Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
65b7e7bdf21a0f84c4e37d7ebbf8a09c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65b7e7bdf21a0f84c4e37d7ebbf8a09c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65b7e7bdf21a0f84c4e37d7ebbf8a09c_JaffaCakes118.html
-
Size
14KB
-
MD5
65b7e7bdf21a0f84c4e37d7ebbf8a09c
-
SHA1
1d1bf16c2e6df9ba04350dbcbab5a8072c0523e5
-
SHA256
cedba54d0ff80e8ec738419b3c9eb8ae0b4211ccc124b260e7d7d349632f2ca4
-
SHA512
3562abb6105c0a0213035fe3c67eee3a303b3f1bcc8d54521cd2aad358acd9c511cd84e71de5498d33f2a0478c53864cadc41c6fd9752b8a4d910f7bcce7477a
-
SSDEEP
192:/MAPT3eLOTciZziuoyCwBXgVZ1Rr//vgPd/Hrjp0/eq00X3Uufb49bxvDc2Ke+lk:EK3/TpiuoyCwB+b2PrF0/ezWUDoe+lp2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A776BF1-17E4-11EF-9667-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000129965235f3b9a439eca6d8bb1dbfa7e00000000020000000000106600000001000020000000f28c3552a73d62a0bc1d5a26fd4dbd6a2173620c6ad2b6f554e402857cf4e069000000000e8000000002000020000000f5f1bbfc62a435357c9943ec06e74d0fdd801fa95d77d809880cb60070cc0d2b200000006492057c44bd7c369b7453fa775fe22e1706ab1bdac93e25781ba0d8a03e7b5f4000000080a5802f7853edb344de193cc6de108ffc0adf8db4aad1a473746cf2e1c5ac622daf339b70116e760519979e5b1696b39f467de68fb71547eda5aa90f5c65bc9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cc0712f1abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2772 iexplore.exe 2772 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2772 wrote to memory of 1616 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 1616 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 1616 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 1616 2772 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b7e7bdf21a0f84c4e37d7ebbf8a09c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7f00f6b91dcb53153524e6ddc87b04d
SHA14d4957f18c935555aae9dddc0a9cea9a933c2ac5
SHA2567fda3f9552ddc534e5a067c9242914102dc086d078ce8dbdff23c72b5247cf91
SHA5126d64f1d55076a378ea3b00e0a843c99787481787ff8d11dc225f4fb736f137725df572caa42e1a818910feb428d4c1f4a2e0b04bcf219ab69bd0a51c68ca840c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597ddd9610e7bb97477c61350078d6e60
SHA1fc0fdf310ea1b04915324070557ff41578fc6071
SHA25675513def39acf49da07bfc7dd080d00f79ba1a127a3c6854df1dc829059c11c2
SHA5123bee094c9dfbe95af1944372bed025916ff2ef81584662e45aac0840f2f091f36190d7fb1d8ce9e07ac826db6653898d9d45e8b47288683801bbf187bfc436c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ac3ec58d794b0d7d431fb8134fd9734
SHA1749976ad58912cd08e932dc308a2385fb89bf6cc
SHA2562d6ebff4cbc6eb85ec55347030fee694b1221f3febf24b67618c96199a1d4596
SHA512f75562c7226e1ca75c4b3043644bd73e4a597cc478a0319e0c588fd215f81a2c37efaabab7890c29185b18d065aec5d463550a7af4993d8870111a8f05c7819d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ca0634eb15afb92c57053408fba7fbc
SHA1f86037d21aa44300abece719b9840a7137d274f5
SHA256eaf4d84ae5832c13db0aa58e86201bc61accea63a9d53710ec7e57fb317e4792
SHA512bafb7d99be322c36b95f2aa4492dcc3b908b3091e739537b628479312ea8a76fa63f422ee931ead904bcd0315845a8dfa6f9243a1e0d9955a51fb0ddb401af93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569ecd957a1b578a7d7d422a66962f20b
SHA15202af6827b72d9a72ac7db6d8040cce1f96eb66
SHA256808113d6860e27839e011a275ccb350938564b31a4a77d4e16228d847fa3b9b8
SHA512bc44f603fe358310fe4b985eb0a620b5fad3c0c3a7ab61adf9f5e23a68ff21186fcc1a121e108e04ba33648625b3ae1158e17af9aefd12c2d1d88fe2754427b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb674c432178120937c6e726a88f1d0c
SHA1445a4e5d9f8d473ff3123f14fcb0e9a9b77f8f76
SHA256c7cfe1c50c3f82e85541dbf321f2f43b1beda5adf0895647c2d1602b305a5294
SHA51205d9c271404241870f7e5f5a8b1fbd93f4004fcd3ef0f959f03731a2d08814143ae8bee8b3c84a766034df311887c45aefbd122f2dbebdc2d6e3556d28349bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb037d5aff71a0fd3db161f31f26bf52
SHA18450137ad931703117c33ac75bfd0e5e7657d3bf
SHA25624bd3ff06a26d6317e5b0cc74964abaf68d72e852369dd4b28c08ff1a5d95645
SHA5128dc314d9166b46f293162b5b6ad826a2568f67bd5791f9f084900539e8160132eb9e611cb9da09f246799f8b86e5803bfc16b2bbf0558d205fc435e2fb0f66e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ddc92165f412a35806d06ee2636c2f7
SHA15f7d60b05a44dd60fa543eb23d58832ed1f444f5
