Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
2f5a21848191e46f8c8686e8db0d0227_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f5a21848191e46f8c8686e8db0d0227_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2f5a21848191e46f8c8686e8db0d0227_JaffaCakes118.html
-
Size
15KB
-
MD5
2f5a21848191e46f8c8686e8db0d0227
-
SHA1
52ddba4f7ead8513e2403ab8454c470d63e3d22e
-
SHA256
1253ace13ac47558758edfbe4af9c1436993de67c55a5d7390229d2b32ce218c
-
SHA512
b15d2ea6da4356bd82f44d46c1c3ff4cf0809f018a4fb882c55cdd7810bb1be57ae8e417cf8d6216694889736d81fe103da6b22ee98639518ed451c22027c1c9
-
SSDEEP
384:CyiJ++ol5ZHZyAiB1/0OMJ2SHTHcvOt4A5d7:Cyis+o3NQAiB1sOM9HT8mt4ud7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000001dcd44a838035397ba3c8603705ae7784e32d73977400a759ecfcbd75727386e000000000e80000000020000200000003b1cc499fc8a1896ad68240bb36aa9df78c86b1c6f4062f95e28ce536ea6bac4200000003393287fa2652e488465efd656d85b4ee48611e41a59cb09c41935962fc706f84000000025d34d4491513c402701fb92cf1894928d245fa2de674e15c40f96d722d65e3ba2c7c806e9d91be342fd5c32dc61a0648a0ea94b3ed221b5ad00e57e62d4821c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421509728" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000048680658fb4362cd671f69482eb0c2da3cada45c4ae3a8ec8c90e329f98761f9000000000e8000000002000020000000af8d3943eebfd499734240447c0f583fa8616a6537c9faf4660a5889edc6fead90000000a0ce39fa687a0918ad94061f2fe98744f3a266704f3d1c5f42587a7f2907b4d94df84aed292d7ee19d50e5743849f56afc47fb70ff96ff48029236eafd695125554ce2492f81b48a713055dc368b30494ea49361f839ae52f8adbe7748838558b04e936d959f78db7bb06af60ed7846102424feebbae6b7e7a3127cc60f0f12d4e3b93589213b01560f740b7c939744a40000000b7e80990a9711520ea2d0168a625cfba3390aa87be7ed5a8d5c7c7ef9ef19b2e86372c7b36355aaeff4ef36367bdec289cc5fde607880fa08e127065730223d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8ADF04C1-0ED1-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c81b65dea2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1804 2060 iexplore.exe 28 PID 2060 wrote to memory of 1804 2060 iexplore.exe 28 PID 2060 wrote to memory of 1804 2060 iexplore.exe 28 PID 2060 wrote to memory of 1804 2060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f5a21848191e46f8c8686e8db0d0227_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae5179e40081130492534e2993600eac
SHA18842ce88188594adddec4f957f5809db8963c46d
SHA2565b757603bd28a6828ec4cee39a3fbe21297140c8a4915f7d5968f8afc18c6183
SHA512afb74412c07af2c847e84cc624fe9734211f2ca020afa8cdf937c6ffffdc7292cba52b449a9aedba9367b7aecba3cd520af7809f47542583b14439d59e29f25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f0faa2010068f990be7a6bb7a298c3
SHA13b3d051fdceeb76398d0e23e87ca4d60cdb86136
SHA2567c66fc55d6665626693aaf13b7775312ef4599160679884d26dc25ecfa662cf7
