Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
659bc8dfe3683f0810b17253b48f6597_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
659bc8dfe3683f0810b17253b48f6597_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
659bc8dfe3683f0810b17253b48f6597_JaffaCakes118.html
-
Size
66KB
-
MD5
659bc8dfe3683f0810b17253b48f6597
-
SHA1
defb0774ae529b5a9f7fc294d90e43e4f6a25617
-
SHA256
dde15a7b71e103d26ee9e242b22236be7638d8f8ede36cac7dada16ff102312a
-
SHA512
f96a819d60e4fcb962588033b08e57169c67ecc85f74a0a71dedc01ffa82b9934faffb1a2a4c63eb4cc44b89bbf9dc9f3a85bd186441c82c02c32100f9aac6bf
-
SSDEEP
768:JixgcM0St8tN99OIsr4bJjbbW8TWxb1oTyrhCZkoTnMdtbBnfBgN8/oycc8QFVGu:Jh+jnhTugec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504943" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d9ce89ebabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000978ef6f7838cef81e865515ae1d1ad9df7f71821b11821aff28a982345a1a7dc000000000e800000000200002000000097dd77f8aa4deb7cfe683a55d0a644ca8d0670aa0369858ba7ab86c52906872390000000b63a71475ce2716ae38ef6aff77eac85c46ca58999feafac3075959db9b9edbc6c5efb471708fcef8b7d69a1596b9115b039e6f5ceaef0d5ff02452cbebb44a80919b1e8b98ac1cc87db2794f9abf5a67cafe6af1fe621fd1768ef4057c0ec69f2d6e5a8da05d8b76c5a6b52badf1453f746640b6ceef1af8083f3f7dc19cda50f5e3220cd8892b8aa062b97fb21f82c400000000a386eb09f1e8b6bea3570aef5fb827a3efa02755c2128806541332f60c65e121dbe4b1d8b9435abb79c4711d5b47e4f03cd2873c416603c0c7a6e4aa37d8e3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5424361-17DE-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c0c4c48e881b3d71018e63fe6789bf87c7f8df54a75321701fa57575334ef7bf000000000e8000000002000020000000108693e5e8f42f72f58782c39d57a7d4ff87f02fa82663f4d7435c5278d9ebd720000000e256e7f906c83efbdda5f7b637db72c99970845be58fc316c81d61ea05b3d240400000007209f57ea6c5121f05fa58027375d139abf00a1fb6b7024780df22bf644d5aa810a88fb8fcd801bd6d5e2b0fe5a6c6383003f2a65651b162663a7216079d7d8e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1672 iexplore.exe 1672 iexplore.exe 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1672 wrote to memory of 1344 1672 iexplore.exe IEXPLORE.EXE PID 1672 wrote to memory of 1344 1672 iexplore.exe IEXPLORE.EXE PID 1672 wrote to memory of 1344 1672 iexplore.exe IEXPLORE.EXE PID 1672 wrote to memory of 1344 1672 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659bc8dfe3683f0810b17253b48f6597_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a33d63dbf531b5ae60f3e5a7247449
SHA109cb387171e620dba24fb8138f2817159a014518
SHA256a653c76eb78af2910c02ff307045b86100b67066953f19d47862eafefa275a18
SHA5123b5fc3a18507035302c1781faedf71afbe310a27cd22fc65b90ea5ade6b2ac598153afd66b32d31eb18237a5f6be50055be21aff4d7c6e4886f6f94209381744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5508d821b8f11995c1a2aff869c06dde8
SHA1c0cd1bad7f7c514b679962224c16b7b4be00c582
SHA2567a4876dd4318b09fd187250563460ba6e26f287daf4f36d50028b0f819682fff
