Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
5b6d0f95fb1bf51839eb958d8f6682f5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5b6d0f95fb1bf51839eb958d8f6682f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5b6d0f95fb1bf51839eb958d8f6682f5_JaffaCakes118.html
-
Size
3KB
-
MD5
5b6d0f95fb1bf51839eb958d8f6682f5
-
SHA1
d896a0babe91c4b2b1ded235ddc17503ad5df74f
-
SHA256
80d8c538e7e20071df971acc4701f9eba698c02775640f4a806307f062991396
-
SHA512
e792a7f19632f5c892d9f4a746e06e817432c97475adaa63acd0e946eb294ae8347adaaea2ce1e1d191f1b36e8dce6d149c3e79775dfcad8e19be470a1b7bffe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422314066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{492056D1-1622-11EF-9DE9-520ACD40185F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e4b41d2faada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cc711b2c60f9b64a925d100d458543c3000000000200000000001066000000010000200000001abc056f1abd1ddfeb62abefb1aee51b600e41288b37a0b73a1b4a08d22ea02a000000000e8000000002000020000000093b611a3d9f93070afa793424e5dd9355931cf335d46cafbba4fb31f9e79068200000003c157c35fcfac5ce36650b60bce0858d51946bd027d66305f57b5adff21bb95b400000008b62ff8dc19a7486dc1dd6be0a008037bd94e8630bd27993321f64fe19e2fbe8113c549cc0c679765a4b2460760253c9244192c3a7086c9203196941847fcd84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b6d0f95fb1bf51839eb958d8f6682f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c7fbe67c98d7478ca06dd158f405bdd
SHA1f79ee4c2d5df3049c720ad56cb14af76d51b3d05
SHA256cbd8334247b91e2c1298ca7ac79ae1b6a21d6caefd08a30323d608b1666fd9ba
SHA5124d43a27978303a3855bead3369fc1c6087a0293267b10de72e11b7c7df5f01ef7a3514e127a350e52a305c83be6aca9607d1677f726746540f90920e32dc75cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546170a97a1975c806a8ae14f8131da19
SHA146e429ff1088843e649f2f6cc2ca16cd83b6a665
SHA256b9976d403db85383c8b698311a2ec27b7bae4e1780585cedc0f8041016c475fa
SHA5123b81b4ee990ad02699bdf0b81822ddc18d174cc1af950184fafd4e5513cfa2e0cf10bceef6ab1e13cd77ad919e239ec5ac13981ef3ce1b6fe4bfe3a4c38cc635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548e02412fb010b3da0adb8cdad51598b
SHA17e6d1abf9860dcee70fd093c0ad95b44c39d515d
SHA25628ee4c13cd83e81356e5e5ff2534f580199560382eaa49fee3df42881b06631d
SHA512f941a2215a32115bd837ff437900ba2bbd85b02142fc585d145a380fc958355b4dbf318a3d3df64ba6f3f2e6a770fa99c74acec45dbee6eb479af55b147a773c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557569127ca194015fd2668b3a3542616
SHA10c03081a8979ef4a15ad7192238066d88b608f13
SHA256bf20bf41e78d18eaab7d70d1de8487c5cf0c99697b3e2fdf666bc2796f4ba0c6
SHA512e8d4f0c0a272aa52113b6d9408a1b6a96be86402eff1e18ed81bf7bfc1979f5f26083fe4fe413cdf68ec05224846f44b378abd24133897d5ea1ba8cf4b021028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba31af5b7563084c2488480e4646c71
SHA1dfeb476f9f3037fe5343532d164fd7f2d515c7a2
SHA256f586629992a6f2818f2b95d5ec8bd90eb729a6f0c58c1281fbcd32375a00e695
SHA512a893f57d595a926b00c26e7ad87c51ea7b8b1e9e085f1c1573be513fc23fb38e988fad7f1b47809557e09a750581a3d2ffeb97e73fe0bdddc361ed7bc0afb3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e13711490952777bd0cf5bed6332d4
SHA1fdee3b406ce66e211ff666209fcee828d605f966
SHA256e2b9019f2620a7a91d0e0afa89693955119f2bc99e51bc2d750ed1e71b2aa95d
SHA512e3de36a08420ae8a7f9080fdbc4dddbc2159675c96100fc6f7b6dbd428a452e78d8bcf5833c4657982fb48bc6e59c646d17392af67309633859bab409c10bd21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a95c41e2bf0d1346a19292fd8911154
SHA15e34bc887418c618cb7bf9ed1ecd9808955fab8c
SHA256de4c04d432a95ac0bbfc1f1d9e9fd3a81dc4c60f70f920de72b688010ae22a49
SHA512ad30e4ddff5bdbc5147e07f2792144fc714c04b3bb3458f6e307621e378d7195cd43a8e37f55fca6499f8a922f68e97a2d0fa000c9aaef83990dad4ecae91327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e95d296c765910dd6fb19cc4df991f7
SHA1fce3032799e353d5cd465ee579ace8eca831aa9e
SHA2564b92896089cf42eaf5cb2a331df8f054d44b25a220c1c15a3fad026dfa7d4041