SHA5122a7c69e90571abb03096628657f0e92b9f95f3b79ce1767ba423f6235ee79ce37ce8424d58f0e895b3929be6a705952b959f7dc2988bbaa829a4f4df24e928b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbfa909288abdf1c88cb395665441f7b
SHA14cda76932752e6af586830409d66b8d1cdacf9a9
SHA256536f2c171772a9b90de83b687c5bb80b02fe282e4e32b896a5845edd0dc40e9c
SHA51290a40af80faa94248fb3dc51525bfd4394be42b5426b4fd85688ce94a2dd000e319be2d0755f60e781024cf0098208da03ba7a5af521387d35d897685a0f02cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b267575b37e6fc445118b3c932c3bb9
SHA1bd5274be03f44e9cfc1afac3ecf308adc3379b09
SHA2566f21f26f4c2d2a2b5fc3b397b56633d8fd01cecade9ac671e5a6c1ac032e0878
SHA5124fbd523a6053c1f086ead2d477f3f400227691810e01f9b67776de4368ff4cf69aba9dd85bad7268d40377bf1f98494f74ace57b5c522fe4b10bef9db8cedbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e1d92053798da9dbaef4cc4b257c9a
SHA154d1ab4368e71a9c24bdb425f634f55e0dd8c92b
SHA256329908dc76adb00c6437af5ff4c03fa71be534b3327a66c20dbf7c827101a438
SHA512568ec49a9e104b44f4a52a4facebda54687ca8237097651dc2f3dbe8c66c36bd7661d7fe2d3bcb3cda1d9308e0a0e29749afc50b5da03e604c4047c19e8c93b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5122c791c0d56b021b9791540a711ad89
SHA12a27aafcb0be6687e738b78f627654e8752a4026
SHA2562bf7aeda3b6ab0ff973412a26c9e810d2ff13da22412b2417036c9dde07693df
SHA512490dafeafc211a0532541dc479206162aec352afcd4c4786b8fac2a35d4a56431db7cafad9f749c0d6ec68ab632624a27e62bee153e44f3822e0c63c34811f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf746d357b28b15bb3a85e74c220ea4
SHA1ea3f09ca25e1a99237e9f00f545add07d2166cf0
SHA256d7b5ef75abfc8477fd609a51205951cda6ec83a4d8c9951be652042c915c3c20
SHA512c8c392112b55a063e48eb4015e76205006e28610d28e5ee59d9a3b1ba9976f9d0a076a493ad07f17c49295162180a751deb12a0ef8c9692c6daa8340a9e85af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bab752ec4fa40cb08f1c09e873e66e9
SHA108b1097feb9824949b35d0708daa5cdb480a463c
SHA2567d10436fc36a417d43d5c14db20daa19b962af38b9ae1bec2dbe84640af06767
SHA512c27d2e73967f20a8e62b58ece85f27e927de90b3cfa91e0c092fcddb5350280a32fa298c7e1c2fc15a2621e4bcd88772fe7714c7dc098d9cd99000101d4e3b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e2c0c85ca83ec1dcb7e8da7683d1e45
SHA1a6d077f8e24991ab08a9f568678e01cf8a9aa0af
SHA25656e50786fdec599bc22d11a4dae7b06129e3390c089e32e3a38e1032aa502fdf
SHA512bf132f2d950967d94cd1a38642d25a1130628eb86ca567806b888df7ea62b281bc540601b16b25a901f4b56f5fadcd501782d2a4e296f1687caf0667ff7a08a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1e7872a2ef6a07127d6a48fedfd832c
SHA1ab1b27f43750ff41432e49c9369de460893f499c
SHA2569aa869db97d86e4e8707606fc8b6f58093b5efc39908e0bcacfb9b04bacb677b
SHA5128666fa0a1bb8ee611f726b9b0d9c63a9f1584b943fe534e036e82dce66864b548629196ec5a38e84ab91124bb3d9b73a89c4d447182be260278dc90514852d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5591993781a413b5accf871b7dea6f8c5
SHA1f497b775cb375a34cec7a432ecfc2550ec0f6e8c
SHA256f683f0ffca625752e0c09995ee298a03a40489dbb4ea491b745bc817d528a0a5
