Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
2960e70cf5c6cc7f44442c86d5c8df11_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2960e70cf5c6cc7f44442c86d5c8df11_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2960e70cf5c6cc7f44442c86d5c8df11_JaffaCakes118.html
-
Size
15KB
-
MD5
2960e70cf5c6cc7f44442c86d5c8df11
-
SHA1
d4c40cdfbcaa6daf920bd316b1ac4ffe333256a2
-
SHA256
85272d90339b44a035c33e827205874f5c537ac1c03d4606c4aff9bdb4ffaaf7
-
SHA512
6717cf93b6b0385bd973c359b665b48e312e1b8c2bad14fd98510eee41d5b7ac63944c2cb7ea0e3035da93406c3f40aa1097f9b12af742b7a0416d99cf201acb
-
SSDEEP
192:SIjkLfnxx08KWcWmbvycGJ77QaXRHsvbbe/BnrLN4hOsBNkwqY:SIAI89JCPQnqBGo
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421409662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a3d62b93ff4377ee063daca01486edc773b3ef810b540735919ba2dbfbb42ba9000000000e8000000002000020000000ff93ea0e6625fa4631456936dc913b85f023ed1a7cb40a95586d80cbcdc75e122000000050c64ace4c07c5c8ad7aac9b1d7aaeb573c3b82b6d1736ae082c63b97575de6a4000000012a0dadd9e9b88cf2703b633a445bcb0d4c4439a7dab0d2c30a5f0128ecd5c0a294bdf347be81ab356ea0d81d71f47ca3d57acd3ec4797a0654272a8fdeb7e0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c3cd7cf5a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EECF391-0DE8-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000844992bb44a9e4bfae30a1d162d01e55c49e10a3df7a07ad8d6ccd4690d5d442000000000e8000000002000020000000d3f76d41928c44e43d3dca01c8b66ad46fd9c164b4127c1e2f069252b6e3cf7c900000001077b4b84ae3ec04827fc4ce56fbec0c2811f876f26c94b42678484e497df293a140d201f30721f296ae0eb0451c239acb6a948782bcb29ff1772cbb6fc1d90a50c04118275dbf482b1afbedea525e37ba53f097bef1f3aba7b147ae72aefe8deb1d745dac6cf83412b2d60ae8ff06d40348e224a1dd69d62236f9d981da5d30598627131737072b52a42ea0c026698d40000000d67743c2ce395750f944e29f926ef5a1b0301076df027b0504acf3a467dbc4d415164bcd88d2f6a26b3ac04fab9e0ed0e77cf7d57c3985728600d872f5c90d26 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2472 2156 iexplore.exe 28 PID 2156 wrote to memory of 2472 2156 iexplore.exe 28 PID 2156 wrote to memory of 2472 2156 iexplore.exe 28 PID 2156 wrote to memory of 2472 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2960e70cf5c6cc7f44442c86d5c8df11_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93d3e589cb7f277d3114205a66915d6
SHA1c4b18ae42bcfac7c746a3b9eba2e7bec34ceba93
SHA25666b40c91e5f9d9a1374cb116848f78d7a0de64a9044bcafbd949fb4935468fa8
SHA512384ce804f8acae905c6219134e73dcdb66b563bfa41cdf9f4df2f8f9d5cda8e7abdea61dd3fc6ad1a62ee5858ec08a9bebdb6aa2221f8001b32569271ff25b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5882bf43a1205da0f73aaa0edfec3310b
SHA1066b8b6b9de6059bc12992425b8bac61965f8298
SHA25600bff62c31778efceebffa01581a55d6b8aedb11186c2c0361b5c89b878d0c75
SHA5125f6f5c20b079626f5e5337d847e4e2642326587aa099a208e9f4a3db8d28b890852bc02a4652ac6a88993708fc5a52a07b60673e975f227a3beabe4c49a38ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242a88f9db2e4c937b5ba23b251c1d47
