Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
63a77192782cb7a6f0c27b8ef6068478_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63a77192782cb7a6f0c27b8ef6068478_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63a77192782cb7a6f0c27b8ef6068478_JaffaCakes118.html
-
Size
4KB
-
MD5
63a77192782cb7a6f0c27b8ef6068478
-
SHA1
1b766035f0b359e2a1111eb82eba45b54f49f157
-
SHA256
8ea7812677e9de93264a1e243e5b611ebf32e60e1b13fdd7431849e1a2f0a841
-
SHA512
3381673c9b72914253407b40def1d052e32da2669e315dc4ebeddeb618beb80d230459161841344749425b71977dbbdc35101a98ef4833fe9ccff695f26a1be3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owNdNbd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD9
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801c520b8dabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422464359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004f38bfac31343ab8a5dc57c6ed5274b2a6719d8fa9ab3c478cb9535973386bdf000000000e80000000020000200000005f4d60961c280825bb421c2629ea7e0302a6f16ef52afbf5517d798bcf5189ca20000000342e2e7927954827c24e1f92a6a6bf724d244b27aeba2d34ee4b6430f134dcb6400000005efa77f7a62d8f9f2ac4f145b5c632b85aecffe50e4504fa75adbc1d74fa0c524039fcee99e4b3cfd11af81674bb66c23a06ab60fef51b96db24179be452d29f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{360673E1-1780-11EF-BF06-56D57A935C49} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2032 iexplore.exe 2032 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2032 wrote to memory of 2060 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 2060 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 2060 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 2060 2032 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63a77192782cb7a6f0c27b8ef6068478_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dfe5eecd4fef756aa64f01ff4d32467
SHA1f0b181a929d82bfb0bae3911f05ec8d78fdc02cb
SHA2560d9947c0031cc76b9e66f28068d11c68ebb3b7264d288733369c69ea8937a423
SHA512996cc7df177855d2d36b86985ba7d5aae6835b29943634dcf608a08bd81bb8558f0e8164a4fbe21cff4862c7884a7f2445d0fc9524f15199d1329229b29904f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53260852158295ed7ecff5ec573f3a990
SHA152bf2bd64df6d45038a68e3c7c2006e8482ba2c9
SHA256e6e3bdd0a99020081df83832c0c3a2c357523bba432f6dbd8358e2b73c0858f4
SHA512955fa0cea19d01b3f34779f99ef8cddd92aea975201ab402f7fc3bffd10a825e733c28700e92ebe86f90cdd966fcc6108a9e5200163441399b137543ce3f507e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c68aa3a10ff5e4a3e634135cc9c183f
SHA1ac1212108f764c7d856aa0352e133d490797b22b
SHA256ac28e68ac3af0bbf943ab1f58557db2628b4b12e5fc3e2a27834b4e46f1ea1e7
SHA51298e311e9ee04867bfe0e18d4e02462ff2c7c872e50ac9e0781fb752196f298a1faeba686869e4f67e55b29970f8d2e7a58f3f8a719d6955a74773b47ac2af412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58716302db542e68da26a758e96be1f56
SHA15df6cbc9d4fc17d9f10e3a0ff50b975fc7d95bc6
SHA256928f25d3103fe34e1de2a905736fb1f8af32d4c46bac69873ff760d84aeef60c
SHA5124a4df6c79977a624f54509412b3b09362fbc674de1df2392d3709d9834b59e50ee6fbd54d322767e0bb6b3a97c6ff6bcfafa2ee8d6c823cba35f87bd9618f942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9bfe2a66859db7a20afa1fd73b808f4
SHA187bc105c15f583fe13d31215b9f0298b1264aca7
SHA25677f32c0e74c68bb201486a790929a9e6a548d3688bab44a06c80907014b2b483
SHA512ffefe35a7ec05d673acad3845c696311300a109b4e240bde8782948bfc88c2c41448693f9d876dc586cfeee07d9a1cd09fed7dc90c59738ad49ed3fc786aa9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a019c251d3240d4f50401108c7209e27
SHA13f13ab1e5b02e934facc4638ae7297fb8c617c57
SHA256fbbe71854d55f5e0c26f4e2d714ccc22f125e1ef163902ee2aac47a8ec3e5b6e
SHA512e06ef1ab963fd4fd24beee4181546bfd9a906a4da4213823188a03473df4e7bb904eaece2fc69a610790249001f859b5e69a95dc1b39631ac49ccc0eeee55bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85d5c1de9aae293df7155a92c8e862d
SHA141982b4d48126373ebe77573ea4648a3f0a63db5
SHA25663dc83d4bec6621ea34b01a87290bc6827591bc9c2f4be2d8a227deb3a265ef0
SHA5127d8c2760fe880a49b1a90e8a8d9a46c2421ae3b6f4b18b3ad1d27411f99d57984f671e1157a4968ef011a8c92827b259cfaa4498a7b768bd80cc997089ceca79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebbbca0d2e48ce3e72ca05ce9602ce8d
SHA16aaba06352c3954c69f3ab38d47732dc3f53ed10
