Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
34805ef6069e05910a0d3c2d22c56353_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34805ef6069e05910a0d3c2d22c56353_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
34805ef6069e05910a0d3c2d22c56353_JaffaCakes118.html
-
Size
67KB
-
MD5
34805ef6069e05910a0d3c2d22c56353
-
SHA1
3bef4a61f071a62edf4365033bc91c71e0ecfea9
-
SHA256
1c2e37526960346955477f0081a975d04dce77ed154e1b1661cb1e74bbb5354a
-
SHA512
8d54dcbfd8b97d22b37bcfecb4e233f8d8ccf8557efab4109a8eddb935827601219b6800b0e31433634effaa4cdbd887fd5f0a2f36b3ab3838c7702ed863236b
-
SSDEEP
768:Ji2MgcMiR3sI2PDDnX0g6+W6eYoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:J93WTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901bd1bc9ba3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8035D51-0F8E-11EF-AB07-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421591060" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000007b84739655424c36a7d73f25ed421f677c2490cbf93da7f523d090dcff3e5923000000000e8000000002000020000000d40eb2b8c341cd04a49673aeb5f6f549b123bdbb86d61f64e58e99291c96bc5120000000bc45d9626912ebf2b1ef950bbbccf96ac2d7bde163f98f6a1b5bc3a3c68238d4400000009d97d7185330d5bd2e12251e060232ee426d39f146cb03fa5de20f8f5c1318cf6e37e65c0a8524dffbcd6ebc42ee68eb93b511611bf195e59d9e15d6dcbc001a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34805ef6069e05910a0d3c2d22c56353_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fbacfed117098e47086b359b8835bb9
SHA1d96245f2dbf844d3cc40da117181e2cb29b6daab
SHA256d116cf26858187f133e355656d9e2fcb1f36df485910757d86235a708e4f3b5b
SHA512c068c011edc198d7a5629deff3003510c9d093b7f511062482dbc9f2177bc67801a57ff31e86b24ba8a67c0a2b15d0a2285697df361a3e27a86d8d2b1440713f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6a4d1f9633cd1e77c6fa701110f31cd
SHA1bacde154d306c65f1f13ca10e138fbc6a655999a
SHA256220e3dd0d417450a13e2a190ddf3f8efbe59775db0766870bcdbd95567aee489
SHA512fa66e4a9d10e0c5cedcfc6722ad5ae73d3661a056a0e303b91e163729eb2ca958be56c3e0bf13825214233cbfeedea6ace4c067c0e761f070302f45d2c5b4473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d4085843829359c6be5c3c6f3d8321a
SHA1dd0d3ab55c587a0ea84d5e48d0f0b939d72a2533
SHA256565c5faf84d404db6cefc5765ba873b784b14cb3c13cafc7dca0534c73e48d05
SHA5124e2fa6d42fdf40bd2cec0f8f1f536737e792b942e6ba7fef9972b685f034b55a441d73481c849febb3bccd2ec7c652fcfb8ef0f16fb5901594b561372306e52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6bece1c6f4802633d48e7506e6aabed
SHA150b5daba55a7137cb25d3da960603b3f3746fcc4
SHA2566cb57c657e76e26e4809b138d691d21b0a6c11ea88061b1228dead6fde326b9e
SHA51294bf15dd8d9cde5721ff108c8f6d959d8ddb2a54bfb85300249a679c412876cc0941964b0cbe05ba8451019ea95ac9665231abc4845aee56767df3bd6b75c99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531d48edcc273455ce900f2430e78624a
SHA16b2b699f96d3f8ca94909b7794f469891ffc0b49
SHA2566513612f77862ff1addaeff2378c1a65e2d2d256d2c0a7ef45baf2f11367ece9
SHA51293b4d12d7e97833e2bc214f55da8ab59d57231ac7f0bd7c4f7e75dd144c66e764161df2614d9bdfb7c9d47dcce8c06555c5acd65211346b2d2d9bf8a942ef573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53fe8dc0f9efc965e2eb271f7e8872d22
SHA1d4411db0c537c0e588157ca90139ef2f6cb695af
SHA256a9959cbb63c4a415db845fff03c95815ca8a3e9c060a557153ef4b16b6bab789
SHA512687106588a9eb2ba443a233bde8a9f94a32750a8786f2220e142301774590e09c5b137fc006e1f7047996164e0d1c53f839495183ef11c815cc653dbfaea31c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528b5d17406f58c5e7ed541187bcf4ef7
SHA1cb7f96e9c91b5f75d6a8440b3c085cd74a8e61f7
SHA256662b6b7e291825c97f0edb12e78a4eae0d520b8b0ea2079c2b9b9d8239602982
SHA5123aa64211cfb6d64f4cea78dcbe254f0c55025d09b290d5249098ff1f20679d3c9f193b2dac6501ece24a4f328675c5a7db35e05f2bc36846a2f64501e329e860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b647a4eb129d5df52d4b52fc95c63f31
SHA1118425c7ac2a9afc703d5741448670f9b615b385
SHA25679c2f330e1d291fae538c1470205a1b732b153c4536faa177ad9bd0c40e0f72f
SHA51211574f312045630af659de34ef114fe877b0dd748b0ae3ed7aae7bf910fe2c4b3360de0cda5be0a29c08f4950a7361d0f890274f8e96377d2c64e5669585aa05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD576e97e1dc498cf2cd01c75182be27113
