Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
68bf1de0a13e2b6137b1b34e7be83242_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68bf1de0a13e2b6137b1b34e7be83242_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68bf1de0a13e2b6137b1b34e7be83242_JaffaCakes118.html
-
Size
30KB
-
MD5
68bf1de0a13e2b6137b1b34e7be83242
-
SHA1
8ae763e529c99127a56045a10402ed56f6e7129b
-
SHA256
4fe419393d992fa1f6a9d0df4589f62171868ec0f80e9713f5b3c70db6ecde54
-
SHA512
161a7a91cb5fef64e338d91853ea86bb55a4791c47eea524b1bfe9631cbbf4b21fcda1ff149b6bc68711732a573ccf5da146280e411daf8ccbbd7615fb939ff8
-
SSDEEP
768:0oVAvgJT8impgxJ1QbQ+iwwGfi4nI/8AY7Fgt51y8F1j6JFKqHnGG70r1nYcJfil:0oVAvgJT8rixJGbQ+iwLIHIEQ7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB3B23F1-1884-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b1adfd5ea177ff0e06d253234039def5f11e3f7956fc16f6d2e616861ddc671e000000000e8000000002000020000000f994be034db528cb2aa970e22935f38d20910f0227c4289b95b9f7ae09952c5620000000c30c35798f3888c1adecc9e631d4d2da77f7684a73987553807eff6c60935aa840000000a2a060ed7826f656fc526e8b96ed3f665d37c97730a11257ffa53a2cfb9514f70cf18cdd0604e8e663edbd7fed123633bfa189362cd6ba102193e6fe978432f9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4060bcbf91acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000089baa8fc397c06016472606fcc02d04f8326d06c4eb36db8b837838e3c542dfc000000000e8000000002000020000000cfa4a0cb7cb242a06daf76961680da6a7fc076322e552e760dcdffafd50c39fa9000000041e8f09847944aa84d27932a67a9851cabfd082e3525ec828a0842af8c0cdcccc4b66e8641eff880ba96b10a2072401ea54ce4b598ae48b99557e011d305993ee21b90b2bea5835b800a642629d26d485b9b4b0d965e070b9d7acf9bb549e81aa7f1ea329846cb142ae0688f7f52137bcf10ae3f00cdf874076299f95c8f08fc12971b7ec627e3b37c913e134d624e58400000007d7f3f067951ec20cb24fd09b72fc6bb6a8a0ce1bc8f0a2eae056293e30dfc2c7193e27a6e68e7783c5ec8f8840462ee21160514938879c5191d56f6c98e2e96 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1488 iexplore.exe 1488 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1488 wrote to memory of 2068 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 2068 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 2068 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 2068 1488 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68bf1de0a13e2b6137b1b34e7be83242_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190e4344926f39ead4e20b5f41453aed
SHA1bf0c76d9a0fa88ec95120460f31140fcf74b2243
SHA256c638bfb7e890525f250cb43b490b37fcc128faf06268cabf92f12c48b5a1db3e
SHA5123af4735ced6b7cf8a5100544c3b48f401e152fc2e870fd1ce2e0a3fd18885b8499f0e7429d7e5e64f2683700a745c38bec0a7e1128903c8cbae0a3d8052e9536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517b9083cd5e314cf2a4ea57f24ff2768
SHA1b7194296ebe97a4bf111bc831b88496f152cbfc3
SHA25675af443454bc89df2f08039d130e9b062fad2a6f83b3befe43500d943b21ba2a
