Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
63fd97ca4366961c5d96e712be6cbbb8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63fd97ca4366961c5d96e712be6cbbb8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63fd97ca4366961c5d96e712be6cbbb8_JaffaCakes118.html
-
Size
33KB
-
MD5
63fd97ca4366961c5d96e712be6cbbb8
-
SHA1
c9b15763b5f4811418ed5396e4b1f2a69bfa158e
-
SHA256
95f73743c40f2b8711ef7f6b0dd93c152f35126855a4378408e593d37bd22210
-
SHA512
63155d73e58ac09900d180103521ee04fd2e66a06228ee3da444e6b71becc3cb75d7df64b7affc287e1f5a2ec2fb3e6960033b515c3c151556069afa8863e8d1
-
SSDEEP
768:hOBAmXIwA/JlEH02yCoCNCNCsCsC7C7C8C8C0C0C/PC/PCHMwozgEZF:hOBAmXIwA/JlEH0rVMMffkkrrHHoonwa
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005c17ccd7e159624781c54a05131499d2000000000200000000001066000000010000200000005076e18b9dfde515ce2358b1784be624bf2d3a6703f0eaf1c29bbd7bdb01e83a000000000e8000000002000020000000304ce17f6536bf0d8209162a479595763f208132204e22024bf354dfd1fc65d02000000020041218f460bec40885bc7fae3cf4b1dc8e315f16ecdbfc9ac16e3de0608fa240000000803b3fd2ad354e156e7f5d1a0b42249b73373c978f43382ca7cf21d29e5b735f103faaed0af2f580450952484b4dd1af848d923c61d3c6d955aec16c2ac176c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471344" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9074c24f9dabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A15C801-1790-11EF-80DF-F60046394256} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2900 iexplore.exe 2900 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2900 wrote to memory of 1564 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 1564 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 1564 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 1564 2900 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63fd97ca4366961c5d96e712be6cbbb8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd2ad9295abf16c91b914c6bd7a8916
SHA1f2eb5a68f99809999b0758daff43f95493f0f0bd
SHA25637ac724042c1e73e95bdd6933fc10d3a450c489c225b0fc49cc1ec7d7b3f27ed
SHA512ca80f6f40f2fa9ddedeea79f77bdd9e30f30219483fb829d34464c50f4cacaf20b1d9bb9e790bba188879d75fcf3aa19cbf86523b771132b7faf1a3ee5663217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57673ecf538afcb659f6672a7db3594c2
SHA1d47653e9ca4cfef03cf4628ec96d384e5e5b079d
SHA256782b3625ddb1f4de3d723a90f8d5e4fdcd0473e1fd4e81980b82a40432c9a3e8
SHA5121de404602bf8d3aa3150b68edf31450d2ff94084c4d9a2200c7c1489040fd9813adc1a5cd461373e080608e10838d36a3780d5c965d55a551041c50a906a67ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5609e854715db0fe757acf986b2cb8c47
SHA1ef8a7f59a81b180995d7ea1bc416a82d6c016e21
SHA25672c66b6922a52c6871913fc4d0bdb7bc6b76eb048fa18f313310eee6da237225
SHA5120c9c6426bb8d64e6bd000763c5461fa620d1414bad191779df4018c2acb2962a50be862e82ca85bf390b12c6864bb1307e255073eac85a0554396cc38672e270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d19c849b190a991b86970a0d8d4433b
SHA1537c13984af5af65016ca9719f340c35fadf0ca8
SHA25605cff43679de8c2efa52cd3792a4903e2c1a53877e7109110e26212fd0d1c73e
SHA51220fc005d6116424c064b2911aaf6e5720ed4311d77960570749e1ff9aac1dd9f3b07bb9f89569e1e70711b19f0fae48e9d590de4d3a36e5db8900572a30872f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aa9cdb5bbf2cca881337568cee66f53
SHA141beb7d8ce538d508aab0e2b0794246f15fc6f6b
SHA25613fd68993426449bb61bbdbeddead464db7765db897a7787f5750c5d8028602e
SHA512926eb4795a995e8fa488c26e3a5447206cdf39c4119582a46e4510f5454a26380e652ca8b349a7715b1d654d0df245c2b4071c8ebead843ee42d13421926e635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c314b61942d4a2d7e5313c9086a42e79
SHA188a9a55ceceff4d4806ae217841f1f6bdfab6c28
SHA256a03aed9ad89200cbd7b5c8377fed3756cac0f43a44f8c18a7e57a297c49abfda
SHA5127e0223da131503e28a4c382f07e8f4ad3bec2d6a315f4a1754a3e95fd8dd13f2740e8a51863f171061c713fb2a402d13145711fc1750fbcf38ff4cdce41101f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9b67a2ef350552d5ff9cb357150cf5c
SHA145f4157907a4ec9a62d0d4462be231ab8256f951
SHA25680c9a096b67197e0f331fa9e15c92fc9a27dc363395b5baba0498ce24157d2a4
SHA512c8e3200c31f5a25efe638a52320243fc0b13c68aff87f6f8aba68ed7ced68ee03c6729786825f87669325163e670c8dbc4742065c1feb2b4a95e4067477b0725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527305ddfb74afa53951f8a5a6af81d2b
SHA1087d6e27902aea7bedc82e6a7478e31e4a212242
