Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
41771a22902550c0f40389ed106ef7d5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41771a22902550c0f40389ed106ef7d5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
41771a22902550c0f40389ed106ef7d5_JaffaCakes118.html
-
Size
25KB
-
MD5
41771a22902550c0f40389ed106ef7d5
-
SHA1
9cf2cc352c6bb8e8107cfe1be4fa18946b857603
-
SHA256
0f2e5bff74af5025b7c20d4978239160372cd240dfc371386867a8df3c725138
-
SHA512
8b4f38fdb17dd6e6ac17631e6e8620f2cf7a9433910852203def6d5fe3266713ea2d8ffc47baf315b149e7381e216d71fbd9e4737c8d6dc7e69cd34ee0e8356f
-
SSDEEP
384:eA1XERvFcBxAflTsE56KLCayYCskOAliJPVtoInF/2DkJSsoAnuVBg/:eA1XERvFcHW48neVskhSI4FogIBg/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000028ec5b38eeac77dfe0c28ffc361f021ef21e7b344b84887590e8ed40b22d62c7000000000e80000000020000200000004a228a107aebc4f0aa17b44bc22375660b6e0dfeb942d02dde691806cee1439e2000000005bca22cab54a156a5caaea37be7758ca835d6e50177d6665df46b04947c89254000000053b1e165af4ac8d19a75a853044ebb1cb63cf682893d13cf076b63788271a760e04781b0cd9429202a347d42c83a9ac04cd4f235b1a2251c0f0e7d698138b76e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421850990" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409217f0f8a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AEA0891-11EC-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 3048 wrote to memory of 3016 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41771a22902550c0f40389ed106ef7d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec3adeab882726d19b71657967c475e
SHA1e7ed5588791b6e839ad3f346243e2c86da67c4e6
SHA2564227a85191a4c6b995c83570e634a1d715052746d59e8aeb130707e6335af31a
SHA51245c698b83cfb0d59a1d7e47fcfce9faa8ea7f20ddaa480a7ae8f255c756527df18461aa437c9b2fbb9b194765f99ebaa10f0e510f31377a304c96c8a00825588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ce946df79d931f43ca5efb25a3d0e5
SHA12d6461253f6e3fd6921918a6f0da104c8242e5a6
SHA256e15c673bfd66a8c7a3c3a6ba186aa6a6efceae93d6249fe37c8cba5ea83812c8
SHA512f1955a1c094e11cab1be618720860fa4540c847208ac9a9dd5069f970a91fe21211f0bb33c576a42d1874df52f53d702bd147b68039088eb95e1d74895115c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f055867f489e1f914cd0d1c78a84df8d
SHA11af219007956fd56614ab8586c6fdd619ad2b7fd
SHA256baae1c330ae13de09335154b839dc7bc1b057bca189885ac03390a4f4c131902
SHA51200732f98d68005322289a357ec0b2c2bb8e7e98ad4e903330c7f5a7414d38a460b764ac21d9587ddb2c5ef33d85f31e1c7d0134e8a38bb6e04cadf0b038100ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5390376b1048c993f55fc5969c9628d6a
SHA10e278e81eca545cee664b71eb4bd832dd36a5bda
SHA25619b984394d38f1e850fc7fe85b32084e79d64a0114340019ae0427a96b429b0a
SHA51247a1f07168784d152ed71c56081feb1095eefdae27832e74d5d3c612c4a478a642e53aef595bcaf284199f87195606c15dc1c71c3933f1268597f79acd788677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584c94e51890b0fc676103a30d808e36f
SHA15e78f7e153dfb566d12d2e45204613025f5dd962
SHA2568d45e5cc7d5f680d6e94afaf86828cdda4b9b9b8a34dc240cf3b5b32798e5474
SHA51229f8e6b55524fbd8e9a2b16a2435642963e032ed86f237e75ff1474bf83a2f43852c9c5c83d2ea31559be0a6ffc9480f909efe9e07113031c5156974f01ac0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0aea410ee307720bc1312f7c126d46
SHA1fe9b86f616607834149bde17c54a653abb7bf044
SHA25607428310e7072bbbb1253af3c4c3a159cf2f0bd74bc78fe7fe64144fac5349e7
SHA512e5838af0853a0f2b893aa2f86af764bf017cb91e5a6a035f1d551317972c08d0fd65eea157a597a7c8160a6d8ee0e04d820b201a6dd40ac454e61fd0438a1bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2dc18dc535016b4475ed95648c17368
SHA19bf9cdf9aaba42ce59f5c14d1320307f311c2389
SHA25688c4f3aef15073e6dfa08238fef06c9d56c8aa93ef15f9ef0033d642f3a1ddc9
SHA512563be9ad7401a49c0b0104e2b70cb4f1a5364e6299b6666dd54bf11b8bb499fee1b557e009b2cd9192d311f8a4e36e47bc67b917ea63960646ee4637edea901a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b6b2aacce93ec5f05dca43e163f8bd
SHA1fddcd12ada30660f67f36030bb082219b0c40ec7
SHA256959ea0091afb47d97fee95cb8c4f2f581c4d30ed44af368a47a0ca99b527c175
