Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
0d975c5007efbc120e1e4cb5ac278572_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0d975c5007efbc120e1e4cb5ac278572_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d975c5007efbc120e1e4cb5ac278572_JaffaCakes118.html
-
Size
23KB
-
MD5
0d975c5007efbc120e1e4cb5ac278572
-
SHA1
29e68cc027740f6d85644adc8aada08b8412af1e
-
SHA256
be152b99417f69a4299d0db73b9fc6ac548268eb10f967504ad813e442a16161
-
SHA512
2e752bed3bd6d17b3af8aebb76cbcf8b145db93700e40b412dc59d02978618d316e6db3a73aacd95e3e2aca5794234adc7dedea09d241de95d9bef58a6dffe6b
-
SSDEEP
192:uW7Ib5nbCMMnQjxn5Q/qnQieJNn2TcnQOkEntGonQTbn1nQvCnQtdwMBpqnYnQ7p:qQ/8TSH6
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4007263e4f9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{697F2A21-0842-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000eaa042236873e027433a68e78188ffbe60cf2004ebdfa23baf97968cab059572000000000e8000000002000020000000832364870c80638af19cd9936b484856e2a6e2ecf893bc3902c255ee45f707b72000000082172cbfd8f65d2dedda08790a8bc698b15408ef9bc3f3fa345ad8d5f3dd1ff840000000fe5a950696031a6badb95517a04ff6d8c095f988699f3c5cbe52d325cb547ffe1336db0b1937af28e8f401c0717156d9558ee52576d925792f7b97457dc29582 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420788548" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d975c5007efbc120e1e4cb5ac278572_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a904f207adb0ce407bfa25c8b6aaf6e3
SHA13f20180cb7dd467703b1df5ab15e0b196f7e37f6
SHA256c172128bc5d78754cc99f6f27575ae176bd5cfee5c70d51c9d241795bd80370b
SHA5120546b49072f5e09df8c5e613c0c1b040fa27b8b3f8451ab639d59b23a131fd99bc09f37fe45af21c987792c01fb535ac74aa199487cf52859400456c48356d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4208f74035327e5851825d889691653
SHA1ead80095fc629ae954a3e0a910c3d641e33b2801
SHA2565b941091713e35aca8a4c50186a1f4cf82375a704e5211375714bbaa5c153929
SHA5123fd13ef3a437884faa78464f77d2c57dc0c64b99eed028a9be93939ae131e33557221b451512a15ca398722291ac250c21e07f751aedba9b9066af9e6d8af031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa669d648eb7a037c128305341f054a3
SHA1c6cdafd1a4569fc88d698fcad1012fb50725d2fc
SHA2566f7e5e2fee69ee0af9a58f3f82407d9f183457d0e68fb64a46f173a7ff4a9e5b
SHA512345db8300818de6b817bf39c221d34afe82046297ee7faa8d7f6b36be62a95e0ec51cb76f0cea4611013dbb773081ddca5559e345b77fb638756926efca21195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd7c28be10b15782f1020e7ea772dc0
SHA17cd3d92515149c3ad4437400f08051b330b19c5c
SHA256a74a3efb0f4e530e7fc47ee9d79781379a89e8c7888244bdd1cb044193cf7857
SHA51207c6de9484c75758c3f6c7ccec7b6213e7300c95b90490d2a0b459e551a0a5b9beb40764b47d3a824b50dec79ab947925789c71d631ae3f0835cff88f36c27c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8ead3f85359b3065121e3c5c1e85af6
SHA1266b5e5481d233e80ad28437ee8994304010cb5c
SHA256ecf7d077c607aa1cdde870fa81422d9734f22b398554ea32f98fd068f3ce8761
SHA5129188b6df226eac6346616f932b7732bd4bd8d5d1c8a1329cbcbf82b3f208bcb82df7a933f3deb19eea91887f9aac582df0939b51545c88e484fb007996377323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e05a4460eef98d101e9adc5fddcf1420
SHA1136d823c7fb7af3207c0d9401df643549adf36dc
SHA2568fd660967604c9256a02cfdcee488d9d819bf4c71cabcb59a91d85e22c754401
SHA512e6acc47ec390aeb86b51a54684b43f976d9a24aa215582299a2e0f5655d94ece2c34ea631523245cfe564fd30bb741f2b60da85c9a0e34c79bd9772ef7d30e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ccf199fd58ac1f5248151b3ae8586d2
SHA1d441f7f4126a4394684ebeb74bd73e8c77f4ec26
SHA2561457d6fe7eb90824f199a859704a4e49ec1bfec2c39dafb87d7807abe73c5095
SHA512539ea00ea8135af956e33b5b17b209150e5eff4331fa7f9d5da186d8e5c259e434d2844c15aac84cf7d226783f957b4f7b4bb5cdceef533e7670899bef149b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f685e5c401cf9a853ce7392a29abc8b4
SHA1cf6526af050556758ef93cd333f32568e6f724ec
SHA25673e01dd0b0194b1d2222631f31f009c9ce4b7ede1252e0de840d4b4200804207