SHA5122f77a2a4003175e652f865e3a5aed13bcc625b72ebd24708cdcb462226f367f5d8cd54bee7c68dea637ccc229af07143e0e2634ee69b26d8709537dea353e90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f9b4e024e66494685cf86728faff9f2
SHA102e860b5488d9e03610b9aa56a1c2554d5fe5b84
SHA256ee575630c433694abbd84800bc4892a53c797176dec81fb8f41bc68e48a79bf2
SHA5120e4211390f783fc96fc2169780630469394e4d88a90ca2e15afed6b7235e3a9b61898f7ebab31b45425aee47cd8a69ccb90a234890f42aec13bc7479ecaa4ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce39be707ab8a2dc71a91e1211c8333
SHA18d55f744a6f663604fd6bce61b33287dd6bf9baa
SHA2568c7bddbd8f516c0fc04a99405bc0a8a798e4b507c9da4654bf430aa4dcf236d4
SHA5121b3d4210f6666228ea5229b716c56bccc4284f8773023a4113c760bb680a182c06a5900a2ba0806dab17d8c43ef3b3d87031a4a01c7411550fa31fd3fdc2002b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa96c7b5e822be659e2713c40966ea7b
SHA194801ae7b698ceba7b25867c2fa22f37d1288143
SHA256a43f40e73c0e079ef61648588bb0f80a99c40ff3c56bd493f1f9d8acee91de64
SHA5125f592f39113dd721029aafd7c4d31e422b28332bd2b56b95fb78c00e42ec39999a046e50e2568a12f4a0ac81d4693e447eff253deaf8d74871718b7e05f90f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d18dd2690f6361a3ba4090d3256a4756
SHA163dfb96339c4aa623d5c13ce21b021d32404544c
SHA2563506435a105894437470947b53f7a20a70c8849ceb3a70739fa85ab801db286b
SHA512bd5885eb0a70b14c4fe04566a8ba057eec800c7208d845fba76b60593c9bd910749e073eb3d91b43013f74918772eed022c87e47e9ceb1f16eb0e6750482e41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561781bbb9e4a8cf55f24efc922a26979
SHA134b44e2a6e6556e82ae682e80f106df127bcfef4
SHA25670ade07e898bc34fc2224c4f4dcfd9a1e114b15d2375bd4e37c6c7d78923b4d5
SHA5123f4574cdd8f69fccd338f4d871f133652de2db51b60b25cfc5214b5f629d143a36ada113b0d37b546429ad9302f0dc8bce9b532bd7f0048cbcad719ff716036f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1b6c8950818ddcf93ecf7d198b79a5
SHA1ca6162f9642db9c2b20e66a88919824c6e286aaf
SHA256cd7c7ab800fbdef7e3ea9999bc592b3e1e2c026954f75c06bbb35a3d4bc06f40
SHA512f1adaabcdc804c66e6d0bfbe3a204948f8396d3510d9bfb73817aaae1d8f3205c8efa1f7df3708d6b32c0522b3325b7bd61260cf305a2cf674ffd074573c3e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58378402bd6f66b35f91a49eb3389825f
SHA14ff93b79361b05b04d436a1c195a1da1840b89d9
SHA256944c6c655be686578f8565b7bc9f04231d5cca348a4bb1dce0f75c23abab61fb
SHA512b022c8b917931c04dffcc7a2d1e0d4ef64934f1267642190f0ff7b09a5ead7bcc3abc38743b3ee704b04d74a93921e11e6a866538eef6a6845ffe8d5d159dd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87ac89c3d9ac26dc106bd4200fd0733
SHA1bda9f710abc04290367cc8e1e2124a60dc230781
SHA25697a8ece55244a167dc1e3dc0b6fdbff445fe0c5a2fcbe305ebaaea8450c3dba8
SHA512c0e814d92f4c9fdf07f8aa1919c502dc181b6322eae4e764f56250e1a276f84b5525429a8de0378c3a3bcd2a2a7aa7ebacf7fff0a6fb2eb4481ff963ac7f3bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d384397c9f92b47fb9238a2460282c
SHA1cd6b5605cf217f5a4098099050a6dafb42b69686
