456276b67d8e44f0322783954720870cc6dc7cecdb728652789e0b819cac0b6cc683911d43a873f3929f98413139ea6066885f2291c9d49e3026f504f9d172ebd61380f0e13f785f78d05ec075419b9692597b59c70d97819a1b1e11f6ea8c71b67bb66ceb524f00a4f2222a470d7e7a6527c527af37346c05b97cff50883e4d04601c8e51421afdf74a1c0eb43e740000000e7daf879756a07960e462ad08b3860cef907954f4cb7f395176df82fd92dff532982441c1fafb6410776f4ca17cb032efe63c516927b4ca5f30f6d0dc88431f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01278e7539ada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420570648" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2544 2792 iexplore.exe 28 PID 2792 wrote to memory of 2544 2792 iexplore.exe 28 PID 2792 wrote to memory of 2544 2792 iexplore.exe 28 PID 2792 wrote to memory of 2544 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\081fca2269e346242eb972041573856b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf77af6271eaaf71b8ef14e17726e91
SHA163888e4ffc6ee1f8b3db048fa9f1c08b810a81c6
SHA256b14115d820a0fa1fe56f9fe72df7e0cdb76fa0d635757fe8601de6d86f5ccadd
SHA512cd648549acf658d63547266176a4c620194049bb2c02740f74b730f3ad7e5cf123d4cfcb0255426c381f057adb6c735389c55c11c24d05d87dbb25b38778e671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c65678b7fbf9434462c59f6d3e36fbc
SHA1126f2069b94f74958fae49b9511501b5f11ef775
SHA256f97fb3cb0b2add61c3521c5e329bd1d111cc058774a0826ea06c496263666128
SHA5129abaf58d3c30b65d780ba2dd1e7fde5ad76d8adb33d826d97ab0b7913a0a52d6a9a1b9a77263033175e690ea6276ca0f98f21f6f084ce5185b7964e15b279537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ffef91daf21d32940a42725b2d9c572
SHA10efc0377d2c399f21089ad48fbfb5d3c22c3b6d4
SHA25674450101415f55dbeabb1ba0b51bdeb3004f8d70a88053319e6a399332c3998c
SHA512ddc3ac9a2608af71ca0b083ad465d8e05ea66ed5d2791c78c305a90c8f8ff222734a9c6f4ed8c0674048994b62d08bcba067b6527c7141844c1dc388cb09ca6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5924864bcb767574a94733c5021010e83
SHA1d3d2bc2df63f0927930665eb058cf8ab327c99d7
SHA2566bcd1f9be064dd608b66b29e81bbd41e5ef6e254266eb8139d786d11125f576a
SHA512a6f6c29f80bbd74f44434679803f5faa598d3cfcab32f212e4a9eb3d2f7d5a4f8525e2e099d5d68ed067516300e14a0e49b2964cc64cfc81684c66f3693bfd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55efca5a76d6d0a41e5ceae1042f8f8b2
SHA10b14f55a3d2fe45d91ef066cfc0c18acec8d8d31
SHA256d0eecfb2a7671c8ae45fc815da5d76913811cd2ea23752b0ed652df062aef651
SHA512e666a7decf54fa4cb16a18f0dd549d337da58cd7afb53a7c32aa1008abf4fbf974dc94136f2882f4d1b260721727cf0310399dbaf62939ff457fc57680663a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3ee6500f09a8a7d626d4c7d3fa317e6
SHA1f94a74753ff2255f72f0df3655db9d0caf6939b9
SHA2563dd86d99e8fd1071f5d3d04bdcda0b31003384040f7706ef44ba7ab359bcd1ec
SHA51221e5ea4b022f73d039be846b18b4ff21c77c0f0866e22025674285199d8a755c7d063ce47eefa4e5bd50c66f245707130e1b0edbe35291cd08060dec360f2d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507252e93ee8df554c6b75d5672919e31
SHA166f1346eceb38153a0e8423a378d0a093611c3d7
SHA256ec5d307fba4cd59bb2ed5e7abb70b4051796a3d51a6f657a9389c75c3cea4bc9
SHA5124b0b1017276fc252cce038123e5b52d1a7e13d7940e44a7856051a6864ffa5810a677cac4f39bcaa0c634957929dc0fbbe7779f8dbb688c61b5b21fb21d0178a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe879afc07ac435b79fe170bb7e732e6
SHA1fd654a46b14c0c2e5f8055c03056b142dd3749b9
SHA256dffe2ddfd71f281b1abf41d56b226cc2c02a01ae1443d27b033fa9457ffee75a
SHA51250adfa5b9bf744f71acd030d0f5b91484e9c02190cfb9c21147efb17800347d04974a48a797de54499be3971793e6b73a1e2786c68e5791211ecee6b7882d87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d86b51297e6288fa73dadabbef7e6697
