Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
42b66ba54f7c131aa91973b2bc2c3fd7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42b66ba54f7c131aa91973b2bc2c3fd7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42b66ba54f7c131aa91973b2bc2c3fd7_JaffaCakes118.html
-
Size
94KB
-
MD5
42b66ba54f7c131aa91973b2bc2c3fd7
-
SHA1
fff67dffe5546e0cd562ab5aa185a23c03913c13
-
SHA256
2e08aa01121dc644f990f68aa1352cbbfafb46b75a84e3e6523b01c8fc88843f
-
SHA512
1425f20262e1478b021d25f27804ef9c335000508e7afc35476c422e52278d23dee3be42fb9985196138fd35038e7c3703285042f411e3196dfeeeb6b603dc4f
-
SSDEEP
1536:WMLiNV/SFLdfbOB06oC427LoDleerRCiy8ZXdjjBdkrY8mgHC+qpEyW:WAimB3BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421876835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002e21f54e256adc3eda789346c80f7947c7d509ce54cfed5c72d0a455d4ccf77e000000000e80000000020000200000003340edfcc07001eed8661c061afae4d9e426e06026d77b94845188f1f136a55a200000000462159ad8359ceaa815c522f02dd72907a881b9eadfe1fb0411783e30372040400000000054090dd9d6c6e8800449a6d48cfdfd1c7ad5632e1efa1af29ba625c2da53980ffa1ae4253266394e4755cf013d9ee23b2545dca8691cc187e77fab1113c24e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{468F31A1-1228-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3087051d35a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1728 2336 iexplore.exe 28 PID 2336 wrote to memory of 1728 2336 iexplore.exe 28 PID 2336 wrote to memory of 1728 2336 iexplore.exe 28 PID 2336 wrote to memory of 1728 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42b66ba54f7c131aa91973b2bc2c3fd7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24679a66eab482b4fc9484b511b705e
SHA1fcad7c4329e27de557211bde1c70aeb572caf8a5
SHA256e3c244ae75bb1142f833e0e72c341d0634ce48c4e8f98695b86462d3d1d3bfda
SHA5123f0f71e4ca407f090569848ecabe75cbd096af1effba2b9c454a6705bfe26f74e77e9aa5fa5315c3a50ba472ccd419ec045a2ca7b29e2042c91d70b2cc41c4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee1517d7aad4eff284def9d18fe550e
SHA1df9c754d7b8aef1a25824dca8f38116380a13832
SHA256a3f373c80060a61a92a4da7e08032ee7d29302eb637adb433ef009286bc2c189
SHA512e4ed2233edd695469cba47a56f333fca9fec7784ba35e03f7be3840c8c0e6a9e95972efcbd6215edff6d94ac365cc8001f33935d56f6430e09001a7a765f1db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b79fcc7b13b3c9f679ba93e0385dc244
SHA141214349b45a49ff46a38510302aecace168417c
SHA2565aca1b9533a6c905816ffb2f629ccc23a12555bd1d55a4f6af635d86298ac6f4
SHA5122c4786f83e8a86556fb90175f4c5e1da7995c5aba257b9b436e4dd3e64e9992f7bdec6ee0faad9f8d8b40f03475ae7ee948d8babc6885564d68d9438b67551ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ed2f32a89b2d11e7b18bd099b4d64a4
SHA1e20bd63b655b7b40197520cc81f9420c2f36301f
SHA256ba1e49311f311f65323980385e3c377159c189ebba1dc82fa7d9f37598f07beb
SHA512c3052a430341f67ab28717f899b62435bdeab5805c51eb64d38673afdc5aadb823a9cf781450d6920c752c16dbda98c24e52abfa63f1d9f8a799ed0d5af5b621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b159e1c4fbb954446845621b456e8c7
SHA16c6f727856b474792c180ca41490aacc9bab2259
SHA2560feb784e4cae5ba963c213909ae9fd32b70bcfb8af58812f3b543a3b97fbf49c
SHA51273a922f32087c9c1df10ddac5d25082e415dd46757bb411d86d2c7b19897cca25fb42495c3433c2e713e775c4b84c2c58ce18278557a27324a51a35bd7dea603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bf9605112f88c4fb0f8d96ae759f077
SHA120df24326d042ea352d2e5e2327cc842eb38e2f5
SHA256e46fa5c837a43d77b175bada564b3cdc57bd68eb9ba0e6fb0c8c8bf45e36681c
SHA512bbdf4057d094236a54bc65f355ee8f15e224197d69fbb2393373e6f9a6a838a851cd19b2618dcfc878a0e5c50618d08ef2f52a7874992bf79b0c08d09e1b3739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2964fadcd74255e70da2da5124b7a7c
SHA1b5b2dcaa3da6e4952780f62dba5fcdd26712ce83
SHA2561132f9aaea83b1c4b1bf00e8fdb5a3b882d62d77dbab555b2bf4debc0876f686
SHA5129bbb910b8b1a9526d4a5b11d8ecca79de4cd4231e6b6fb4fd9af6dc8aeed0c2e5fb8278994ebf6d1430852323d55607d5c303b316e052171678c16d81910fa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b453667e8ccdf88b9befc8e3a0c778c