SHA512e1145149ad404c6e2c58550992942b1691eec708ddf559cf13bd0bf46cef54a4d9094ebb0a32276ae0e22b151991042edd917edf4859dba13d21e1a3e7a42c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555dbcb287af09ea708095d20165a0abc
SHA19b323b4afcb617758c1f9848a4debb26bcda9079
SHA256951bed62ac0b647836d528bdad6b361719911abe1a2a0822eb801127b4b43eeb
SHA5126183a2e4f6cd4165157bc9be8be2cdfd5859b5fcc54290ced0623ca51fd4cee02c3b9db34a2255f408ce47e37400124c7198af186779bdcbe0ff5dae0d8b4c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7af3a73b5e4f80e958fea8c098628a3
SHA14ed78aa7427343ea90e6de3266abf7f1ba81495f
SHA2563f9ef9e150b9c0a32bcb8ec789ebbcf1b1a4aca8250582e672a77773316c25af
SHA5128d3e35804f96d906c656d39882bcead97708f695a684784adfb008183c0fd099f6f824f42a7a46e28dbb3bf21a83c73d652e0f04245c58b06f4db420f3554fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5e65b059ccebc7b549ae525fc3f196
SHA1d0f13cec214af141f4cb4fecebaaa259ccc55da7
SHA256569c9cf771bd29e9c257e17b8f5d6ba9360718fa40fcc5bc70ed5370817e7483
SHA51284ab21d075a6c6a97df85436a4016f8401701c35ed3cb0d42abd1337027606c34f4a810b7a20c64a0683bfc93a1df4262f245e0a920083be8fef275776c37d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532f928a3e2f3a2cd3838eca45c68d3b6
SHA13ca378db7bc490d66c2aef36f0c3e776564aa30c
SHA256d39c8532e431b237b8061dedef38b9801418faa631349cfe319a8d7a51af3e1a
SHA51212adede787cefc6097219b743a34b9a6b6735888f582c7baf1d24118797dbf2c46cccbf59526161d83c9df802d9f4691abad182310fcdfc25d7b929dfaed29d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288ab3cb889b7030e9bde538e4a8103c
SHA134643d0f5ddb34d2c99efd0e0a7e361d4c63be1b
SHA2564d0fd6aa38d09ad4044019a88bb5d93ffe6bc33cd55657b8e814f464d758c1b6
SHA5122bb57aad6a536955a570c75c3c869c5e9d15eba6679bd2712604342f7ab54ae5bb58626bb7f143b09ba661517c878ce1d67c3ddc6f9c0049fe77d1045a3222a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a64bb57e2b63febc76432bc326713a
SHA1ef00b0524f7585ca8bbb44672449384f493f61bf
SHA256d3347866ae8bc9fb5dfa83de2f220d2cf4070559cf87d83a749c45d4f97bb977
SHA512487bd5af6bc9d33b54a9f6831e19ab060eeae50f0130c8557d128e7094ec59306b2861e9c23d4f77b1a97f9fd4bd81ea2871cd661ccba6f944a1894ba1ef83bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2436b7f8fc7c0f133042c3336bb8c3b
SHA17b58b0a4ae1220b4e1f54701eec2baf2af706b3c
SHA2560ab8d005f30b3592d1215f1815f3a10d81f8dbebe8e083238ded352d64316e94
SHA51220290773156e6d7c27fde71d6e8f715dc316cab0850b963108096aabb131b394d86ac02af5a31dd95599d7d7299e623187b89947d40639d7332c67486703e784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5541132da9e73e52136f40b4314ad39a2
SHA105c94f4edeafc15d5206f60670234bfa81105c21
SHA256586f83110518e2543457e000455850191a5da8fa21803653be6985d439ae6bf4
SHA512f37e68504258a33e309ccdaa7bd6c61940637226a24a89d94c997684b7ffcbcb9223368eb1ba8057976f9367976893ef9c93f958431f851b8e629610b67440a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e97cbb8c52634fcd560c23a25cf2b8
SHA1b13087a8ab2ac1e2c2e00356dd9b814caef4dc91
SHA256c54d36caecb25c92914864fcdf9bc888e5cefd8ad0c3db207e1865f597925457
SHA512458f442f04988fcee9d2b94721b95a12c9daa0aba48af32b22cb7749255dc306e04d17a8f3bcc3c4a22779f1d4b714c3977c9bf07da44d8586004ccc89ef51f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539302003b8b3f604d41cc4d0e7628923
SHA10266df7e1b4947488b982a235ef8c8b994a55ce5
SHA256b4c4a3cf4a7838d6d962ccdd24c9f8eca3e5044904ba8eebe378b6171e83612e
SHA5122e73e8684f496344ab91c74584490956bd49e61da9da1ab5c2571eeee8106da1c2f1799254cc45e8f096044e2eb6a6c9e22d1f6ecab2e5949cbf45836e71555f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eb98210477411a5bdc1b9a3e9b7606b
SHA1b6b927ca650e2a27347caad00bd3f9ccf42a424a
SHA2560eeff58a592588ab77a0ff14bbf4e6bc6edaca02eb05d3154287e06350cbba59
SHA512caea8020fb4952bb3c338f678948ba6cb0639e37a97d54e57fe8d225d99718b962769d1659a89156d4d2ce4844fb619e01aade857ee108cd86e1163d0a1741bb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a