SHA5124144a3b732b3d396e0364c61d5f9581f84cd78a16cfb4c94da780b54dc9664dfe0939a4cd9eda0fa21e83bbdad9dac7041b700653dd5cd81819089bbe24bb541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b30b69b0f39b4550a0957169d62986
SHA1e3705006ee9ef6410387dae090e1916e50fb3dd0
SHA2568c458b3c42cfb101a8f6d31434ad0656768fac6280b9a612cef0496b191e86a6
SHA5125479e87fae87e21012e3d0dc8f8b7ed2d50ccb457cd2dc68086cbc5943a8df0829ff34fd0a964c324f1a2970c371991a749bd8f53c62029537dfba891d6e7438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5352d1bf2806be617c920322a0bbaa988
SHA1540365ef896134f3411d131820bde3e658e9debb
SHA2563c70129a904f8a9505210fe069c717fe151bc8d4e3d1af3021696f3a237d7fa0
SHA5124e051165b575c0009107e911a2d5ab9c5f0b4f0bdc923e618f9e844b4474c4f572e32bc41d77cdfd19a2dabe8633fa36c478944bb9136fbecb165f3dbc58e1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5bb85ee88ecc24ee6d87403269ac4b6
SHA15b45343d92d972851372b393ce9277f70fc61f6b
SHA256b88abd639909d7ea072a0acc50dedef87bc3a820207e1a3b034b087ed23cc937
SHA5121abde30e78ad776844c353cbb19bc6330774b4b0dec410b7b0ac97a02ac2096f5f9a7b3805fbb36e6f4cfc428d58e009599e1f0d740ee4414a4b79a1c5fd78df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f07f51762d1b742ef0d58d0b308e0a27
SHA1ee253969783d5b17ff7f207737fce9d2bba79ae5
SHA256a084f1b9439aab099b82edfa68f113324651d789d7dbcc3f141e011e396fa0cc
SHA5120b8d475ea048114ad680c0099e2afae574f03c33c3aefe3428c1d58f27460a0e786427aa9856bf3d6f71fb2570df14f6a3cf4be27a49b2e22893a119b980ba4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e31af5dc53d83c6cde2c7ddbcaf00bf
SHA130113cebc2691656db4b1caaf793b558f701ac73
SHA2560d967ea183e5aa88a9b6fa1b96b8315b4fca123f10c0e37443e33a6956ff79d4
SHA5120b2aea5d22410be8ade8343c34907fc844ffa6546d0fa8d3d7531e59c8f1dc868f4085e892348455af138e6c905745beaa0f849f3333aab3bf742985634a3d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d0e5490345a58904694f88e9252ef0
SHA18f95612b162825dc78a18b7c630c935c6372adeb
SHA256fff17b6e3b78e2f1e5cca10fee80445127f9b040510bcb5db824bc54ee5bffd4
SHA512a69713177a789aee54d393ba859067878967b69b8accc0f8652c41886521431335a25fc95af18ddda22c33f4334ee1b61ef6c32ac8a70a47be642880d596c62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b482a8b8e91a435cf90bdb50e455659
SHA1fb918480621183abce626be0189b83910ee80c4e
SHA2566cc375c329869ba0a8ef8fd96cf8d1485786a106f3446ef908ea5906f4d27feb
SHA5123761d9642557ed0446fcb4f66d9fc108edfe0b92636c1c0d1d9a1fb392083044b98f7566ae0e9e546bb0e0820847c93b5347f33e79937d19a7e2c491bc1bd39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c5098e7906cfd0e5908648bcfece59c
SHA1f82a4ee5c6f9a126bb4d2f61e003c5307125e2ab
SHA2564b8d6f7c32915eabe291f6e9c97a31b237bedd2daf2fa72ca4983dfa8efffb48
SHA5127685dd96fcd7fee486f50535ed1f3f791535689e6d7983319bf40b3b232bda076f3e3ca070e25f27e167040731556a7e1e257050af4b9ddb2221608b9ad1920b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ef9b1874007f8793864357fbbe4ba95
SHA1d1fcfe161a98c68291f0add7cb2176af7ad0e92b
SHA2561f5c7b0d53417c0f0419419183effdf5f2c15b80cda227abfe74c58ab58c31a4
SHA5122d04e592ba2f5573530e86c85e9636e5915270b467a6cf1cd7b46063de85eecbf1bd0884463684df46fc2f7a093639c50670b8f5387fbf948b7496d6c2e78923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e480d56cd082520f625f96c46975232e
SHA1d7b1938b7999fae7e6892db3cd8bf9c16adfcc62
SHA25664f30cf3a264e7914c6c113de8a63049b038e91ef74d0eab16cf03609f2cc457
SHA5123807a7dd9a2691a1322847001b10025a555704716c796d0bdfe9089eed13aa613fd66f7aec7f054f0c0a5e1df630cb1540dbb14aff6863d5a179c3b11231e4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9fd0e5346134d7df95af14e0e701ba2
SHA1ec83d3986a863db8f0c869f456ab037506d12154
SHA256281dbf9fe0f1fbb105420b9d7bf0099081da0ca0c7e971fb4e5f843835156e5e
SHA512b56bda0bb7fb38d0361a66237080d67ea58a52999dcfeccee0923b153441183c8d07ea80d0b66c3cb78d33d52f7f8ab80a0c5e3648898a50c7a09eff215a1eef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a