SHA2565ac2280005b64170164ebf2d0014d884e714ce8b39cb46d756e31be41682ef35
SHA5122413f65e73b1453b21e91d3495190533df0634d3cc25081de91e1cda1948ad7a6bc1ab6b0819201c4ad4fda521dcd5557e2de147db143d6b4f76618434477034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513bc8203fc8bf9ecf4c568d7b474eecc
SHA1fc5dd940c82c29019d33cd3496cb1ded97254495
SHA25674a6efe6e91e2b75470581382a493c21ecf530e4c94722e5de39ec32666f6178
SHA5129afa202e43a07d8db7d95229ffd334af2129c80adf008f5564b4f982000d5f9ab5a7ddff4e426edd3ebee97e9bdbd796aa90e8530c65a1d8700573ba6ec9188e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52225d501eddbd6fb332fca5588597dec
SHA188022d6ba62dbc3f5e33ac15dc4bdbf4b376c25c
SHA2564cc253c21b0031b138c88b15bde1c671a886cf16a97d6c01950211599268639a
SHA5123856c9544781938fdce2286a8496686385751407a88889783688c5548970a3aa87b735cf4baba609f841be99c5a6e5771247ee704b25b313a7c85002ae18fa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59282d53edac7cdb20b5a644a7d7cb066
SHA1133378023c63185b068429370c1ddf769d2baa77
SHA2562464db39a42400d3ceb50945e07a172155db98d780b9e5fc402b555af4135f76
SHA5125e9dc0a27df92ce4805b5813e1ffdb8486ff2bd2e9470f0e905f93708a63ef88341cc5df55e704a9c2ff2c2a31cacfc32a2b762335ca7854e1f38c3929264cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887f93f61e08227c696ab4dc0c35d0cc
SHA10f0637974b2990c3e093182339852e0c772a996e
SHA2568ccb7d0446cfc398ade73469d8d4e4a00440cb178246febba1442b6fbb77384c
SHA512423b6bebf50526b98e63ea660142709b1d4b2e8355cc316492d78fc34a3c949e7fbfee728cb4bb7654a3029abbdf19a6fe8d81f19a5d8241578c74b6cc9a7fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a750f4d0a7ed5f179eebfc7de64c568d
SHA1c268ab4f9e5a2e2a6b5249e7222117f676a28200
SHA2560d138df21787c90d86c47b8049e3c7e947b6c057cd6c788224a05b6194e46d9c
SHA512b5b7099389f76ba5f9af8ff0c4afc347680ef151ef4cb2b3f2fa1a048637c11baec1fd137f5e4cdf7ac97a090f97c70ded8c6af212f62ff60c322aeef201d9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535630c05ad09e9014d60e0aba4987a9f
SHA1fdf36819f777c0c1d94f347fe05953dd4687b32f
SHA256fefb540e561703dd2fad42ace727e483c572bb791ec5340f58a6ddb228ca9faa
SHA5128c7a60301c47d4dc17c7545e7cbb6a475528b59418229b66f96fb68592aac0b307f95ff754d373fd83b9439da6d0e9c5cd4a7f8bef02c71f46b9dd5c4fb60f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8b00ff1e5fc94a0d425ffb530960da
SHA104b2b9fc7a4efe1e6e5da3fd0356bd0b6d84071d
SHA2564bf36762249b7c666e4d86ecf9b3f7a5ec1da596134df1b32d01d91fb10ab8bc
SHA512df3a302307ebad84cc6d2913da83bdff14a50dde3d30b009e1f9ee8d6bda8aaf853f3365476b2b802af75d1c454c77e91bde1781b9ca5f89d9c9d9f12c32bfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d59a5a8bab4b40c92aa0e66e84df862
SHA164e41aae2b6f25bee78371233c680a2bb78dee3c
SHA2565feac742bc4da443674c478c670a546a3a508af88c1d82d7efbd051ba412bab5
SHA512a991f5fc8e2af2bdfb32acf9b84bd57ee79529f05409fb661df588063c4a569b411d5b731afea4d63e9cb0ee3da8ad036c3724870c77733bc09665f1f8362ac9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a