SHA1f8acad37e75e7785f95820307b5a23e547f1f770
SHA256e03f60e572179832afe8c7ebef929fea7dfee0352bada6c144ab020c7789f5dd
SHA51253809a700003195f49febed1ed266f67bc0911344f219ebe4897dafbc288c0ea28e8a1477e8fe390e10094ae6b83fa6818009da118704a2d40966dc61aed4aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e8a5c846219a5f1d58d4acbbfa240a
SHA1d54fed264b52f58179a675d4659db616e57016f9
SHA2568675476a2df0c49a89145ed3bfff0c1da7a84ec07f8d863559b491d3b446f4b7
SHA512bbda29a41c087ee2084d9c2027861c2bafd0729a870c4bcef77a07b2ce435f813d9b70c06adb8a5511da2f1f5c9cc497c46a225671b92b37fad393ae7d413f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512da4f0e5404964a74dff0a4b76f1cfa
SHA1c535aa4050d6f961e49dd5cd91dc7acf88eb7ca2
SHA256832003118a17b88abe5ac3ce3a30e344de10fe1dae30f96216902802c903bc55
SHA512347e6c42b4cbf5963e71a3d7edc7a15d343828fc0c0d4958c80f20be54a4c4f452184fe907d58273b85e6355440a28a971b8cdde0496059289a2fdfa0af2e00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e10ed62909c3735aae826228de0eedf9
SHA1a0b4e2464da0ef8456db27cc7a126b4d92d9edba
SHA2564934bf6b664b4e5ec7e018fb6b3379621660af020b2de53fa187d9fa590e56cd
SHA512bdf7978eaa26e7a993cca50c9d5ab0823cd60e6c7ec35847f7f132d1b738e57aa6a8a6ca032806ab4b46334e8f582df2c861ece13abe4ddb570c623620799029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd28125a6dd9dfc7359e585d56d14f9e
SHA174ef9d0c4ac625fbfc5ae9514a2ac879512e1855
SHA25626adea0ab460c06c916c6b23991f688d0dc9bdefc691bfad61236e30b884fa0f
SHA512b68cc9c432860248720bfda65469db968167bac7e544e7c579c18da3bf159920e7501f28228df05f87fd138fc768868402759d77e6c79ef35fc0bffe03c05c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56da22742794606d3664d2f5c363d504d
SHA14225f5f156a78cc40024b4ac9c97de5874836427
SHA2561336a34c051398c2cebdbc5a7080f869a8d76d1fc3189e89d283df7a8aefdf1e
SHA5120af218ca905cce93189b68da814e47b50ab605d729cf44cb81cb0caeb04b2616f98069bce4b473c99b79035d3c05bdcdc3c2c65ffeb6b554894c06253f8c8af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1a0e9d98bb6124b4f958093aaf981c9
SHA194beac933e16deaa52460cf9690f1931f8f90166
SHA256b0c24ce714effc3cb5d97b8d42a477376a5f6aecea18ae85bc279b5e77b6f773
SHA51213c108689d7d7a4d2595b1be511e7c9a8953d8205e73ceb77e55187706afd2a3b1079541616378233c9dffbf1b67032558dbb564be5c97934eca450c4c5360eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56102d29232f6eded0d7c5b4d030fda7e
SHA12e46ab539f836d42f27d8fd6119449a0258aa82f
SHA256bd8cd6066317ba9658eae9527c39fc38c04a658c6f0909d39d59391cb4d8a94b
SHA51223c2e4865904ead8980f274683313f8b29120623fb2f3e23e8338f3438bb432a66b6ef5a00852b231be499982268a354f5e23208109a0f3a0b1837ae10d92029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d6282456802aa08947f5bfc90fab12
SHA152564ded400915b678e393edbe732efce0704df9
SHA256602de7e786c19395bd3d4efde79a6835ecadb2612996331e8d9352889cadf5d6
