Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
6578f39223cc8229414644ad90f907a9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6578f39223cc8229414644ad90f907a9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6578f39223cc8229414644ad90f907a9_JaffaCakes118.html
-
Size
21KB
-
MD5
6578f39223cc8229414644ad90f907a9
-
SHA1
2f56ff41987f6d61f1e1d2fe449a958a287f95ba
-
SHA256
3fb768ac1231f8739a3869f8de5aaf6f2246e6aa12a10aaafc36c169cf228dce
-
SHA512
4286bc9243fbbf48abe3432458882ce54b880bce69528b8ff6fa3f329139966457aebf364adea4a02a0779f3bff91b553a123a07bc4339edf5d47efd0b281ecf
-
SSDEEP
192:SCvm6Qcrs1UvRukIFQurMnFH7X88T25NI0xL8TJJLHI0xOLeNccAcYaidjNWpOyq:S0QqHujQuMFH7XXCLIJZIXL8AcejEVK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d6609205358c2498821df30921f7dd20000000002000000000010660000000100002000000082cedaa01c4a638f68c5ab0a2c9598202b884749c1da7b1e121aecd35e820eeb000000000e80000000020000200000005c90246d9f70aa903367b224821cbeeb764a0b680f31574fe94d4551407ac68e20000000a08aa0dc1df0ab3db4a548ae50c68d2bf0d03c1198fadd98924e17d541d1ea19400000005e0c0940acbba545bf7f39746a7005365f632e4ea3812c86a1aa277bdef15686b384fa37f433180e90a9925a435e39ef43186dcb78f0d4c1329afa5cf26e89c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d6609205358c2498821df30921f7dd2000000000200000000001066000000010000200000009356400972d1bb108fbab47cdc59cb4f692f8ba915ce1f27ec1ed59d3ad55c27000000000e8000000002000020000000471a13d97c8e170068123579466da5fd4902a27752094d42d608a2ab6e4eece690000000277c436e14d5d8effa6a181ef65986ab6e0b8b2d93313da269f4043dc45e521d3e846e45ab1e2f8e350bee38546fe44093c3ae19954d43c6cbf28f63d98d1e897e7f7714738fb8c8080e850eafc535698ab77efa965f09aace6b185e29a72f64ef3ca66e79497f94e8ad3dc9525880ca2039e42303140045d3a4f9225c0cf1579eed49e2a42d5d77446b70674db7d07c400000000c8dd3f7a3c83823413d11174783f782fa411f2dcbd76cd1c0858bec8cb76a3f0d751a6307df314f06629be8d789a06823ba8aa6f1b6b076f27379e48edb86c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{251504E1-17D8-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05ba9f9e4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2252 iexplore.exe 2252 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2252 wrote to memory of 1216 2252 iexplore.exe IEXPLORE.EXE PID 2252 wrote to memory of 1216 2252 iexplore.exe IEXPLORE.EXE PID 2252 wrote to memory of 1216 2252 iexplore.exe IEXPLORE.EXE PID 2252 wrote to memory of 1216 2252 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6578f39223cc8229414644ad90f907a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5970cc9794b949bfc6ec26c701f5861bb
SHA1b570c137d23f2e13871dcc89487edcdbce26bc94
SHA25686e8507db74d95672d5333e36dc7e50ee3364d994d898924a51a23b26e4d36f6
SHA512c0fff341fa47a04bc9df1bc60a24b3d281f23f38dd9ec241127efe295b2f6faca4ad0c8a82f81da572a70618d4f9f6f1220fc25ede94ae78c287165c0ebb3f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afe1203f151463fec0e688ed91c8e44d
SHA16e3b68fd1720362e556a57d8779209559868cc21
