Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
16cc2c4a3168943b5566dcae202780cf_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
16cc2c4a3168943b5566dcae202780cf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
16cc2c4a3168943b5566dcae202780cf_JaffaCakes118.html
-
Size
460KB
-
MD5
16cc2c4a3168943b5566dcae202780cf
-
SHA1
eed387842fe48ec9b437ad5b55c44c24ca745f3b
-
SHA256
13326d36b3bd5b74099529b103d08e24193ac9689b7ba853b9668f69f36d8c39
-
SHA512
33e87bcc1f8544e0a1ec2de579de66693c05b18ad3ece7b9a0221ddff1afc5cc0c6ce90b157f2193161384daac213d61be3c9bb126bb701bd616624e20fedf9c
-
SSDEEP
6144:SvsMYod+X3oI+YhhsMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:S5d+X3N5d+X3N5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000dad07761f57d75a66cd15fa7348b75917bac5a19bbc850b65da090c1c68e973c000000000e80000000020000200000008524fe7a900b712b88baf8857b0e7f242d312eaa79f6b6e93afe937effba149290000000522bf8ba3124406c4ab39375165581586d6dc7259585bc1dfc4c4b2243262f3e85a9009ad659a13701b7bb04e58bf6bc71e2f5efac2364837356dea39a229a6d3ad81c788a56c73b3a49f9f38c18319f664843adfafd8230d00cdb92372befccbcdc90cb4db7e1d377a8916deb20bd801e7c9f0757436191acb6741ed1a9dfd49167618665bef6066a4605b16501fdff400000000de1953117e6e6a881f2e39ed80a00acc155153c378a5b9bfacbe6d7374d350e43685d8aa00b070c7a8f34a1250b651316631e411a5f61a76d8201f2846a4fc2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000733d881aeb658a48c87b2408ddde3534b6c36cc09dd1e3941d718c9a97d18324000000000e80000000020000200000006cbe8f3f2daf2831f9b05073af76372616eed0f7da90f539999e5656c15bf53c2000000032af44ec179729575db9cd40907db0f08ffbfd8a14c7dea138e0d80862a2c2a8400000007d64b2ca878a44827158ed0b8f05ad8330e82a7a21f05712949e596f6e75e91a1f571ced3147f4c9bc0487f085e8be02fcb35777895f54048b6d0f943ae0c170 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{891F7881-0AB8-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e074ae61c59eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421059184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3012 2300 iexplore.exe 28 PID 2300 wrote to memory of 3012 2300 iexplore.exe 28 PID 2300 wrote to memory of 3012 2300 iexplore.exe 28 PID 2300 wrote to memory of 3012 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16cc2c4a3168943b5566dcae202780cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a26a05093b0d31f890ace5334f6cb27d
SHA1ded335e6255f9055d541d4c4da11e22c2c8ef43a
SHA2567eee923dc3633d242056ba7059c4504d5476f42a097c36726235c466f164738d
SHA512ccc7a17b6a176ad20072072f069133271d94bb1fe16463689e5a59dba928f2454780b07936d97a751a6b6b9a4e541dd79d7532bae5dcb7115429cc0cc7bc9797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ac45215afe6bdb3452f7b208882b038
SHA15f23975ae4cfaf29921cf91b649d193c7c057701
SHA2565967a5e3ca151b6da272f2ab71d0baaf7ccca702c7827381f8396588a9d75c77
SHA512f59d67e9e8f31115685658587e4027fd764e2b4f76aeb7d9ace591f69714ea6962b55a44fc77e089d3c0054c1deca86000d238612e5363bad3b3d42a315a5905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54847d42c5475d1c3e82f813a94457f37
SHA1b442fd314434d0e44811f6c5fdb50ce868d1db32
SHA256bebaa0797deb8e47c0c44bdc64eefaec89c8d4616a20a04ef848ed6cc4a3803a
SHA512e38370c9606cc822c1aef0917a6b37d752d4fc7db2c474c17aa00365f6c2065b8706841c706f4d0fb113c80d33eaff3da81e869bb3c969948b272bc26017484b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dffeb9e2c3c3fa323c62bbc00d69108
SHA1af6b7ab70de2762d7659c664231562b116e1aedf
SHA256b10e9a25fd147e80c19b77e75a9be373d0f4a80c099eefbacebbf1ead7c10a93
SHA5124807b702451d793e034d0fe92d76ca9204517b13ebd3fa55c0932a0d6076899b97b554dd3fa1c83302f513101bdd7fe439143e1d062dbd78150a28f9bf7ae903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59837ee30e3be53ffcd729ab7396e793b
SHA1353b0422f71e9b1e5457bd375a0921ea15fec138
SHA2568b3367f98babb93bd3839e2a720114d74886e7f70a9d7992491ccd7f2fbec92d
SHA512f6e44d819f4cbd27daf8d907f8b905b7257b1209753d1d376ffda5db8f95df8cacb087ce8192aa227d0434e97dbc106d7bd32c7d98b2b8897091571decd48321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57139f4e8330f5e802bfe9fd55ad642ce
SHA1b810e83a69ead88169a99cc80677e9365a0c043a
SHA256030df7dff8b86db0ad89b66abb11c70691dcdb4d577e1987ea9a1d55ae8ea304
SHA5124a3642ef1be97db291c7ddd5628d9b31db27e40be114ed8031b9c7d9adac45bd00ea5771bdbc9cc33d00384c58a2781233d86d0384fe0137d871564cfa1cf0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5233f72fb855ffedab9592e1304686f5e
