Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
65c65836ab0c9bb44b82af8021109903_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65c65836ab0c9bb44b82af8021109903_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c65836ab0c9bb44b82af8021109903_JaffaCakes118.html
-
Size
751B
-
MD5
65c65836ab0c9bb44b82af8021109903
-
SHA1
cf47024d0f108f482b44933fbb2eb61c7eb34dd9
-
SHA256
d3df7ea86c9f7b91cec30dd07612dd1596d56e9da408e62d6530a6d7ec40d2e3
-
SHA512
83823a7403fac6e883fb57ecde9e714e6ae6c1211f159370764ca9fad27c885796a38724fa5f062c4c05ce99bd542ea439ffaf5743b1430075091e9f5483a3bc
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{094A0991-17E7-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94a8deddaa8734aab53bc83625e2c9c00000000020000000000106600000001000020000000b9a18191ee93935a95fa5da7c6bc4c004c7e6fc2b8c6f30fa056cdc6d0965617000000000e80000000020000200000007203959143ae78db53d9929dc40d8940c4a860a1c3af4e165ac031aabe8b4d9f9000000013f61fc15f1bffbb22f12e0dc36c462961fcc8fce5df0de5f43c5660aadac762f2c418f210103c4d9dd2d33f966c6b5e298f6c1bc38b33b7b004521be52ad90e0b71d14d9867b4d3b05fba756680b27b72f281a465960b1b7f989d6426b3daf5ac6a0437764c0dc764e225f4a410b747003cbed695812f1192e3ad1d83a52a98a0e008ea7beaff86c500053e32635896400000000d6da720a4fda3c83497886ba65c7c3030b434659e14aa8c562d34d153ddf7107aa281a88f3b73cfdd5016db6160133a2b0c38ce2763fe3a12fde285133ecdcb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94a8deddaa8734aab53bc83625e2c9c000000000200000000001066000000010000200000007d5b09014e022c1f6e0da4584385edd13799a325ff0470549a86628f031abc56000000000e8000000002000020000000125d8f16d389bcb586ef155c8582f0f7bea15050f4524203e3f10afc157c5370200000004900a0401c6c083f40238de0053af88fe7f40e3b7f07f9570b2679e39692b10140000000da7b86cac68ef1604f061f9b1161a08fefe3d24427c6e3aa10f02ac4d6158018b03173d70ee21f43d8a435891e5a5d545249f90f174af3366421e6cf17982004 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04595cff3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2832 iexplore.exe 2832 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2832 wrote to memory of 1504 2832 iexplore.exe IEXPLORE.EXE PID 2832 wrote to memory of 1504 2832 iexplore.exe IEXPLORE.EXE PID 2832 wrote to memory of 1504 2832 iexplore.exe IEXPLORE.EXE PID 2832 wrote to memory of 1504 2832 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c65836ab0c9bb44b82af8021109903_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966d84a94ea93c219dcbac1b3051adf5
SHA1d87b091fe29cf5ee04ba527ad86bffdb66dd4c43
SHA256e143b3715ee730a061976de7035d58ae743db94070bbd8b73aa7f077fe692984
SHA5128ca8629659f15e3c723e8c27494b0f51be7d7413c324b8ef346103ae44872cf601b656ec105547af285a5cbd6da1ed717c6f663e3470518f1aaede4e236b5ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51265570b99eff31de80559c330e2d9aa
SHA1e369a5688107affa926ebbffc5a649f83c4ee5d5
SHA2562bf1940639c17b05148b19a3602238f707f92276d1cad298623edc89f3c35a72
SHA512b385b6c33c62469040f1ce736e8c417fdc8a395d7d5d18d4a872f9b17e760774851e11575b18973512102d7557fe21eddc29a0b45bbb327e814c1f40b1a768be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f35229e96414cc106e51bab35ee81d6
SHA1f8c591e41d3213e6cf97e9dd1978b772cf2223bd
SHA25676d07c946bcb220e34b7127d77bafbf8e84e4ed4113a1ab2cc820303a4500eb2
SHA51287d31eabb03bde2f435eeba9fbc7d7087bbf9f4f946f334a987a5ab5917f4481625e23adbc26f551a5b27923a19768830f7ae1b5f3774f42645744e4d7c3f70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5a31d29bc0ef7a6c8e3fa237794eed6