SHA256da058c1f3b66f832af65f4f93c13a6a25db2a2ab6d65dfde7b0f90ce725b07d3
SHA512915e3d32c86cd4e354b26a507023cc9b8bb8d8a97d5709aeb463c8ab344fbbadf89cd9cea923b4eea016a56199ba698bd27f27d6b637d2940b810fe1a2724e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd75bd7e39f3e7728cc85c648bf0f98
SHA1221e5a8aab14bea8da730ebf31af26baab10a827
SHA2565a15be7967921e9f5f20beeccdfe5d6de014ac29ac063e387d3f8a21acc2f09b
SHA512ecdc527185e5b96d4dccecd92100bc65f8936c9a4e7db6ccba89d89a7a4d8b40980e0a362c9452a00c3f4d9b004ed6755750c33ec461fcf8b70a6cbb666548f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1cdba1ef7135657bb28f392a3a018a
SHA1e9fb6441b1cb7faf52291393eeb77c9ebaa1c99b
SHA2567b115126936b37cde619d6207d5fb5a58d997a0cc410f1c1cd95ff6f76df535f
SHA512e66b3ca470346adea4aa4adbfb5527a0f8e02161270cfa550ec4884858859b2fde173e35ba0e2b163328b6dd45355af552b8c03061b9ff0c5e93935b9d2fb13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d9c27b115294146933ea082ae9f728
SHA1035ed6de8e38f24d007b3488b0130c7b9284b25a
SHA256a6f19c509e50566d4c1ff85024e720ee4ce33832959a32979aa6e792a7a8a789
SHA5120f3ddceeef64084f61eddf2ba569ca6e0febfd02897b688f93084c64edec97f204ba67ef85343e6dc7fbcb7594910de5b37aae21891fdb4e1de14a55db0a388f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6b583c8c6ec589a33de8727d6e12da
SHA1cce8d69d9b8a0a88c529633b94ea77302eb93fb6
SHA256cf1f8fcaef356c0b64ad4c7b881e8090c9732120eb2b7941777021d9161a5648
SHA512ea76eb1dfa66f976c64063d86f59baaad011a3b3db08f16e73a95762b803053da7e88a58d0f372e9949eac50f89eec2dca1677ccb74614687e01bc1a48067163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a0fa00349dce4ff7a5d858195082a1e
SHA1b4dc5672b720851a651ba6dff55becd79b9d328e
SHA256338b2adf2e7079876f621bee5ec3783940b7a8b172ae4d193b0f3eb693f85217
SHA5127b511f4dd0b4a57759194c940f158a363b72fbbd8eb8fca609d50def4154ea4ecd75385f9bd331e3141ebbee076b33fa87ca7b755a1ac47f926783f62d6a9304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66b192c921f9473927c6148a669647c
SHA1c5a20fbb0a71f837045911c9463e3f953f8376e7
SHA25624742e3b7cb68fe61f227cf1c05dd0147892cc59e44b5b006eaa4baf9399ccf3
SHA5128c4324353d997f4240e032286e5c9058fe2e8ac88ad187c4e879a5cc6048eac8e2ed5ac0a556cf4c1a06c02ed8d04d13d09831d4a2a09a3df7b93668014e3ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9f47947d70040ced5b1cf228c749a2f
SHA1d16ed93da5bb5f889d2222408390840b5beb6ac4
SHA2564e5828c3a0c040effa9962e3f9da986e7bfdedd4fa94c649edec84783a0f3413
SHA51244f526a94fa888b9e3f37f75d9a9f3700b44c2336c21d6f6a23dcaca197ecff39ee07223ef03f34c79b7e21b6f36239cd506d44b5d0560e27e9bef9f13558e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb7ff150cad73a3262f7182238eacb5
SHA10244b0e08cd27d0600cd5556f87fac1a98dd7f0b
SHA2561927e7cc84f332a634ceafcb06b709dd94a3328fecff2d2803df6727c4fd23c8
SHA51212bd6fc8d596d012a7ad52ef0c3adc9d9c0ca11fabf2e3e2ad738ddcda01a63760ddb1af5df1236b1e09eb23db305d5da3fa30e79a03f45d5cd85f44d681e4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781247d5e5c423cfa1d88ebbc827ac74
SHA1bd789f2c098375896fac70fbb2d80463e9eba40f
