Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
446049e0f29496c0d6f23ecd184de4d1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
446049e0f29496c0d6f23ecd184de4d1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
446049e0f29496c0d6f23ecd184de4d1_JaffaCakes118.html
-
Size
68KB
-
MD5
446049e0f29496c0d6f23ecd184de4d1
-
SHA1
c60fc2291ec5b2482f4885fcb8d0b317f777b6d3
-
SHA256
441cc81030c78248b1e3a4554d1caf8254e170a22e9c2797a70d899c06f87ec0
-
SHA512
7716520d4b5353d25ab4bb7c8b3e25bc51b43755b8d15a21a916cd8ea7b0ec4a8c141cf6e938338a4e7d04a3e06d5f4ad39233c28c2577951b3d8eeada9142c8
-
SSDEEP
768:JilgcMsSZ8tN99OIsnEvCjfoT2SqQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//IjA:J9W3qjATEPec0tbrga6crNnz8PJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000103f8d24bf8fbbc702c536a2b5ffe2a2688f678b428e2504299cf0f511ece37b000000000e80000000020000200000008548f56857a3202c5c1b69714e6c1a09e34e139ce7a7e57d2a27e1e74745d3bd20000000dec29baba1f3c419512f25f35804983954052df40cde9df0ad2b8642ed2bea2540000000f1aacebbd251cb9b6ed8b018f9f2cc6fcdfaa713e90a12001db57bd2cb8dcd7e7e5b65738c642e56bf1a4953bec6d9f170b91c9fbcfc2e947a15c5ae990b2663 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421905776" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A99C2531-126B-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7012777e78a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2416 2220 iexplore.exe 28 PID 2220 wrote to memory of 2416 2220 iexplore.exe 28 PID 2220 wrote to memory of 2416 2220 iexplore.exe 28 PID 2220 wrote to memory of 2416 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\446049e0f29496c0d6f23ecd184de4d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5992a95a744b25238233cffe1002573f5
SHA1fa5700c238e4e2f0a96a40ade72bb4d365cb0672
SHA2569cc0536eca44d91eb3863cf83b587c31f6cd789a75d3810a7e147bbe6d1b6413
SHA512cc02a6552bcc4488ff70d1585761819d3fe1fbd2bd2dea02bc959e99d15ab45cce454ee40aad761d8ab90bc4df7cf8a8ae1bf42f35b57d74d7c5aa671fe1030e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c9b342727910d8c1fa5a4e30bb1c5c
SHA1e3ac8cca9ca182eabbfc8c79f95c5f855440c402
SHA256fee513c3d10811ca7755405014041f7712857d24f32890bf7e52af625ded7760
SHA5126408fe9a34348d8266d31dc9d6094a775a01e92464270a87a704a321c6b47a1b40d263240045e99f9b88f6746783e124bfa82d9a5f7c93393456273b99739883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1d359576a51da4501fbde5ecb93e05
SHA147c4ba43beee995f5fa7ef1f3b4e34675201e0c4
SHA256193c4f95db2e4639aab25eddd6b1fdd7636267c2842a4e6d1f4831e8ee35da14
SHA512d6762362efefb65c45febd18a6e0644af0759ed4eef175184f5b8f904104eaa197c31289ba8d50cd2440e168e1adeaf3d67903a63f312364f75296f7b77ec4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c21809b89c1bc23ed5f5b6a2164f63bb
SHA1f9660366ce0f83f233b3510da180c7af0c2c2306
SHA256c7b31494f7751557b434c85c9a0fd7d2c6ae3974823dd1b1044ff29feda97200
