Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
306f498242014ca0129819612576529f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
306f498242014ca0129819612576529f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
306f498242014ca0129819612576529f_JaffaCakes118.html
-
Size
2KB
-
MD5
306f498242014ca0129819612576529f
-
SHA1
200769f8b33589cb0cf0fc13f6f795677fc35fee
-
SHA256
8507984cbb4338c1a8f448bab18a8187c91c60a81ad4345d9886364027ac6791
-
SHA512
e44091c09fcea7aa10549d4d26196556cef67734a910dc01dbb8133cb6a5bc8811094ba80faed3513cb8d74d4b20d9bf9f05dc55204f0430410a172c6fe2b425
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b010f36f07a3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000070a439adf5894c620617f292d9fbd7e27853f4263271aac94c741d2a7f7b3184000000000e800000000200002000000074bed1d0169e3528263a9e81e843a358ec775a7d52c3a6f54756981a92625564200000002c435ab80e989093a14eee1d30fcfa269378fad2c8fff3ff7ade20f1c291aa7c4000000003a932cbc60020d3dc50a6f379c7f7549ebbcbec3872aca9fda777cfbfff2364ff1353820dc16781bc8e663b583d54cbd626a2fe5ba6b2136f9ef071a432bc07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421527366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B2B9BD1-0EFA-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2564 3048 iexplore.exe 28 PID 3048 wrote to memory of 2564 3048 iexplore.exe 28 PID 3048 wrote to memory of 2564 3048 iexplore.exe 28 PID 3048 wrote to memory of 2564 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\306f498242014ca0129819612576529f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556715016b655b565da8041ac4db7deed
SHA1befefc7af21017123154d79fba47977c88017a62
SHA256b612ad1045aab873435fd0022d22e7d69519b589d1215c448aeffad2af7b09df
SHA512651f24146db729a8521080b54860823d58742e04b6e051bf0016e06d011d85dc3646ea200f94cf5ef0bf78abdc58c6284a03b4b5a74db2efaa4681d47918f24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b7f53b927f9b1a81c332930f381abb5
SHA170e2ec86a8f69ef40fda847b2c7035c838abc780
SHA2563ed1eeca4af11fa171a78105166555433d9c2af68dadfb50dc208196ebbd7b0c
SHA512fdcc933424d52fa6c4b4a5710b2ec8d858f3cfc3d7c189a1d4853a690aba0c1628d67748df01b6c68b6951e1febe51003e49ce591c614b2cd056eedb815667c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54391018f3086d7c25bd2cdf206fd3ce6
SHA194d7d20c26d21553c025a6dddf2a28bd9fa1d230
SHA256f4c423195b075f8de11b5e25db7d4a85574f367f747d2eeb9c28b1a15256999f
SHA512643e795d1fccfec00bfa3ad3e8872a9d8665489ea4fbaada9e1d82554b70b1c1767299d5d22a13da51b2deedbe36a994e2a7fb88200b43f82268fe68da7d397a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e79126401087d9054e590f11a664fb08
SHA1a7615de9beb4a4e6fb45e173b5a7d63f558facb9
SHA2563032ed1f52fa5fcb162beb0c848b6868c337ca4272b50d356b92e8f5325396f6
SHA5121e9a13be5202da7fd9c2078410e699256561e7994fa8401094df150556532f4782a2276684bcd7eb16c1ed5825856cc31e83f66a25ef78c157884e21e00be044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5669246917c8da33c9efb15b51d0e3801
SHA14d951dbd3217e83417f7b793953af574ad73f1dc
SHA256d5f865ee2afa025282cd175a337ccca5afd0ac300c4cffd29f63f8dbedbe4fc3
SHA5129fbe3653cfcdd05112a0b1196ef82cd9cab5bb25b76263310728a022a9dcbae99e2c84e7974d5fcd8106fd26e9e47a99d5d2ed00def9a15909006238f98f4d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3364eb16625ef02b2f395b8a840f85
SHA1162aabc1ec613f3698e973a7469fc3dfbbd31a26
SHA25639690a393c563f516d0a310e3c066891aa72a01b0a1010c740605b51c2b15375
SHA512c392757a848035c286d49ebca931f048ac9dd8de6a9f8813bf5c6a2f92d16e56a6382c4d2d0ea598fd9fb8479eb635a42f6f8a3e4ed4e19c7f82da9af5057d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcf6793a2ad72ef9bfd7fcc08913a80a
SHA1480aefdb5166dfc11623877f7f21bfe269c433d4
SHA256abb1ddcdc2390dd70b5855aa6f94ad4b19de3130540e6a28cab2ca1e50a53886
SHA512567bc73d670ec4526b1275fbfc0e26944e294b15be812d6acf6272791b1ff17406776016ad07c593996c3346711fcd1f11aae035fd35e5f1eecd4e23b9270348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d2a4799c00ddbd80d3bf6007361b75
SHA1deff57490bb7b83da28eb372cb52eaf2a0698eaa
SHA256af2bcd367583f1e1df86cfbb21717cf9b30881d77749a56630ecf335c69899ae
SHA5127f0feba48c56293a89ec24d745c7239839ab23eb42adccf3728f236376d998aedd69f65753be27c37972188255b48d3037eef63101f3ff640cf47aedbc72a2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2b3b41d36eb7f6670998afec7eb659
SHA1bab86265917a405a3e5d91f828990cdf107868a6