SHA512d837dc8dcd602924deda49ebc0df6287889e1f8190673f52014aed1dc8b4b8b2fef5f1ecc282f5bc414369871639ee4e31eaa450dc2ef5e0a244ef10608e3674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548161aa27a4104a8605d0304d50f43c8
SHA1655ccd3d72278df4d0a323cd98fae699f2c4afbe
SHA2562175f33b78b6a205aae0b6065e931c103cae55f2421c86264bc370276a9b30a6
SHA512efc9e72b5ba0c61d52d0753f7842ab3cf0c2574091030dfe408620bb55ace98d20679a54df8f77d779a427572ddd696a491917448d340d62033143e762b2295a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd0018861a21e3a271dfab7fa7b98a3
SHA1bd8391ac7fa7024d1de633201ed681afeefa9a97
SHA2564bcbe70b7d6d69be05a2e66ae6269446a63d45122aafc393513fd4ecf23823b3
SHA5125d7bfa51428164c369d98a3d5c337588d3c1c6418dd2683c3bd483406adb8e14dc07a62a63c52f2ec14e08edaa273b8abc0c6ecb1b83d75c0304c5e6a613e0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319ee6ad72c32aa30893711e932d7e3b
SHA1b78552cbf96f00e641d8842aa77fc2a2fd235e4a
SHA256819e72899874b169780cca39331f6a4bd698009adcf9a040fab010b9f6358ccb
SHA512f287bff6913f27427b3d2951e6a26472de79243f404dd335de97312cbf234b2e37758a86e3d97c5086bb9f832c1cc8422489765d4dfe0fcdff5b9f458e450a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c8d8ce6f6ee7303424138b0a53b2506
SHA1830046646ca38867103e2988c65e8eda9f4a7705
SHA256bd98d8d4e066b1cbc43125061423b7d2b6765243c6005ad7ab9e98205b1d3b23
SHA5126337a3252d6f2d9f4aa6b46ee759f9ee880190f96974bf4402c541e17054979ee1901e1e7948120c3099e478d1e29b727e26917b98c440534e2f09167b469f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c66ccfb2012498d965892255ab55914
SHA13e25480ccce61714fcf657794398e6aef9f3e72d
SHA256089460b6f03b358cb6dd46af1c1b5239e14b9612655e6f53df5125a2caaee2dd
SHA5122915700486c8767a3c27b52d127f1d49153e33e8ea34f9daa7e6f565c219dbe8e9e3960fae3d8bcbc3258bf58446add7a40e285159b366c2d8424aba82f14569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5524202cb45976f48c3df38d42fac7ad3
SHA113b0571f0dfbc42e6f1bb68a83063c6ce760340e
SHA256796868f40bfb62c626d87bb5318f1a7b777f168c58f952a34a0a929baf2904a9
SHA51230646161316e2906b8f71eb6e9618fd6beb746c458586561a075d0af9e6fc690e46dab518f882470980e419ba15a75eafc2d1f352b9e080c3111b96dfd4994dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e1b122b592239a325c43557ba9afd0
SHA194d8866d8169c7d24d45119a25e12f2b4b18ca46
SHA256cb770284a6b3d6a8f6742183d83734b8305f791e14fe8fa70209da278336053b
SHA512a19557962d1cf0bd3106b79739159235f95169f7a7aae41cc557624a8786c6ab3a608f1ab87b476ffa16753bd2ac7072214b5596d9833d2809b24004330ca49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567312c464a7f82e41ab3b6687e15b41b
SHA164309292d2754ec865e72f97a19e62a1d2c3413a
SHA256a73081f7ba548810e6dcf266467d182baf7737394a82af4ce0182b458fcbb630
SHA51294c093d7e89b7d071d4a2a9fdf5c21af584434f3e38a78582f5ee321dac740113b6e94b6650c169ede78abfac22904f2f851380a9ba2154aa331ca83c07cc719
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a