SHA256c961a3af9c80f38fcd297255d8b0074ddfdd69fe90ae3ce061f15ad1060ad291
SHA512caa8cebc18565293ec222a01e4240dc85744e15d6a1a6e43aac69d111c0ba4126656ca413ecc4cd796b39e8e379fa0593223f45a8310d6cd7fcc550b3bd7639d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fae8190eb912662a5b771a9c27f4c989
SHA1fa0404745808a9892cc366b93303c0d24ca94b21
SHA2561943c326953a1e8bdccbd40850c83a7b89f8a0c9a80db9143f60384a70f2908f
SHA512a425e1373dae26c0afe40786ffa97d6b4cab810bbba52ef34d0be6d5adf5e0a0ca880adb30c96582399efb229867fdcaddbd30a3e4d871f134a856205b4469dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5992b3659107d36e5940b9a53abf816ab
SHA1cf57bcc111443ea11d56ddfb7c1299f04ea3c206
SHA256d178fffa1031187a02cbfc341f56d27e7cf80e812e83f437d3537aab25c960c6
SHA5128c4ae9e4715cbf9d70e92b1adf6807263019bd4d4852b2d057e54d594ea83dd1961c411cc286d3848066eea38ca82dbd57128bb93a86ca7cd35910663e1baf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e80c78b7a0859fa5f8b6a9f3c8b2e5d
SHA11ed94731c41ca8f98f094c0c0def59a79f5fdd4c
SHA2563eb69d72e5fa9474ff9b1ee666668b637d2f00c3881b0a63bc0b50d1ba06675a
SHA5129eac66c0fc573632a4eda23e30a0d5575cc48b2e063c0a8a8bc861360442b665aa96a3c93532126221db53f5cc1b5c193485f533af44653afb94bede6e2924b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a0596b1b0e833ef48713e3d98308f48
SHA1a1a6d6f841bd1838337178b7c02b7ea3c613ce92
SHA25622bd02d9cec61dfc9cdb331466275fab9375750fd7f324308dc773c8907de02c
SHA512410a7c2723e62eae7c221829ac410c49c4dd77bf2d875679a798126c4de92ef2fab05477da8019436637d16d826836e16d08a453b28047a79b34652f5f24bb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54086fd56c3d0c026621056a4d4e5e8f2
SHA1985a866e02862d78603de91af698f59b741d8abd
SHA2563ce587b964b6ee1b0cc7f8ea00d9d68dc41809ba9839a939b50b92777644c75c
SHA512f4293a3bc583c1c17a641dc011982b69097cf2d2f5d160353055e653670413ff87440da4207c85a67723e920308b92a079be21a8ebb526097a13747980ce2196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513f7ef50942df18e5082dbea0f34b780
SHA1667e587c6cc3d8085a1d58aeeec1ef8b8c7c346d
SHA2565eb2bbe2d13002e1a0de3bf33bfa3d79e109b887789d70d305bd9e07c74aa09e
SHA512840f8c288917b3f6eb97c0e897e5fad9eaed40b8bee11fe627ca0e546b908524bf09992abb63d06e7b14f4f75cf22f0b5e1bf5a16abff22b946ce936790c2903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8433dd8944aaa12fb4b717e89023174
SHA119cfe3a75912feafb06eae4c12d7e080bdc08d35
SHA2560e55190bdff10ce0aede211c219dd16315d2bff265331ee19cd56b3966617661
SHA51267b3c8680f794528573868e6a3c4b695bb41812d053fc5e3a345a41a3eb1a293f3256dac9a77eb359fca9112c0fca411ab2725a3ecf4d90a087f312b17d8cf92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53dbd789d7d192ae065212b77be2f674e
SHA1972932f6f05a25522de9f32c4c23e568c734fb00
SHA256d6d94a60e531ccc5fbf9365bde53ca1cafd715802a0d7b00141b55cd86ccd382
SHA5126d16674532352d5bf505fc8647765adf650ab72b93b9a68662dd1c34205e535f11a61453572ea4f932e6be5a34c6413c9b0a38738c50ab77cf940885396bbff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c72aafce22066e12dc517e60a04ca32
SHA16f388f404d2e2521010d96326ee24eb7d4dd0e8d
SHA256be75201fee75bd21665857e1f05e1bd076384797c6fb12656bf7ac0670366375
SHA5128e6bb8e04e76744bc5abc70b425148b348df9adabaf29c1db532e70419993e3675a5dbbfab9350c372f8c4315a11142d5900a4f2cc458a1311b48cd76be98119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a13d08f4d067de19391cfb9c34d0a4b2
SHA121fede5a42f02834326a8b662326110ced61a340
SHA256a737369dac0d26748142b5dfa9e3e559fd19568a7e4f1567fb447ecaf2fea439
SHA512fdc25029fff24bda15d27dbb2bece85419f54ffa5ec21eaa6a9096fcc7e3be6891f267e2aec7feb5df8d204b9a0e3e4aa531af5d8099c2aa49c01516c4288522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52bce4aa7c89d16bbb3a4d83342f4c0df
SHA186416dd1860d6b96ff0e57995dfe161ace0314ef
SHA25641e63c711d5543a027f5002be3989d26cca4a4bc9714513fe7a83b13ed16f66e
SHA51234debcaf1237e2fb14f0c26120563958427aeafc20855ea3a45fa110ce3fb24dad1d9e8fbc92acb3bfd484f1a73363fe1c99f6ba79090f6b5942063627518296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5134dfa20bc3bfec59b1d67c52dca7cfb
SHA10888c81632e42d42301f7c30ea2db98863302ec7
SHA256921c087b4d8da27d576b471167ad994e13ef47622a3b4452a7a71877974b9a93
SHA512244b23f036ae8cd9b3e005a2399b619c34e58a93c87857627bce2bfe5421b38a97071a3038b1ba41c957f354071cfb4099d89a337d5a669e07bc786ba89a66f9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a