SHA512bd01ef742e8309f2d61aa6233ad91d9de94ff0ccc2f79811324d589fa2832e3cbc05ad972f43dc81f3ea663a078d50ba6d79d7c791581cf7572ad257404037f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b818a8297e1702dee7e57588b93c568
SHA1ead276237d97f9eef1dc6e9f899b7c9a4cde9c71
SHA2566e8bf34775daeebf2802e45770d040598d5febac6ca236331bff5f7960c36849
SHA512aee94ab6a44f654ae3ccd4217a28d9f853956ea5865094bfe57f6d6a16ec33927d4a07fba7ecf08e8f5d0317543a33cd47a3747c46914842194c3524ef74ba84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb83535e9680a07b66114760e79d1f1
SHA1cf852407507511fea39e3eb6be10d6b5bd96782d
SHA256f65a5fa43311c267f582fb3b8db38385b40d4b366d965ac20f80bf7923753cc5
SHA512a406c8889115d09a60def3d1f999e67e2c56b29e4f0efbd306878330655cfe52be4238227a0799862a20a572b9783b3371ea6d34d6a196f329530611c572daa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f6997bb7300a80043c5b6b577c2f16
SHA1c38d37df06f1b1b7ea5a3db565122fc74ba06af9
SHA2569ebcc4299f76d2e0a9bfa4ad3422b64f7d731178853ab7a5c45f72fedc9b360c
SHA512d7932a491ec63793a4484979fb52f97590f60eab72224d04358d1569a5ed2a37ba4574021077e548324c943874836276ca4c2d9a6c91980d82a4024c7f37f0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558861a7b4e749df71102c9f995ac1fe9
SHA12ea47c9b6c696b4859cb9c3c3bbbfb08dedbaedd
SHA256308e2c6be7deb839813000b06eb3e8e8ef85f2c1bbb5611611920aea2d5fcd63
SHA5129b96cc31ac2a674e3a29bf35ce699bcec2240eff13bdecf44bfab030105a3234765fecabc194060216c6245450bb8af0594ecbfe2cd02da3696e219885aada3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50876c7ffa8780c01479719ea8aab3686
SHA11da4cdae693c5605870bf9cd37be3da16405fac4
SHA256bc4eed9937c00ef8f4cc92e53b4d18f09ab3dab72b2ba84f8f635099c40e61be
SHA512d5f2d5024a8bc77ef3d21770f004258eab73acb2307d96756b65c6216f9dc99ea0631ebaa5c59ee9a2a8cb9d233660ae489728372d45ede89d71ddbc2238b765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596742f9b084b8d94ca59d4fdb1ee6f3f
SHA1d9814861f135240cae3a8bb51e639eacba0e2888
SHA256619a6131c830ad70cd4fa93d8934253ab443fa5fe05907f2c4e91f5c4838b276
SHA512b0101a5b5e16bdaead38711f1853371a6392126346d499995b4b517e52e436d01983c1004f0cca1d22d4fed357d61f70c9fe753b2991472e4c0d259ca94e425e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518fd92afdbdd9b0c589fcf97243b55e0
SHA1c84e243885c63df86c557288389e2de4369689be
SHA25609aca66cafbf96a828d150e97131d268ea8a338d7f64d6110a6f553920dc364c
SHA51264d74c001cd0a1ca2adcb6d069fe637bc11658ddbcf3a27cfa65de65b2cbc0e28078f3492f2886392e5b524f3fd70bd8cb36f8cf1ae46cdfe1ffd491308a04c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55566974fbfc728bf04a9c2cf0b2d1b64
SHA139bdcaa7545693bf557a2ba46275bbaa23ff4454
SHA2565221794c0c2f4ff2c2b293947d8ee81d18aa8892013b4546f56ef615634f3505
SHA512d25e9263d5a1c05b761a99adbf4c92ec24a34c995a0ccbe1541e1dd1126eef5af3ac9d463c1fd7d6aa8ff167f523b18bfbab8bbb7f74e400a32394ae4058a8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537f44ce5da74e5ff05d38ed382873357
SHA162f6c32e41cf605bdb1a3c892e739821bc8e1244