SHA153d9f51e6fc79770be99605ca463b327358b0c3d
SHA256a08a021de75f7e733e38f0d72a67a24cce31dd04d133d2c4da2c099aeac9d0cf
SHA5128217a41a1de88e37b3a6b7e24649a5e8148bd992c7e162c11fa42273fd7b13efae868ea2b33c0d9e57425e1e239cd0a3a9cc14894553ad09c7ba4e952e693542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6888a313c2fc4a69696bd586e924436
SHA1f4420c16273b0f8b4cff4d792bb82742eece70c1
SHA256a1e95c567ef9555b61a5d03537d11a6d702cd950da8e3f89c0702e9c07d728db
SHA5124cccf0a0ac6f67878c3e4fa33156186689d60b36f287ed6513f8c99084326cbe3495b33cb3ed778e6a4e70771dd2d71fa179256a0a5350c418b286d222578fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b3bbd090eefddcb08a0acd69dfc5e8d5
SHA1bbbafa477916ff37f3d97b7fefc003f47d16b1f4
SHA25637e26bb1c509ebca2f81619e7d97f076495850c4cb3bb552a97638d9f121a4fc
SHA5123fe26c786b293c5af61c4b55dc77a3190c3231eeb61b6ea84f2d048130da7207e89dac495711d1775d0785c32ced5f8160153ebc71b3cb725682d4b84f9fafdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50976763e6aad06f281ee56692da3b0ae
SHA1e5820b5ce24991ea3db26741416375c3ca9cabdb
SHA256cd72d6329be52a42a61a3a27ce64bfaa59fccf1dea7194c04d926b056d8a7556
SHA5122e4c327eb9d255241e7b6f71f121ea6ef1a6edd92ea48186b866d7b94960f81bd416135c9dc2cc7cfe08c6cfe2d8c06792ecda76c75401d9ec093cfb6f521f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e04a55109333a11d0bb0d3996fa6e24
SHA10e73e8a48c3f03cc902155fb6b2b1b936ecba4c0
SHA256143235bf0a0f113f3187dfe592d059f1dc3ce6a1b271abfa6fa41664bec0fd11
SHA5128ee7fe39eaffaf15e7158cee899c8afe7c07169c02a91b3f52b70bd33ef68b7c00fc513e4391ad54d7d5c1a2f1d6062857b69fcdda5d71e10ed45a4f895f8b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0f3bfe7dc29ffbe835c60e4f3a91aac
SHA15e89b0b9d2925ca9ee4c8073b1cf6fdb26c5c800
SHA2566e59f0f88365cc8c2d3a366367ab9d9961b65972f8e9bb41c112599be557703d
SHA512baca2a4deb2ab2a5d5ae597a32b8111135e75534d6e72e1bf6a4e1897132f6eecc5982bf6f52dbb68ab1739ae90d586cc66e9ab9da7d3bae31fde20e3ed9e408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a33ff681d90fefafb941f51296dba8bf
SHA1f6225c7f5501611b36e776af33dcb2bdce26b9ec
SHA2561cff5ae2183ec8d71a64ac5a26a86580a75ed7b7f55327aa8fc336bff057b0e6
SHA512a15f3ec290e91f4beab23d3091cb0dafdf26269213496d56b488224d0fd4f29c0985211784362ede4e219d48bb1450591d9d76901403e344a9a3d1c6b5e408d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e46715b705c365793308bdae55d54a6
SHA1e886f94d8d1c6e1e195d3a238b5ed1da72ebf390
SHA256f229a5a29952867d24427603251b38cc0361fc04e69f9fce09308bd39248838e
SHA512408ad35931030cb8f4057be5c7743e526bd896c4000eaa51d554ea1fef8c8f830c12d3c5977d8bede02c7b8449faeba164ef373f4954d6e52f136df539311880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c9b05431fb4b4e7f641846953d76b029
SHA148d4ae9fcff543143f859740e8a085617a372466
SHA25621e2f55fa02a3a2498847e4b7371e5dbf8cc1b92cfdfeb63309ad89283452305
SHA51251dae6409bba9a15dfa967084d2b06d924eb0aa7fa833297d05581fde0523bef76ff33a40b3d5960892370c3ee84d2bb769c16a3c1959abcbb8a39e2bdc96442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52040ed9129ef6d93a55c688cfc279ed8
SHA1db0268881e8c2975bed4f823f4758bb0b73921d3
SHA256d11439daf42b1db2cb4839c1c7c0608b7599c074b1826f27722f0f2a58ec8786
SHA512d6a0d1bc741b8ce06bdcf2a7f91487279edba0e9534008a2c45f126f27a882b39ea49464ab46786d29bb7373c2e0bfe6c00955643f5cea4a07917eb675fd1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f65e171000af729cb2e89afdd0a1090
SHA1bde18a6eee7b52a888ff43023aa4c2e04fc4ecd4
SHA256e64c77ea7f3fac59f432ff5f7583d060eb3b850108d538c823a2c6d79a101cc4
SHA512821240e95df9dcff83e5506918931277dace658a2bfe04287b5ed5a5bb6323ed8add2ab1e9c2e215dd9f74c4ddf2a05a99568c9ec0b28ce5297776f5ed74b0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8d934cd4f271f6f06d410c1fd8f2d13
SHA18899f08176512509bbeb5e3416c8e5f7855c5955
SHA2566b262681d1c29ef44763eafa14e53028d0e8cc2eb9348deec99efc7a817d3e02
SHA51253ab10f69ffcb1fd6ff93b8f62e28bfd5e5c523450e3c42f449e55a02edef8899759670e82f5625b5df925995b43755c84fd05bd22dbf53440c8da1cd9737060
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a