SHA512ca129b45989bc744a9d6d82583d7c9e5da8ccc58238db26d12f5280e2b243128754dee80e2836089fc98e69f91568450ae883ce33ec3338091199d2bea71d006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db7ecfe3d258ecb3eef9a604ca05bf2
SHA1821a06635248965c0687648cc38c776267f4e7ab
SHA25658ce9700e227b105130c930b3b5ec0de67c25b896f34a5fb5e2cf9e120082f6b
SHA51272c81e1327fb196b9ea5bc3bcc462a19fdfef55ffb3f05a2dc21523dc0e77ac0dfd3cfee6d5cb2b82576373bfb63f8c9a9a7c71838dd6e23ebb5df431e986896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5990af87c1f55a34da6439122fb489b5f
SHA13a035023e63b1370b810a55b3e3f5465dae01900
SHA256a36de33ca7694ee92610c48c7f334d1a469d6853b4440adc394b217e4d2f60d3
SHA512f4debafa7288ad0bffdfe7f36d30e81ad447183da80b47e5a577ae7a248f22b1663eaca3287085efd5b578323133d817e3b5f91d9d7de79dbf4188eeb2926ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555a24b1380befef1f5fad93076241a9e
SHA14b128b26eb9c30760aa1fc37818f84fe4adde4e4
SHA256e6d1616943ac40e54814be1423a3bb5bb28d6137d7ce4076a6d6508c5f415094
SHA51220f5084f55ff2a56b409dd3214510f411d2a80de6531661eee9db464558b3affa57253ecb02afeb9dd7bfaa724bc718be22eda956b5754ebe3fa0f7092780e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eb7202bd99a442c505257c221de5e0d
SHA1d51f6e05b32e369d5855fc0a5d6f71ebd6bff3d7
SHA2561679f2ef6b1ed4fa7dc86a6f5981a87ba0632ef96c6a114a76fd481fe03cd8a9
SHA512cf4cb5227a74e67bda824f4db0a48f13b37fc6b39baac7e5f9732c1ec47dbcc6fb64ff31e4a353c4e5341c3bf57a54effbb22f01da5905366683fd903fb17fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542af2388c0a77f4820985ba579769757
SHA16043b384cc4782cd08b94ce60d5d5d4166cd0778
SHA256c6c04a84451b1ea9c959ef7456dbbaee6ed689157b0d3143a37b130fdc5641a5
SHA512151934d756bfeb442e391f579f469e25b44639d32d834cedd6b3383c7e6263d677cafe951aebd42e16adf49c8159196171beabbd2068e7ec2e3ad6f88313c185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc76bf4b815263210112d3d8f0a1d9aa
SHA15b656f73e576869fa46c341394662d94ec084629
SHA2567faab24a7a6a33238060ed229781313b7993ebb105c89dcfdb91c4c0781a581d
SHA512e7a0323a2560b9e63f60a886881de39da56e0ac12702cf8a3dd88b816e1d06ed2b7397be5633d27fe522151fc9173e47534ddcd80ab46e503e64573714da9340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e355891c5823cb2bb0d9d21a2769dc11
SHA1a2747d064da99c5840f4384c62182dd1da8b23a7
SHA256df1330f934ee56f82820c36460b22cdb7e2f24d2f0becf2e32f9a9d829200647
SHA5123a0e64686231dcef4baed75d37406d0202a3df5a2c30b20464029ccd900d9011f7d1096ab151a1acb3cf514fee926da3dbd2c47828c3a8b97597f9f82c409d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a08933232199fa491f4da4e6b672d0
SHA1b7fbdca93c8aa26690f2e29aa18a3f638de7d4f0
SHA256e2dee980830ad6165a13e9d93fd7088a57acae279db5f8b17a53e1a87e0796b1
SHA5126a4cf4a8daf0d3712aabd265878a52c05a78c993bcbc031d4eccc64efd3468387727bdb00e265e25cabae667dedd65f911adbb21f6d6b0aa302410e42fd1cad9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a