Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
10237d957a0163f82f80618cb11a7099_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10237d957a0163f82f80618cb11a7099_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10237d957a0163f82f80618cb11a7099_JaffaCakes118.html
-
Size
139KB
-
MD5
10237d957a0163f82f80618cb11a7099
-
SHA1
ff5650cef4b456ae2d4df552e17bf2e89f19a0ff
-
SHA256
3699afefaf1536655be064b01189c880ad9624e235e83cb4bffe39779176a2d3
-
SHA512
e63e236c6accaf4075feccc8aa4af7aa7f1e1376c900890e64fcc485f94e4602b8eb80d12220b9c30dc7e765655b08959a0e859909f303e11f2171351ca7c49f
-
SSDEEP
1536:S1byqNqletyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S1HVtyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000be8c7f4212c5c21c4c5f6d790b5c7127f3469d08d3e02e7b66dd5403c1ea0c22000000000e8000000002000020000000845cc20ee48c5301627053577266aac6872d38218205fbdb5db3d9e5a6a328582000000028beb8e22ef4df5857049056b819c5483e87a8d0981a796eeacb08956dc457c640000000e7c64504a9294e187e089da3337de921b6e0033834b00c1954a4b4723ddc0b5dd8def4ba9b63e2a80395e49c2a2f5aaee914d03d923e7479e81eeff7b1ab3cc1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BC63D51-092B-11EF-9969-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0640452389dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420888544" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1048 iexplore.exe 1048 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2872 1048 iexplore.exe 28 PID 1048 wrote to memory of 2872 1048 iexplore.exe 28 PID 1048 wrote to memory of 2872 1048 iexplore.exe 28 PID 1048 wrote to memory of 2872 1048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10237d957a0163f82f80618cb11a7099_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b66d0f0817744195f2f20701873ead0f
SHA113784893e3687dfac736551d5d170fb5c7b1baa7
SHA2560e9c804713c4f12d9a39effa095ac02632d1a3ce577eda4f6c39ab33977e4f27
SHA5122c6f2829026ee8f4b35ae5ee324beef5e89c5fe11e0ad2d003a672f55e577c4602ce22b01e54e18a9900a3eb27e62315cb75fe2af7ee5dfbc82f980fec806fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94ac2f4e1fac733c0cd878ec6964fee
SHA1e23b5d15fcd9d3375e8935db74c8f60ecdaf652f
SHA25658a5fb106625e76e1177ccdc795c1a729d2f5bcf39a7d4e826311cab5f6dc430
SHA51278bbe99a1f1919de9fecfd401c632a7fc6d1e5fb8a450294466971d9f992dd425ab4863b70594c2c2ac800576b2eedabaab0682c90d0895c2c32637f50a37481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d0e769c8e348bab8fe97cc34c919507
SHA1e79b26c54fa63672f16365460ed0d4448c1a003d
SHA256d08c579db7bddfaf43de2bfceb11d6b07d3119eed730336ac840203a6ca6b519
SHA5128daba64fdde549cfa0af2ca069cd6bdc13c7dbe3c464ced1759e55301dd20731f3a4067b16e76573d45a36746c2a181d1fc0db36101097061ea1d8995760d22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3de0b813dce50774a4b02526828a22
SHA10b9a2f3f5a7bfef7e245867d261a4f6618925427
SHA2560ff5b1a04babb154a5f9bd3cbd5fb79210217e3743fe2a7cf51dd308cabecca4
SHA512747c210df20973d3d288914ea64c5a595b05c0d8b15148712482eed9937fc16790fafea340079fe9798e88a1d567b3e63c182906fb3fc8d957124ee9f65a887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c7c1950490d0c94bf2ec9ac2d4317c
SHA1e56ed3cb7dc1a4d7326d34ae3fe5a4d9e1c3a627
SHA256b39bb96949d2d583fdb8e703c52ba05423abbfc7e1396e1d4f9e371387dd1960
SHA5127a68698bfbd1cb5d8fa2015955fa9d4cb57bfd898c3620981e3f097512e8271454931263dd85589e56fd6786e1beb3a4cdc779defd6adb9c9b982241a7cd18d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481651e7101bacd18dcc6476184cf585
SHA1aa492a4566125734529a16c541c01b63f03efaf1
SHA2565475fe157504b521115da20173417cb5a3230b72c139cbaa3cf45e03c18de713
SHA5122f72d471e1160529e5fd826696a8da857e01eefa82c3a205aefa3123153a2048c1defec73f2ac762ce3a51f2aadce611f80feea07f6c542f5701f9f930ead31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558dd5526105d7398c2eb8f3a5e20cc70
SHA1f513450610896f0b3a1101807b3189cabffdd316
SHA2567a95ebd532deb6b18ce52da88af0a44c656c4853aa9f9b571a932812b4f47d5e
SHA51223e3dfc32dfc676788ba52cbd3c58d3f1b47bd6f163ab6175420a188ecaaada2bbb56c4fe746ceb7596e2ffa5374961a0be53447c1eab770c79497c32cfddbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb97169a531e4120d5af6ffe4923a26c