SHA11deb6cfd945dab9b013019cc198709123eb507cd
SHA2566d0a4d4afe04cb1c53b0f2444df0cad7416d671ce3931c61837043c84717c8bb
SHA51240032392c553ed6cd00d33b3309b8d862bc4e0bd2ea24ccc7b6bc15a22c1cdec5b8f9f7e16ead2e1c0f332057f82d8e31f5229e5c8bff1050d5ee56cf2bd0426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f98fe4cd47ba1d5ddad9141f8ccefc85
SHA1dbe88d0b3f9e9fa29c6ccefc927bc6b5b8c97361
SHA25623c2af14337d286ac42e15e7540627754716813327404ac4985e8992fea7d209
SHA5124970e615a63eed4fb5b281b231138309c9822f7de057ce4149e726244ed7117c4337e844d4aafaffd6d300b884aba5f8af871e23e280b9091d906935064742cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5af88627cd4cce04ad03def27e8f6e8
SHA15678e673dd116a2ca54600a74c67fe9716cd8b2e
SHA256943db8c65ee44c9222936f243bebb5b40f8beb1f7822e251e1cdebc06eaae009
SHA51257adcfdde19f4a4af4108572b28fa7edce4bf85580ae72aa8423d16ddf579d4911a142cbc7a593646463c9dd9ec084cea7c1c38d26686c4650bfd57032ae3b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fef195f0e7933cf877c28db299b4baab
SHA112148c92dad5e3834a14f062f868df8bed376dae
SHA2566d412bfb441796dbd8d13c4f3c99c4ded1c345250bff42af55e55c9ae5c094c9
SHA5121bedb0457dc385f91990f29029cb5537af4d237da397387612fd6f7a1040eff5bfd0c1033f2aed45161551fbb61f0e4c4afd930f855e7d4a256fef38101af573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5023b3141ac260641a1a3a75434e38e9a
SHA1b782c0e1f73f9ed13cf2b3e974ecf95b7321733d
SHA256303b46946b8ab7e87c75549ef2dac31d50be8caeced6980924b1979aadd79302
SHA5122f56f4fd07f961c0487dbb23d19c230c1d3a0e642037006b03d8d56ab98a55b37fce62b66a542fc8e622a0016c39e87b8bc62e7ffe7c0da6f75840742278a739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5f483b8302d5a913caed4f7b1cdbc4
SHA13afd0b698ef02f883aef5727dfead4b0b03d7234
SHA256d2634f247fb4542473bef39d7bde6e0912f984347ce17f1e25230a0ec7c0b8cb
SHA5120422feee572ef02a8144c19b2a7853740acf2a0129892404d50af63a80c22c2f78d9082aa9d4960163cceaff69a02fa708592201dea7705502d2e58b24142660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51adf53f58f4e2bb18c542c0c87722fab
SHA13a2f701e848de365d0b9856156f2c03845fae4ff
SHA2564063a1da5be1c69419a67f6aeef62af5a7340b8d9f967f031ddb4e7f18c97439
SHA512069b0649a936eec3c8fce4e7ac4d64143a91144d77cd1285397bb15fe34f8b7f1c25c3124cc447d061ed69732a8d8e46e40151f1dad50ca69213a5861354ecdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0ade622be542a386f47b2a21955e6c5
SHA123c129790e2b6f478d3de5226571f13273fd0475
SHA25625d900796d1d4ff2364fc7eb3c5f2593fe09004f06a74d1b86e496dcdcd40a9a
SHA512efe41b25683b85b84c0a38f26a1f59c13ad943f3c44c07c18e7289436e0bc3bd904963e27586ed026f96a0ee3733f6795acaaec7d77087a9a2b19d6c6f46074e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe78a91ca6c7860626cea41c391ca5e2
SHA1689f200d8b18749d22294811d8358ae8505afa79
SHA256b5f43b3e2e9f90517f997aed7aebbb4a5baf7edcdea59a794c7be094f7dbc352
SHA512ee5cc8ae047d05e25937a49be80575ba3e973f6fd3b81cb51b395bb130058db12f40a05cbbeeccb8f0529941dda12737e5433aa8eb257cbb406d7037497d8b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db535effb7fce036cb4a16cc34f73372
SHA1cfdb0c9d7049f1e36a25186434b492a4a0a3e034
SHA256c0466c362d27a7fbcddc5d9278124ba3d0ac02b9683b23cd6bdf35106b707e22
SHA5126e9f3d88a46398084019317fc3be8447ed532a2e9f1900099ee29ce5e0de5dec95f67102981b4ccf1790d236f331781dd3e7da0269acf8e606a383d658a509a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541aca28c8bc5cf5d01ff45e5fcf7d0b1
SHA1004545e283e8c44c1fbdebc788cfb73490025020
SHA256744779b6b2cbcb61e88cc41ba1549b3e2a8be93432023ec53805bad293e0a89e
SHA51206818f1bcc8c5a33b539432f597c8465806d7c822cc2dae8a432f59177b6756c0e10448f1a3110b1eaf42114fd88da06213e2a9f24ee31b4fe128dfd5f43eee5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a