SHA1b63fb550b2a71490ff1cc0b112addae23d5c072e
SHA25626b24859c69e390ee907c3778c44fdb4bbc5aa9d3684aa35a58df2a3cd23747b
SHA512de19b80669c6dd1a7a429de1f3cf56f5f9034efc322656a627d5ea28f641803e7af7f39b1c813724f5b771e34014f127f63e444add7496e35277b59390425c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58825df4c3c6913b820a9454a039e4306
SHA108d30acce7c1c106ec67457aebb6adbdb912d03b
SHA2568379f639a4c9d7f79ccd0959d989a626cec60b8721283a8c5639d3aa7422943a
SHA512ec6d8cc513e4d7e979c0361f784885268cbfcb662697bd4cad800b1ede1f16c769312613f2e71707669bfeff291b5ec667bf3c4fed4b70eb77e47ebcf8a74fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5debb5838467025717dc1886effd42a
SHA1780ca8ae83007a0c89d76af68ee40a2f15f8f607
SHA25696f047c67235c87939383a0733c53495c8bbdbb01728db787af97430e0b6fb9e
SHA512fd3f0c513ac4323f491d13cf5108787cf0c2801f2611e78b14833132238e16eedd8a21ef115f7739489ca6db4d594af0871ebee0da9ae8c9fbac14605608777d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5292e522807ba660b37cf39ce164de85e
SHA17f8b4f6fbd1d7529ac47a2b039cd3a02ebbb5809
SHA2564378875c784169bfb8e9c8041bbf98839609cd86ae000fb8875468734c021152
SHA512ce97363e76d2ded6cded730c4c5aa8ce80f54055bc57dd882327427c9f14fd1e186f7e57e9dedb03ef9b0a22fab70a93f045bc4117967902af3e9fcccb1edb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff6b7ccf6dccfef30c7ecb7a0e46030
SHA1a6772a2f10097438fcd86c9c4948f77ced9ec5eb
SHA25616865266c5ac7b5c612556e87f522704213c6560196fdbe551c5d522b9c33199
SHA512082d913ff19b2264185089d12943c1ecfb6420afa58c7629d7124915650c69a70184676803f8bdba982e57ee76e7b0d0e3c80b31974a641de869b51a843cf202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5974e19809440bd8cb9f4c501043ebdd6
SHA1788089ad5b0746bd11dd56aafe49f7d4f8f60f83
SHA256fccc90c6dcc8342e823654f76df6d96e36f1aa3736e96756ab82804991ac627c
SHA51228423f7979c6d1befa6a6502ebb09a17f997ffd059341bfee021d6fb03f548a56902e387f341fe08ad6b0b65991e1d9f75a7d7c7788e558e475c04d70f3397cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50066bf72d7c3859e28897a06f86e05bd
SHA192af588920eb4e24220b7fec239a19579d4e7eea
SHA256e0613ba2c7c3ee9657758325b43600fc4bdd9b06d06fa0e587106ec164726e1a
SHA512b970b84361d3d70714570032b298cb6a6584549ece2fd91d261b6d5dd09ab1ba227db2c174b63573d90dbdbe21aee292269eb1953062a6108c8ebdec27715d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5060d46a0e1ba25a1238060be76c14c25
SHA1eb97f797ee63e6425499948296bc1088616d4c09
SHA256a9608b8d1aac70fe3f72ae44ad9d6de9283d3a6351f20a50995e15e4f29807c1
SHA5126c968575f4396fe1219a22ed8ce0dcd364eb289d12450aba6a113c0eac4cba4425fe785b48bfe45470d58402655df8462d877844270171710bb105bf3d540cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507182ac2cf68059cce451594523d0fcd
SHA10b838b1abdfe7af09dfe763f1c798f0f4ef37916
SHA256c7ec3ebddf63037acfc2649cb20b82f3b73f1b8247aff1cfc3fa89d22b1fd4f2
SHA512f59883c31db77c12705c945e5e966bb0aa73d19a7cfffe9e8029fb74e1a2baba5a2fe4e41d682cb3cfa59fcc8a9ba8d53c9855d6c322125eb3d3e87af50cf449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fa1252701b9ab260269187fce3f95cc
SHA112e411a9b7b0455b3bd56a2f2b5396c737fb1533
SHA256e98242d750095dd2f49184b17731e6b0a6264fdbaedb2e1cb39e0cbe38a90dc9
SHA51279104985cb52f07be92f96fdbc93ef99a1cdab86684ea9db41c2a72ad2d4ee2b4b60efba0af3b8c0f5f4f583a07a2d61afbdf9aa01f81f6ea1c90b452c007df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaed02e3456ad9f7f642965ef852bd55
SHA1a314092d13b29cbadf0f06af0ecace0d83aa0825
SHA256944690c8ab426143ab18d59fe5af3bdc51963fda40b118359e597fb3d8269de4
SHA5125e23279f2bf823403d97d4cd89ff52568d17814ff697b907c9fcbcd1aa30ee78b75d699b584a38e8c5d37198aa529cc28e06aff205c39552ede348adc56c2774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541b9f698993af4975277ad5a4e2988b1
SHA11c9f33d00017c17efee8306504b27dda09ab58fd
SHA256cc4a96ef9a3863151484905e2c0dc8b3a35b049f6fb8a79b778a86988f49571a
SHA5122013923e502c4961ca6b285ce9245817d106531bf56a2965a1a08cc1f151c572b635764885015bbbfb4fc6a3bf4315de3c4f15a87a9beea4a0da16ca54a56606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b6921f9842db753d25151b19b3a3c10
SHA1e008e35ede92510fd995fe0fe0a55a54a3e3ccea
SHA25669cc7243f916fbe6f93875dfeb6743c037e83ad988a852efdc8c009426cf7868
SHA512aebe544ab6191b6ab8b9d1802d363bfc7fc1dccd10c175f2f5ff2a3fe4f25249d53a872a640e3067e130c0e5e8ba80bde7c719d5287e2706d0ae30f3412198f2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a