SHA256b803c8ae4b69324a9be46b08829c342f7932a9426bcd8bbddce62d34fbde2716
SHA512a959a83575e8de0cd219db11c7b60044df0ec452fa746b395b3c1982c29845b35f1502df49673c355231e6a38e4a88bbf6814282873c45f7048dd7221c961436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5547aa0d885e40d3fcd15ab2b6f6c59f9
SHA11cc98112b9462596efdfbf7412c929b2154b51f8
SHA256375c2f03aeb25b77288390376bc9e87251c788e46ebc053c57fd59bb0d1f7238
SHA5122f77310e0e4d84b704f82423b8557be29dfc4448eb629770ed8bd80d5c620a425e725c597152e3cb62f4682bde9d1c1bb163d2a9c0f91550ee06c4eae781c45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b96eb0a5a508e182a361b068935dc23e
SHA1e441c7db9e02705beafd84a92082cb9adfe05a4a
SHA2564258b1c889e933efb8ebb8748f1f911d8d958c7902fa33f2224ed0c1537caca7
SHA51275e022d68fa5e62542c53911a6c8bec93dd22ce4878bd045ff7759925fbfbe805e613bf70af305ff9e152e9e5e7cdae5d9cc26520d97c54cb561ed37e185088e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7a4ce6b58adf21298e11a045fa18b2
SHA16e1cbf599251fdd5309c3740179bb180cada9ca4
SHA2564c33be060fdfec270bd24eeece8b70c510502a1718c1c38524ffdb578dff151d
SHA512c78f825383a66bc2c77029e64e4845b4ad17e25068c7a35174764e1a4ed7c549a84b368c1a629435ff5119365efb6adf30f58151ed50546a9222c9e32755584f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d891272da77ea5079ab9c5577fd80836
SHA1a092cf9bc6c453ce76e813927cee198458722d1a
SHA2562e160b4d07c2c5e4ede9e562bd33ead8fe40dbb8839b9696a51b9866e9c58f07
SHA5120b8ccdd84dfa4f9ace54d20ca9fcd9c58980ee213a26589aaa783eca4d4e88c5b94809b94d7b259c048031d85215671f91f2460bff08b803f71ebe10ed5a93c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f707b74b4fecfe32e5d9b01dbfd0924
SHA180e46fb37cfadac02572cf80c6d94ce7ba241fac
SHA2561f9326326310da2dd8c669bd3ed1d78898b179ee7bfe45fd2892bcc46bd55993
SHA51289a8b16c22a87cc59358716dbd8c41170ccd4e636b3fc068ec9aff396a67a2712a7fb8e4b7b513aea0ef02d599a3a9c06f1c7bfd017086ebf979110c24dde01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7a834a1f4b6ea3ab7b72a704c8ed8b
SHA1f7cb59eb9aa10077506776e5015319baa312424c
SHA256da41f05f9b0f8fb2242b450a89bbef452e4c99c4db372bb8a409ca9f238f64c0
SHA512d1d3645d92bff400f976e45491e0b4f34c1b94c9325d57bce3ba086bd20881b0782665c844328f50f341902daa99c19e50ae042c07fe260006d75c54c0a1cd53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2ead5dee5a8f1ac0c99e784accd278
SHA1acd709b38a81473666a96423e06ac8ec368124c1
SHA256426996e3512b1e7bd5ae18a266fdf3d32d5fb8a0cf6bad2521bc32116ade8225
SHA51204cdbb11da9143a2db6caab85789b1a3d7691bb3b562eb89ba1fd139551ed1eb29f242ff0dd66cafec950946d93dd777893197fd41c99d7e28f7f13cfdffb114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d083f1ab9e4a194e4745c6056d5062
SHA1882bfced11153511233460fd6cb55801790f662a
SHA25645feec9fed9c0fd4547aa50e56796f99220f90cbfd7a9ce4c5e2b370a761a2c5
SHA512cdec4c04c9998f85745a759fee72184d1dcfeebedb8c8735d8c018fe2307df4e5e6e756192fbe4f418d640a0e53a24c5fcb86d3b7b023e17f000825fd864b042
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a