SHA5122d35695502cfbe956aec2bdc251f09fdb99fe91db7beeb73b0e4c1d1645d3d8fc0d401e7cec575bd8bac4ca7b056b36cfd024a9b9cb70d19975ac089088a3d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64ac2d940482e6e35abc9321c9d5335
SHA171c8fd1a55fec56d378d3c9f037783d10e4979ec
SHA2564d3ece4fd70d2f5318ad14af1a173a7ebb2d8a34634932737b00f071cb3a6d38
SHA51254b83d10071e953967d39d66cf6b66dfec4f88f9614e2b3495a85361bd9e39e4de7b6fc26b4824fda2bfe6e763147b8e4f4836c78c88e6d0e2c180e41f167f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebca7fe4357bff188f1f059c59ce56d1
SHA1f85b1850fb033869ceaf928a93a4bf5780be033f
SHA25612a58a6d49331e198b66a3db7edcf0e252a3c5bca4cca16f15b070a8ee4bccb0
SHA512cac9755c5f38b6a3b2e9f3e6981b688479725afe2ea29bb675b77ceca4e23e8d708467fca95369f27396acda1974f795f16bdf06864fe64a4ffea9ae518d86b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e98edc6962d3287792486bf2c8d2168
SHA1d295c8b2ec7da1e6071edda4d0ff5338f34426e7
SHA25657f9c909352598f4121624b8e9c997b13f7216f39159964ce63f707fc6df2d01
SHA512925a9b80ca12fa2902e7db78207be0ff0fc4ab8255475334d0d3849e10da85f822260117b3aec2745e28137409406beafa2450878c44192fac02b012cd90ee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52279ad4273a26a7ac10aa3a26d045788
SHA1f1ed07ee8fd6e3a21891b7e0b7da2b0626282b45
SHA256ca3bf8ef8ea74014fa1a6c5cd27b6a5056f5a41f884e2a2fbd3b3356faecaae0
SHA512d9a8abddb0d55e50e7d37255adf56fd5456d8fa63efb95ed4fdfbb43665a216ea12b812af9cef141e39ef6e89ff0c7e1a6dee221cef95f9800fa986e96644756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf17b0a745c45a9d3c4bd805da98a7e
SHA17be23e7bad0cdb75c68c568ed0ff4c91bb7365bf
SHA2564a5cbba1c7f7af441238d0a0f7cbf733673b3ccbe0a05c8c26ee1613af4ae9d9
SHA51284b890be9662605b0fd3c95d739f800ff0ecab8e791c8453c7e621d5e5fbe787795aaa1d00a47b1ed3494aaade2c94a6b2ba18723d6806c3449b660360fe8fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54593a1e4af8eb4acf55d6471c03c175b
SHA1726b2010be63264cef2087e1bfc100d41b219fa8
SHA2563f745f544601b3fee050de03ef6df217efc2a6ab3f0ee9174b1688e33111a0c5
SHA5126b5301d3a9b18d9e77c574a7f2ba368372c589bb95c614983239109e8a9c1d7d2780c10130d4580b5b85943956a7a9cb1d9388844fb75d6bd331442250a7feb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523990c2304386d32f83b7929be91e655
SHA1aa6be21c7913dd30905533aa5b17aee30eba9b2d
SHA256154fbdec76fa284932d9fe7a38306277e23a3dbaa05e0b6378d434565aaa317e
SHA51210d63762826d09fc3a2117b13110ed9236c248d903bb57ca53a75d03310fec28797d1d8deea6ac4964d1817114fe498d59cc05011d079c6875306d0d7ab0fa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d994cf22b4b3e9031dd31ef4f86ee06c
SHA1c579aebe677a471110e928313379a3dc7926b518
SHA256b88024edd95714d1d1ad1b838175323ca887408ba3e368acc897dd4988b514de
SHA512753e66c66cf8ae38857d81c08720ea8019d2c121b8a9cf0275040204915b94d55ebdff2b4ed335c8bfa8f7e660c2c5fa240f656032949946faf2e93099b909cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59701ff6228c554b17a983ad47b8641db
SHA145f330738bf03e049680d9727983174f6d14fde3
SHA256e943ce72849ddac65cb9ba40610c21534660c4e9bf70692b8b506cd8a755d0c5
SHA51228dcf9e4d1b314ec00bc789525b59b1d966cadeefd7daaab8a22264cee7c6fd306dc54ef4cc59453690ae4214ea0b98e33ff192b8862d096033b6bfef14efcc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c875eff1d257ef72048dc78ae2326df7
SHA109895932a4e84c68bb3f6b12a0d49d00b3f7f6ff
SHA256bf25e971823bea1ee29ec20775b19d4005f2591edd511b9bad487f78dd3835c2
SHA5120a13f5ccb956f4a9ef27b17c4b93463d089f537e3d8206e3fabd0b38cc9d379542db5b5c71a335e2c91b4c1cc9cf47d1dc1cb8b88267847092a3b3030fc09d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513bc971caf4b86a0580d8be6924eba23
SHA19717cc2e652475fbe6ece2f65e5548803c8b3573
SHA25637e35b9acbfd894855c399607a5b0593bcdff260e61cecef8fbc36346172c7db
SHA5123fbdccd78f21409e2b62e2e6245587c4384e0201eed731b3669cfc544fc4d6b62de45d025a489acc4b554c520c9b735f8b6cc926a61d6f094a284a8b247f8db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e353148790b802625929b37ba70c0f93
SHA18878f3d5e4804647525fcfe6cca0d8d617f7147d
SHA2565e628d7d496fc18fd13803b72b9301c5e24816d66ab6ed942385dcecbf0901bf
SHA5122a8b0303aa63917873b96ec452eb8f656f4a21d7903be580e207ff0a2d002d11297ff2acd521b7255d5fede8b23f81ae8fc42ee56cbb5900622c336c44b42f2e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a