SHA512baa24166d8a239e5159c30e7bf99bbf587fe827b07e8a8e61de2fbaaf9977d484f6aa43b1bdbb235ca6a424cbb97a7e7264a2b8e1fd91be19e8d1f416fc34024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504618ce710bb2ca8ed630d63939b0da8
SHA177b927fe3ec51be2f96abf4e5f85b2776fd17374
SHA2569edcef348822690cb4caf7bd49cf0f67c3419abce520f2a5eb2c7144d21de794
SHA5124868fb1cd69b792265c82e34996a7dcfedacaa07e3b720d44a2cbda310edc1ee659b90c01b9ca6fc904fe70f87fb6e52ef3e709b04556193125e2786d4a2536c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe40bf0a908832f6f6ad78c8441bff43
SHA114170dc08c6db19cb5ee305867eb765cee4fda61
SHA256ad5f683d2f3ef9cec5a99e532c9d33c8245e49860475035022838c9e08cffbf2
SHA512985d51c6203dd7d5c73e1ac731282a2e570b1d45eba532bff0f19571f431a9d1c6905ae29a57263a382ec8c4ef749db2006ccecc73ce0d51ea042feca058279b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e82018ca45301cf3663d037d7495af
SHA19de4feeb7b3290392228eeffc98c08b131a5d3cf
SHA256692549f0552b6efcf9fc3f70fc079c19a51bb8a788b8e508556a11232cca63a4
SHA5120c7c555d443f0f11de71f1b5f3bc8262e19e752b816b16268a08ceb55334ea4942987bb6e175f7b7ebf83cc4e9765ea04fbf817f105c83f03fc72d1ed52fbeb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a3798688f5a63341fc99b552998da0
SHA1b50b2853a4325aa9f43ac3c258fe2823a8098959
SHA256ac2c77d2e9f537c34e31cb4a1bbce2ed181017715ea5b912fa701cf3cd23fbb3
SHA5122b82f63f408a004608d098250442fcbb97b8fb1d58106d9661421d18709a8f66420b19bece49343d6da67f63abc86e440be9875503481f132f2f6cf4ffc53204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bac017661c3f7a6037cd223d3bc4367
SHA1f18b1693b7dde8f55efe691dd0c639e5fd06bc92
SHA2560336540078265487508f1d42f2c3bec0517e188df38717c969d73e3e28f69408
SHA5127c060cc2e347a36d9435fc664097871507943576f93f77058cf62dbb9c2ec2867fb179f0ea58c29a83312324e75c07b05ee587618e4915b16ca9b26a9ac79607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a45dbdc2e0f2a5fbf7c14657c269e8f
SHA18f769cfa0e560b21c634f430f7cc995656a0ac25
SHA256c6746cd633915f83c8b6af4f9f8bccc58ce1a3c5b687b256134fbd09b8af91cc
SHA512a0b8ae590162b71deefee46b3bf83af497819a152f419f743aaa35f942a74b1771548674cda9201012f5abe8073ca55fc00fe9e9169603b1f7457f1b89a739b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222ff31d0b29592e3b9b5d5132b127ad
SHA1744152083b29a6fe99fe998408a4b2596a261e13
SHA256bf2b6649f088318e441ebde8a6480a0a3b7d53020fe4dd729b07233e7759543f
SHA51282138e2f25ca95b966058e6e097578c7f0d3a581b517e4c139042a43eac9b978c36869cf24721cdd1ca4a45e8ba9d7acd4a9257d75f7c4d4bc3efbaf62b677f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9093cb8f5e7cc270d9ef0cb686c13d7
SHA1190dcc0f21a786a7cee09c7fe6d4b903573dae78
SHA256e4af0b7b775b52ee32be21df818d1e38b5eb7d524b96957baa6b2b8b0a29b5b6
SHA512f5f9eb6e47bf0bfe1f1a2a65c434fcc57761bdb125ead2d1880e6a0ad5acb73c4d22c7bd5a9c329c1a51545a9d929f847ba215c1ba063513816648c53af584cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a14a794e509165f9b9d77ef86e772c9
SHA174926614e94c13bc1ea854b7252a6e85f13752b1