SHA1f3c11240ac7cd7cdfb7493b47c269e3f3ccb7763
SHA256af18cc248174ecc90c3a47b4f615d8c6bccb9557b218bd61bc0d1e3723b08f9f
SHA51278f9d8a11f3b7a8a542111d81357fa42dd8f246e0c9d0b222272a8f851909a15cff1140373393d149dcb694a69414ff609226aa1ac88d088401ccc1a8c793837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db8e897f5e2d2bdd0bd81254a8d2fb6
SHA1125ee5c9105c4cada28bbd59b5e5a590215d5a53
SHA25672cff95553cbd2721a42519578b03ffc7f5a47ecc929afd227e84b388326f911
SHA5122386f7d7d0675f308ba9c5596258cdfa3d4078425654e1ec158b7111f8a8bedd9ccd4939dc4d0361f8dd34a57fffcfb53e6c6c7f785ccbdfb1a3f694ce8d6aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd5e85454f0fd1c331eee55d6b9b909
SHA13a21389863a7dac21763aae298fd28d185d6a8f1
SHA256a9a66d6db659e2fccd5d6922bf671970d426f276d257a5e0c81c0635ffacf37b
SHA512f307e6c0eed69b5261d8137487f67bb43a4570ff8bca6658afb69f665223600697d894593bbff849a8bb34dc2f459b6ff57d26f2ceec8a14d59ba99758c2778f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a30a2477b5e8cabf41a0fdfde388ca8
SHA1730087c6a20720430e05d5197c2c9a51e38a9815
SHA256f37adc767519254b456e33fb40831b02b2529768708bcdc6a10b4098b22c5a26
SHA5128fa2cb735b59e19bbbaffb4c821013a4a8a9dc172f9aa89901fb3d593b651dd9a13d3757cf7b56d10c975af2b7b17446525ac8fd5c52aa4f8ae0a791af666975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e550c66122bdc602dc619ba45504cfe8
SHA1cce9287b8cd9949883f83ff2cd1cd8590b816210
SHA256599eccfe5dd0dff31c9fdfae2ad34a6c97affe2628b943727c75dde4f6e7c65e
SHA512ae789f321f6d5289634f2513bc82bbeb17302dacf937c11fd55c6314f176cad23b3885bf9a8b4d92df2844847545431ccd0f1ed223d89cb39d6a44a044bebab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d79b3d27cdd4edfb4552c691c407f5
SHA137f6dc06a2528b3884d1a3693741b304d6a2fc20
SHA2563eeae786c4f7a06314f924753e396fe4298ba30242e56d7e4e19a18eba07a7bb
SHA51222f0cdf3ef2e0ef58e8c04be78d93ab0929a58d8410de0a3d2d0573be4cba95e045aff6231ddbe1532b0f8b1f532b8568007c7316b8fc64da26baf2a8977cb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db78eb74a479da784c1ac746320495a9
SHA18a671ae089cc317a58a7dc91ff139748d77b30cb
SHA25686233c7c4a2b7525650f7b9fd0faf3d42a1c3088d09783ecc314de7dfc528b6f
SHA5127696d7484927b6c16c5ef83d2cec5cb5071bb441d3cf5d3a7ecc604a0e22828d6568eeb775dd7a1ade6d51cc23fc2ce1bbb6bbda773b91a9a223a861336ffc08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5133e9923a416b4522e20184489ab40e5
SHA178ac172441d71ca4cc72ca4973980184ac0aa3d9
SHA256411c599404f9ab71d9f8aa225b5381114441c86e5477e5001083133507f7b6f9
SHA512d49989855e39f83155dd45967a9feca1471ccea70e6fc4a31bd2ed023a435453d7e2d954a7f43a56e119b7aac25a30b0f42e6bcf4487de6a3c5d31cfb6abbe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52599ed5e39a0b645c446c7edde5fb5ec
SHA1b11743a6721b5267bc960aba88dcb005b5d7d53c
SHA256f9a29e759c714d3c18cb0c0a6171b2afa45355b6eafa228425ed3325ffd77dea
SHA512d0062f22335fc1925cd097a8cbadb4d7285bccbf0e7f0864fc48f2acd182dc51dd5d6fdfa3e9383c106bf3dacf906ec5745a4b62cc1def4983c9d588e547d7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59923c98bb548e520049237f47b16beb6
SHA1cdcf91825865ef08bd69327ed1057202bf2e1a70
SHA25629079587810794c63c7cd0df556e2e1d0b22096bf6bf45737485a4ef920d10e5
SHA5127f6cd08e2858d0530164a4d805a5c56ec978014af58417e4efdb6db07c30e5cd75a176adbf5d4deb0c2b96ac934512dacb566a10c9cbe68baba0c9662a144ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514189c5edc1cd29d9486ec348056645c
SHA1347beeb0e18db1b97405e56fdbe330981259f2cc
SHA25670a7fd8da74248c0c2f2a1c868500591ef37c3bc19367f2b191e11789afe736d
SHA512324a1a6186181759255e0420458bb443fdba7fa97a8aec183e8ee969ac68a4771eff328a2bc210ae49c5406065a2b6ffe6d56d14e68abd75b7f1fa9a370b68da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e006c3c6671feecef2b838809f2403fe
SHA1cf948efea8ff9173b197081158b5de92438d5451
SHA256d7effc2ca12d25f3e265060720954d366ee4d42a2b33da6b161ac30e3dfe7810
SHA512145582fd374f957394ce03ec2ae3ca6f262d1bab931555cad726a9640fa15f3ca80563c0b65e680840692d98a0ea7390cd5ac8669ac2eb80fe3afde9b2895026
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a