SHA256f24a762ad67ffa338af52234863f6f62cec7a9a47d68fb95d9958c38fcfad64f
SHA5128c243a67d703eb4f4b072a60d78b0cbb06edf0a1b869df810f5c8ace3dee1a248f98f2a0e1989d4d1a717f6045435aac7bb3d8bdb4c88a2d3bad2524d44980fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b5547ef64999c423317c85594aac998
SHA1d69bbdc35fdc009de8451143549c2257e34ef3c2
SHA2563a94b65b23570e7117ee93ae75cfbbe75f6fe2490b02d52bd7185c381754d9ea
SHA512a9054150cd60ba276ff491b020628d17f42a2f6be839feddb22faf9ec3edc17d2427f30fe6c3669a4e32b9424502ff3db0a3aaca6aaa82869a205efc821a47d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5247dcb2105e740311f97508ef01c1d92
SHA133ef1cbbe0828c6d2a89586f8b2056f977188403
SHA2560e430e167b92e6f75362d74ebad2d5bbe12d8334f385966c499943e61a91a826
SHA5124846c80899ef8af227e32051bcc9f707f0e7749eb3fdf0c96f911ef6bd17fce34ae6e93f8772e17c3dcf00a1c768260eb1aad561db066c4a0c665db7c1cf07e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6c317e749cdbab4e0a5aa1a7be73d67
SHA1091c840dc97c6ffe36ec7c404de709cc8e84de45
SHA2567d069f199abe981ec9e3631d1f2f4fd75f8287e5bee8544296f3b6dac4640393
SHA512f2a55e9239849f1e8b069ce120496fefc5402d6d3c9b1f5dea75a03e989aef09d8d58d0ebcddb9176fbba0c87e747c692c23658c9a0432de9bdf4d82326937a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfeeec109a6eb015fe496278e9d7e442
SHA1e16116e884ceafe393f7037a8863344a450e709b
SHA256bc8facb094f9434e121d79bec3a9c69a37fdf1217351384edfe38702e2809e4a
SHA512148f37da0e1da0a482262e6e864ecdcfcd4c4213d75ead21b89c8a29504cd13492591b240140490faa06f03dd6dfecf3801912367e1e23409456e878e8b9a9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56731979cc0987b9a3e04f0a8ed07ad44
SHA1d73e17e387be631951befc63fcece804feb5e9a2
SHA256541a7d6db2ad9e7f31f9971ac9c6863c21698af56bacd7fce6837d9ebb4982e4
SHA5120254ce005e849199254273854ef6e1d0b6b03dc3bb451ddd772775e28ec73ae3f6557e01d0ca5af4aeee2d38e9691f342d728c580f62c7d41878177b443aacb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6530ba726bc5ad26417bc6e225df760
SHA1b371c2cc52c8b9272d67342b66fded075f21af65
SHA2561d25cd3d16d719e364cd87bd53f283fdb81ae2eabfd150a127ae27e106e8406f
SHA5127972aa72170be3fb978873e3b61a1a4c633938dd91ad3362161e367a867d349b0d104223b27742dc0276fc21349041c1ff602264ac6fc3d37788f8c4ed020b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e4219d0a383a1b7bb809240f220d9f9
SHA1478339c25e645a71a4a830cde7de9bef6a11b23d
SHA256490f99c3f12e99e7dc3e7a247850053c5fd2a223858e6cab3a781927708c7d9e
SHA512c2627e57905b7fd00b88fdc488adbab3f87cfcee551088db8412945bb4d624e164527b62cad91e78d6193e058e96cdd2cec05a76e5f291fb2cc5fa3a389e2b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520d6e3cd45fc8e4a0a080e83e6a07239
SHA195b9362598bc7bafde0390e9d886ffac2b3fc060
SHA256563b228636e2aaef6dc27985811e88f884ee7de365fff22a5853788266d5169c
SHA51206ae7c3fb74beeb1c33424b0e1d68db12ff4f10be4fd272e84132d1b05f27043f6f31b411e9513fc31f2c59419a8b26db1bd953c6810abe5004f25b5b3dd3a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61e60b558b4af60aea0e80bde9982b9
SHA1c89a098faa4250f4059197982c38fe1dc52a31b5
SHA256991cdaf0e05184191ffce7c2dfc2cb1a16fe251e73efa54552279b79c75d6e61
SHA512180e56480d35ea82ed6bf8aab908529885c569d364e757471077d3393d70b9dcb1c877a8b0c64c86521ab5b453e3b48d0d1d0d54095bd23f3ee6b6f49eb0e8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2209d5075cdcafe0d67e24581f4019d
SHA16f91f1672792caa0b3b99083fbad061d443feb96
SHA256f79d9b82f5f96263355f253759b9af314bbf04c217412073d23d408fe1c669c4
SHA512142ed096f9d05e6440d7887e7e18eef4ea52bf7528ebebb9cee0bb02d4ccde0300802595e26719cb1a67b1eb708ecbdedb43feeb078281350cc118faa3d3fcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516b3141afbd42f2755b357af75b1a4b2
SHA195ee9692cda3e56f4d3f33d58ac1a340204b02a1
SHA25618509ba9340f00a21c8c8a127ad80f0977779c239f2e3ab5fefe4513b1d571df
SHA512d419d0bfbfa2230cbdb953b5e2c0d042ab20c87f44d8b3fda4af6c6efde34daf9108cc82202e866c31a045d359f7495bb787a10dbb917311df4444439ae58886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d30272a3aa2b627076fb7b1f60fee356
SHA1d6e264ca85a1d748162f89ef7367fbe01d281a73
SHA25607827178d791e875e4a0431667e9de4657f31f2944f7ca58a21212f57424026f
SHA512924124cc23c6f658729954ec77f2e085b8a6cd53cd9326166cbee70c1ac749ae0ad67057602f1414968f3738bd9027d02d5d6ab9cfe97b6f6a5484d723411aeb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a