SHA256c6d8e5fb375714ae672625a1dbec1b63955535410b1fea325896cca0b7a8e7b1
SHA5120d2ac9d959a39318ff8519e5c00107e8833a8e5f6715cc6ac391a405c1d6c4120946aa418a21a1c74183cf3a91675258f301cb1e0af6092c7ef4c6e2622bd462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f8dcc77d3f9ab5310478e5ac038e03
SHA15b3f0be1b534a5d4754f64b338692d4da8ae8e3c
SHA25655601589006aa45bd89176660cb2c7c357a903ff5d58715fd8eca743341e88d1
SHA5124943793b112ae9faec738384bca86fbf9bcda0cd45a11782fec81f0b14336610509763f1bbdc9af581d2c15a0721580b7379c29cecf34088e17703b81e35ee30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da9b473ea403736656f5a68c301b047
SHA186c6d440a07ad059c985cc14036d8db38b550692
SHA256e13e2a1f3800797313a9cc217f7e7213f2d95b5e88f5649f791af9fdcbee9698
SHA512702fff46ecbbe650c5d5db1a1cf36a67aea9af1c6b56a0e622b5a50885368369bb209fb4041c6a60346f5754e26d8459e2e2cad1019d84836bf365525db07d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eafa539bf2e1b85e1419a88ba8380dd
SHA15147ede0bf29630ed41eda9185459b72349cd236
SHA256b9ebc5f02e8ba68dc07d4b70bfec4cfe7fcf6fe2408ec26522d2efe38ce6cc70
SHA512ee4b5a256a8797232ed51db8f529de9148af774bf0bc62f59a6cfc07276519cf691c850a203e3478005e31e1b6c71798349c37b9fc5286b1cec5d6a1bbbfa81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54898810db3bdc7822da54324d06d6324
SHA19f2a79f89f2366fca34f76cdd8ae53bd224c17e1
SHA256e7bc2b2b873b98bb75ec357fcb7796c1eb0b51e3c6e4b0250049b463e99ad09c
SHA512be8cf7fd7df0d257380534bc818de730dee5fd3e931e4342c70a592cae1d29b9674717ac36444888aa8dcc57995129b72df1bf98a8b82365cc04dfef497f943d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540a6d72c5eab9537cd925076f4987986
SHA18c63d1ec7e329ffe9ba7f048882311d3a5434dfa
SHA256af6e9105ab92cec9a59b0a542d736b4c1bec54a25150592dfbe5ed146f20934f
SHA5127a692b64ad12268609f1b800195088a6bb43f88abb42125be1b4ffba3e6ea3b65e869c9d9fd110edda9352aff1ba45fbea9f6696afaac5ffc0041250b6a5f737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381e8b027e8fcd3357d75ab3a1f81385
SHA11d757b07217d3cafa5874eb9b16325c9d4e3a692
SHA25692d8acfb13dcf10a3cfa760a58f5b6a3dfa0fb27c11b5420ea7417f6a23236b9
SHA512788db08a1e6665cb1ad036d6174c495dace183ceb2bf8ed6a57d73fd5c16395ff40103363527c55f5acf308dd556f1d6ea4b9c9cd9acbad07aed1bbd0755c073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53763e480a743964484ef3d051e30bbaf
SHA1cbbd47fd340a9a0635792766170162e238c9566f
SHA256567108413940709cc10f789afc728f564bb7a78ba293b7ad0cf3beaa30704abc
SHA512797be225485852fd6a7bd4239733785972c59a6374a468f21054d4d0e35c26293f7bc0028036a2d0d9746111eec718d7dcf952b7c636bd75ed3da074e286f38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d620859f04e4b414924892b5313c5501
SHA1acbde776d92de2e42718c1ff1c5ac09afbb63a5e
SHA2567150a6579981a67962f68f8de5af2b5696af46032ac405f1f3c9f95117656193
SHA5124e7e431fb0ab19561e6569a4dfa9f1c1ad0fe0f44af3df575b7904d18c34a7fb08e2c23f8a5b31ec558ca332e1a6f75a1e8a6e290d9ee08234bd2540357553a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303f0b2ff59534c72156710e4c5c01a8
SHA1ad1740123217ef26af5ed60913fd83b868d503da
SHA2560f8795cad31db618064577c12184f77b6eaf586d883da0d5f0325c4ec60c89e8
SHA51263c3c3ab9eacde0ece51beb3abe20607d298deb2476dd0fb2a9f7dee9449c00f9b38a0ec5b2b7fe910108b0b405f8596dc8efba1f001b24b2f1bc9a46222b2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ae5eaa3ed50b3b5890cebfdd3edbed
SHA1668f53d9d855d7195d777cfce6be1700c2f4b704
SHA256ada3887e27d35351059b618e3d26ea21d2dd55b8383d000f5ea578aab0be0fd8
SHA512b8fb17d7de37ea631581c5762d2a90d208b6987a8f7075f3176e9079c41342b70746203c39c39cef79b8071e4b15d81060c0068a2f9eebd941c176e651099ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff3faaedcd77f5a4e4fd7b3e5a264d60
SHA1ce3176f44bec8cdb2db2c007f3432608b5113ca1
SHA2565f28ce9393912a2dc606345d4cdd3443dd10d16e1c079188e3166604aa5344a5
SHA512780d6510296de18a7f744e4a8c5a1bef0539ee38e4f818bf0e595cfd4204dbff6cfac1e3140d1f7f169048942ee08a9ecfd42031cda7028c4b636c0d258267dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5137947b9c5cd108cd42b10adbeaf6109
SHA15bc39572f2a58aef975ffe6b6d1fffb4812c05e7
SHA2563a53fbd4f10007a435c892de748b24cb6eaa7d6e5f682ab6cc7e13b85bc713a4
SHA512b41040c32e401da61a2bdb23e046740850d3ecb84bac7594c1463266a27b4c18e28915ce3bcbf1f4d8391cd82729859073b360b3c5181613de055d5365e9978e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a