SHA256dc79d40672cae6dd80a61889480641e505f385deeda248a41ae96abae872153a
SHA512a9b43ae6f86ac3856366c99071f0e4682fa9df3a074dc331321cc6db1574b546f6f94610a3948b78b09a1bf11814db730d369d3f76730648dca129dd91959000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59184bb47a3925246d480545626ee6f7f
SHA1450d048af1c8312d2ec1e9b7ff8fee0902e30477
SHA25642da6f7194fb37a984c350c1db865976d6c608ab5a8561401dfe6041bcfc9092
SHA512de5d36ea1a27aef44718012bad66056f1e7179ba1a36081f8409f57b9fdf7719802e9216104ba72f26f145c09eac862f472c476f8374689f7e1858517f148ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595cbf736e24ff2672dd833bc10521286
SHA1881f33b4536f17bb1c2fd3b5696ae2c947a36cc1
SHA2564969d9f7ef3404e0b12699b31a3246ad8d382ebad9ed798adbb49f3a6debc7c8
SHA512b531ce384eb9edeea60c3b836e765046226304680aa6714b831e95e0988e1672dac84b8dbb461a72efa3e6656ca4de4f10385c79339a06d8a16e0bb9bb522b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5871e4a7e6e554ea0cdd746751bac62
SHA1fd0238cb99c40f8c4a4203440efbad9cd4e389d3
SHA2565aaf68fa4518cced1c08135766abb20f8cddbaa210c97baf3fcd918ef380d3c2
SHA5120c32180d40e98784b474aa7e71e19a8ef86ea6566b8cb1e2e94998b5981f2f239c82a73980c4fc9c3473e4dff3e42c7bdf1dbc95c76e9714a57e7a6525ba3435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb1f0ee052595b1c62d633a92f340cf
SHA176179cf44d23a4f5ae17babede308406dc7568bb
SHA256ed97fbf27542873918f74cf6c533e186c591856bb00ad21b0f338a83eb83aa89
SHA51249afce7008ba73b1d0a25e1bf87184e9d47456ad23694eef7c6b2c57a453fd3dda96fa8eedf93de818363bced8daff3951a320180be15d07ee66950059e3bd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5401516022fd582830ed231f8fe0a2024
SHA14d99af2ed32b1fc8188e36461f0b46d0c0fbb9ed
SHA256e4c8a8728e38df1df58e03472d1b33bb0c10eb11d65b2b50510a6e2f03476403
SHA5125041c82a6edd59fd0a2a954c4cae4ac4cc6c72bfbd9591755f2990747948ee7c6d23fe2086ca230d9aa4c49afa89738806ec35bd76a18e2a95e61c3ddf9c700a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55788f7fb1439585e51a483fe79f2f04a
SHA162139c6afae4aed5353f81734a8590367aa2f477
SHA256faa6572399186fb3088a270b1ec0bd8b9c1e0cd790138f21998056b0520b04b8
SHA51218807b652e985de35c190ba679d10f6e350dc63c923df01a99abafdf77d12465dc43f42dd6c565363cb30bf364d137557b77519b254e0440222607ad0b7ea2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51724b8943edde7bdbfd2178b98d71b48
SHA1e50234105e07e92f22d9c286b02c959662a7263f
SHA2560e0ffaaf5787b30caf16c1c74d064673ff36d82d56352491ac128575276db4fb
SHA512535fb59b32ddb4e8e4982d3444ac6e4bbacc97857e2e2da72222528730c54b9d97a4e9aad482f12173322076c814fcffb42672f01bfb7fd1566983a220272639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa62edc39f36530f7aee4f2c60f55e6
SHA16c20aede406349a9181febde621eaf780868c8d3
SHA25639e6ed0eb9ee8b8e67b72f85de04be9447e3992edaa6ea329812ab54964ec155
SHA512851afc7c376370dc9de0df0ed8085ab66f8a7083984ad3d0e53a46ef141b5826864527c25ca30378a31302a488e70a401816e1fd3ebb66d6f81fcd26d8200412
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a