SHA256b49e6aca399813485a48a25176805be8a9d5c8b6a599bb3a9d30e1e3467bf306
SHA5129e908a6c2039fdb2b5f38b11b5c0f2dda6c67eb156c1f4327431654a980643d5d5941e9f50c05de50f84340bd454fc5ed8d43fe9797fc69b956bbf22b55c6334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc025750172879cfaac5b152401ebfa9
SHA1d1eb3696ef80d4556abda8e6501820c0fec0f1c2
SHA2566982f2787caa671badaa45f956b36eebdceffb893d00861408767636ff0f8563
SHA51262672ea6bbde2e32844a0cbd7b3ccfe84d38c62c8b84348d40c7ee6c91a4a8e6eb039d986beebec88c9ac0c3cf487fb679a6e84a66567641dc4c61fe51df4581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f85494c3eb21706434fd81e71a05664
SHA1c0d2ca9aed4018c656ce4669c20bd357aa6b823f
SHA256d4f784deb69a65ec154f96f8858e92e2c300f097c5f8c42ce87b5e2d8688802d
SHA512921a676d7735733bb00756e59f44b5906231b95d4aaf493b1cf9e0715d5ca6228564d3a40b45bd3f2a1055adbf750879dffde22414fb05a6c3292b581029c13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511deee38470b18119f8b52a84e4f8946
SHA1b9c27d9ae8a4a4b6240851275932fe69690a3c22
SHA2563945a2ce567b84e1636bb38e40be78ad838f531fb6f25bbc90e628a7fc152c89
SHA5123db58b4b13b318b494057356dedf2e3b485e2d718965f1846dc386cdd45f01f1513b0d0570a7671e3a219042f20d93ff719c3912058347f32c2e4bb421992135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598133330c61d9409a67bb51cda304c14
SHA16d2c86d216581f4e4689e85fe4270b4a02cc8616
SHA25670dc328a7e99dea8905b8a298f012f43b7c9ba61d83856e2a0e64ed0d5fcfbc5
SHA51204e093df92f5f345fccfc150e220e54605ba2aa5ecf698d7c520f3febf2679fbc1043faceb4379c2cac686ff939b3b9366819e26e94cbacf1b89930fe269ab0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c25a5e6c9d07b57c75eefc2357736b
SHA18a076856bf7cb9dc147313104d3456e45f89e219
SHA256852c3900b9a405c305d10bb8b90938759fec2cf8bc6a92713e1d3c3b5a84bf16
SHA512e4739d35d1c63a595eb9d6f3b885e8f83a519dde7c4aae10684e50f1fb6a54a37ea5126aa35e8f567537ac833002855687eb1adbaae76fd994e1a1b157040821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516044b6661e51f297d5a0e36ee143015
SHA10d0ee8a7720373b8033225dd02dd167c6cd2d199
SHA256d29dbcaf7d04d285c36ea44f920a301e897276f05c6f85b0da714b5929425984
SHA51270c796d282a21956f4149c999877c843a1d7ece9a088d5a31845b6192c8631d4b0fac7b3c86eb1584635446fb20b0445785e6ee1a036591967bd12eeac19759d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc226d3340fecf1e7f80bfd8aab578ec
SHA1d18cecdadb59fc89f84d7f8cbae5c4aaff4a12a7
SHA25675084e6cb690404bc3656b577fc7906ae11652ba59ce94ac0fdcd479efea33f8
SHA51276b726388db410b09a44e98bfd84c5b7f6329ff06de6d596963fcb446a02b1b7b8633f2cc1e1e67046d76d83a5584712f67d42a50c07fe3d1148004defed0bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541379829430d342198d381b87daceb1d
SHA15ca8cf3b51aef436a55c1fd35a3da33a40d53007
SHA256c134eb76f2d8eb66805d2d3ffae1588354f9fc31f32ab9fb1a3fdabc71cc2208
SHA512eac36739b043619b37e90bc7900c170ada3289119a484fd634e5ab5ab0f8e40c8ca9789a550db048a3f7ee057e9019c92c204107a4b000d2a6ba9b13497d9b4a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a