SHA2562020eb70f625af3ba6eb21a97fc5ee958119c43fff0b13f79c677aa78475e2ce
SHA5129b23e71af600b93e50efdc00a4fe1f4dac27b3aece8bbf3ad41bc708ed455c22e5265db4c0996a7072c8ed94e3c52de2051c3a6f31259eedc96c82f111970e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787a319e018119931fcf94787fac729d
SHA126988ff293fe3c70d182c83045e229ffa80452a9
SHA25651bbd34b0f25353c23c704808410778fa8338aeb9798bba9b6b09f71ae2652de
SHA51286b4e56563fe3748b5efc4d4b3f384d50053a4d0231af8de4529b3e769ab8f85aaba961581cb2d8aab0d9f8bd972c7e032ece8a9b2ed26de83b911c6accffc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5938bc2bbb6842e54ad39cd8fccd2624f
SHA163dd2bd6374b9651ff4ba14d7faf70ed35c707d8
SHA256bdeac9b2637f566653a3df6aaf34ef98a6dff09536470ad6754bc7a9c9d28795
SHA5120f52bc5cfbb0a831734188587baf8f39f6b0e8afc2ff8a199e91a410f5538ac1c47b3e31bd129d2fcf16b63212802969baf7afe512c0a29cfc6c09b6a28d0457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46754c45beee93caa73988b193337c7
SHA174df6609971f7000f0a29a99f40238dbd2ce592c
SHA256c6e721b721bfc1e057948ab4fb6e4fad391c4afc96404a9f56aae120271c73ce
SHA51250eb34acc5c28df5a39c2387c17eab68cf2b488fa70ec95cebdd92d2191e9d3ed4a9c81be1d2ca9bad26e820ffd374dd09bf517ce694268dc2f25091a948dd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506d02ad3a09da817ee7f4fc4b8920d6f
SHA192809e98c4db09525383d92d5e655e8844513c75
SHA256f4618beb1d9f250766c3c5a342fdea3d16bebce136986d80ed4a6692273fb4ea
SHA5126face6096536f0290a084cda982792ae5d05942daf49518e2eacbacb0a634f8f9991e486b77c6685bc4d69acfa1549977b3b0a73018588a15226f7fb571fe982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecd0cdcf6500895aba4a1f131eb9e14
SHA152ab9c1722fa5f7ba31b8841b85be035a41c4d25
SHA25680beb0fcbae598210bba393ffbb091f8e947bcf1e9dfde07b69fe41b501021ed
SHA512b7076d117a1db8402e0bddab7ceb48c697d53d86aa8da76ce97c3d88cd2bad73e590dbd88268d31629a10074a0e1541822a4571d493c6c6114a93cc43532d1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0dae0933e8ba0fbed8642b76bba08c
SHA1f7fbfe5edab8e891ee49ab58543ac6903a108b68
SHA25602d000e130593610118cf6cec377eb0fe00c1b0e8af21138807aabac112b465d
SHA5121c9c923b6f3a8959237e242ad4c301a5ea5523e5bfedfb41b0b8861f5b74f37c7126c21ca15e4376bcfbbe8cd24b9ceaf5433c9ee68aa4a8766a17debf7ada66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5421ac0a8692f53d21488ad37e9da7025
SHA10a880c4e348712166951d990b8fdc615d2303d1d
SHA256f30eea236aaad462236af1b064d72c4bd9a964e87b07986f271ad7c5f5d76ba9
SHA512a3f51c7bd319708da3d783bd5da74c51fda379e0dd045f00018e45aa0e438d5b85e224525f7612894bfe310a8a44e3b6d453020dff6d2583e086d53b25be48f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba09f0a3477c85856ba7a3493f214ad2
SHA11b20279f7e09c718d5086aec37abdd80095253f1
SHA256d1ca4d7854f8dca7bb141bbd6ebc6c9035e3c7a4fc8abbf0fc8123f6b4947999
SHA5124e301fb13f9582c98cb5c23633f4257e82db19bb137772bed276a0d5b9331700109d1782992631e70c5010da6aaf9aa9455c94cfec8e79bf008bfabb74d721bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6549b612ede7e0679588a4ea87bfded
SHA11164b4e153fd43fd1ad1e04a0aa527a1680b9b17
SHA25646ecab1ab9cfe0731758fa453de0676a352ae05181495868163a89cb643268c4
SHA512a680608e72bdc15c5c207ff9a955bb7d2d63488bd8a2a6364501488630ee984aba2c8f65d9c79533356202609049a6b72913ec5bad34dabc8f63799767a55112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e223cffcf3f71edd4f6673a49a15b15
SHA118d7d8682a939d1ec621ec5cf2a6cf36afd25ba3
SHA2561c0e9172dbcabb6fc63cb1fb627868cfccfff4ae3b7ab12ba7606f77724bf995
SHA512c45c387a398dd6bfdb793b05e6c8858e9f89ed19df202d6d7e75392bdf36d2734385d98adf7ea4a6ccc5b3a152add69a39cd499a44476c72b2540d208b0b7d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531dfc75060b23134e792189df488ba9a
SHA1b270bdb4e6f2f292f5ce0b5ca86783b22eb30def
SHA256eb977eeae657acd254a9bce89ecbff7b1b08d3e15a259612d14d622177d80bec
SHA51245105a502ecfc0a5300b9fac49827e86e64c30cce1871a22d1f180e7b1858d0cc33f400d4d1861b6a6157da33e6f6bfc6fa17aae16f88cb080639b83f9b81baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577eff5071587c4db9a4d0c7d51fd4b08
SHA1f593847fac1bf330cf8b49085dfdf1d9c1e203c3
SHA256dde32ba4ccea1902488dd50a6aa132f0986db55595076cb13950dc498b43bc0f
SHA51212b8cf3225eb83b391e7c15301553a5b666b4c87a2a53ea875b0d2d3bbf66ebf794f58bdaf317c53a7fb8f7c1dc943b652607a3769e6fc302f8d9dc553d120de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a