SHA1fe44e37e4aaada89efcaeddc8c02448bd1b19272
SHA25635e5b68670324a405d7af21a2b27beabe8f897555cd927eb3bf0999ce5d37743
SHA512cc58d077c2357b8acf8717c065794d958e8a2d3be92c94d94829c10016ce4af859386ab5ec5f5c608900939582995df3396aaf3e621125e5400b6113e52685e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72a18a6cc02f3804588b61cce61a9af
SHA17094ccce3485b6ea894b38f8ea80cb51568c91c6
SHA256e5ceea7d90e4263f30602e18364dd8aff57edc4f96413a293bd53a0cea01b71a
SHA512e3171f4f3dab990fef935de3858053e760f1b247c9764dfd702d04e0d75d676006f9a62764a900a97253c78026121af8497f67987cf2c31ce8880ec16112d28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa30a4b8612d680c8ffe4f414bd1a5f
SHA1e5f333f920e596557f15e300a22c1508c2b694b8
SHA256b97bc7fdf0a9d6f9d008134754cb56aadd742116a1c16d68866df9a1877954e8
SHA51271da221e7da77410f3abc0454d16874938d44674eff382e8f568d01a39ce12da37912d7cc9438064480942f57a83601d266b1a1cef1b5bba97f908bc549b1078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5003ace62df75a483a1455872d3bc0777
SHA11603f5a79f77f4ef5dc540811fe145db64eae690
SHA25676222cb167fcbded466cdb07c6c305826f2774ec8809a3373e536d64f99260ca
SHA512ecd9c66f8c4f99fcbcba7fb058e39bc8131fccfe921357ca03e67025d9aedc70679ef5d6bc6990763c9fd64c5a1947d09bd7a5700be19dab7debac2d9c09aecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568447c1fc6d9bd18d0ecb611e1814095
SHA1d4b6bf41394b91f7623c3d5f29f6e433344c8a04
SHA2569c16f4518b22490d1c471015e2c3b80f43a7ae84dde33e5ba2a3cc14f439e70a
SHA51202297580fdae2196edc1791c5229b1469f1727a53c4629a1d1f9a9310cebfb1eb96b0cfb6be10cd46d5eb88e0e759c8b6ae99674ffa8fdbed4491177bdd5327f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541005a483b0a237592c49a4addae406a
SHA1200e4e2f5521dadd5a9c000a62bd86c965157bd6
SHA256d6f6254cd883b65bd6f6911829f0819eab62444b87ad8956bdeac362d51fe7ee
SHA512260a7c0669482598d3f1c27586cb455b116c9b0aa239b23c47c7d32583e4c8da1998d3866b3be7cf5c8f566967b75e5782a1b75aaa68fedb3b45a73ef391f384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5538eedb7fd6cb93ec91d46b65bc7e29c
SHA121a0b6d1b15dfc80a58409f5faf7810932d9bc9a
SHA256953ed7c40f4537581bb89405a28e8e47c091c396295bf86a5722ed208ec30a05
SHA51263f0e97efeb81d39ac663ba3df5648fe870c959eb0d6e2c6911c628a18c9720128957734e0e2e180966667bc207115efde886986a123b905722715545cb9a83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d6558c476a023a5a863313924880ffe
SHA1e92c52e26e0658c2359ddc4ddb87712e4bd121c2
SHA256d4086668e57ad2b97e3c3ae93b1ec7e1bcd5b57f98a0e3020547f4abbffe55b1
SHA512d347972cf30b4c735efb1ea966bb7ff0dbe0362ed0a081780944fe943434a4b997039c961ec02118b10248affd4c7f36c9829bff990462dd4ab20ea6b0402212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cbf6f624b77a61212924bff671236cf
SHA1f1cb7f743aedf9445e04ab7af8e57fa53088ec80
SHA256f41607a5f3866b45eda81c73bed09a020cc32a6edea10f2824e265061f0ba293
SHA51217c0cf2fd74f98363586ba212735765c213f7b586c195a279dce276659d80e5bb93d7dfa93483d70759b995979068b88ffd8de4fb3d2b127e26b65624ff58e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d739bf9e90d4637608073cd73c077e2
SHA18e2c6ef2210f9fbfa2b3bb65ed09683660974b99
SHA256358cdd76efeb2d0f1c59d4b75301c472d8552043b344ab8e8c4955041c033234
SHA512525c85ae099ca6fdf07ed7f43c7e03d5db973d6e36536340a04410c18550cd7e538cb4baf26514aaf23463fd80b9485c968c36104aad88b9578838dd90ac2d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fdd76c022950b9a65bff33883ed6471
SHA1a5d27fd7344d063155b9c1c4a03c9f47b7088a43
SHA256cc3f2db16923655d90d7eee7770f1623760700501294b6baaf930455f321740e
SHA5126787ef6100427f21cc336b5e1a551792a3909cfadc750a75247431c60fb0318953e492076532b2e896d7fc60552351961858022c3203c766c2163d15f46ad838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dad3c23cea7ac4edd243facb68b337c
SHA1b54021466576d8ce50628d43b53730fb115eebdd
SHA25646be379854f8e2e258bc6d1e92bc858c6628057a16fee940f0df9cad3bb86cbd
SHA512c8610dd5044c372337b6750e5a596f00add28265fd8fb95b207cfd3c7457e132520e809b7e4562b32fa9c6396864fb37eabe8e2690bc733a55298c682ded332b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a