SHA1d17708469a5d6f706e22b8607962f36567dc7103
SHA256e628b23f88d6685b244f30547b47a493cc7c382727947a60334647dcd3c3fcbc
SHA51267b32e431fd245bf94706175eb1d5e826cd353e95f760ddc12e83291905d34f9e6a3fe3d7cf25b46850879965d19b595a102fdc59dcf93bb200c3cb84841071c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae371725afe781d9ac9cd998d357173b
SHA1df11056f7bb396e7e0cfe4432109768b0832b0e2
SHA2563d8d0b3615cb9e88b287306ba0c153f1ce2e9fadb17d2863d7bd42199e47485e
SHA512ecc6a4839881257861fa528b1846c3aca01e78e2248eccee048939a1344b6333db00d35fce61dce351aa2b13fa16254611acc303b3049ea9aa44d9b61c93d5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56498ce8d136686c05c7569d9356c1757
SHA1f0900f4db75da0899c5b09a90a9dce8ca36a5f9c
SHA256736a0b9ac64b3ccd9b46390eaefd617b88e798ed60e911aba08ef0a1088578e9
SHA512d61daf6a90b69dca4f5c2200278de8dfc0e08ff6ff126ee1d07424f7ab74d7e1d56f0502f555856fabc8c7fdc16f35005d211ce186dee0b783c01ab2d472040d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb33e7d7ec9b8e5bb1493adff41ac2d
SHA1b469a7fd10784d1cd07dca88809dcd3ec52d70d2
SHA256df0a0e7e3fdaf715f862bcd7761351a9000c1145c06d7bea3809854bd866598e
SHA51268912abe07af8107d70f6a9f854d288dff266f7846ea1c945d8c22dbab4c3482d400fb818477cc3803cc527ad20e7d588f9d83603c88b7c6e86b03252bc9b8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511426e5aaceb6e5f60eb59123514d06f
SHA109d863c1e3b33cf782836f261a0368ff5f7a4bf6
SHA256333c4ea76d4784cbdb0867c3acb020c9863673f6cf5f56ad4d16fc8e624b8218
SHA51220d549ed69c233c7d869800df930bf3f4ea27860acf6943c5238b973eec499052ecebc614643e09cc67432ff2285d51d78a7e14cad1eb29db8e131ecc5903bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1436fff9af914235cbae0b4bd4187f0
SHA1ea94307b1612526924576c24b5efe7ef812f2cbc
SHA256b8103278f31c7423b984011d68e6d0585b6a857e978efd6f2a4753106d028631
SHA512517c46ecbb40b4154315d8f89283bb9595034b1351cc0d787b6928b4f02b5eeac9f1455e9aa91f7e77c6cd644dbea75eebbb561556096ce20746f137c59e20fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf23e20d0d3d8a90fbf66249f5ba176f
SHA1c3f3b0cbd671ea17c8228dbcef27d1e4b4bbdf5e
SHA25606931c65053f06a6c013b29a584ca753a86dc5fd58493fcb37dae462a7ef76fa
SHA51223f072014f8ffadc16d37e7ea402bb8d7df695baf496fdf121f8c6b076f0dc404d5886a392ad97072826d31ef687200c8421f36f06717094ab13b1004364c36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b155910b62aff921d5b62f228fc7b97
SHA1f8251edbbbec9377c9ef01c598f643456ccb569e
SHA2562f3703614b9e7b3263063bb55863bb28f6257c262175923222dfaa5d3f0921ef
SHA5128cb9eb3536beea3a576d129264f286869c8c766e8a52d0f359d3d86e494c3bd01771b08523b9a2370a6ce5b705ef56b11d2ca0776df98d50884003ae8a21dbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd306bea3b742ccee5adddc834fb1f7
SHA13df1e73dff121295599d3f7cc4d7676fd8b0caad
SHA2568c9fff33d257d709d518c15b8900efffb074a6fa0cb012a0db9e366734a0343f
SHA5121a8e136c12ff38c732b33c815e756eea1deb41bad81e66a2ae4d63d7119729f134052f4bf557867132d5ccfde1dfbf2bf6ff357330858848705b8d602e1df42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5205b8a0890da59e4f30831bb7ab8212c
SHA131ac7c75153fd102d3dfba1c813ed647c5cef05b
SHA25609e2d1a4475ba2e1c94a238e91dfe54e461e24827584a0deaf24c3475794082a
SHA512e16cffcb732e636679e26e33a84597f6f53303b9cb4de31f1478a1d82e8114c2e59474d225a5a6cc50f1bf99ff77bd829c827648214ad247c99e9ca4b809bee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7f311485f74428003b6ed8feb8b1c2
SHA1e3098749298946595fcb5fc6666299d760b5d8d2
SHA256e1abcf77e74830b905509a6719dd25b2cbaa6d30a219788b34b5be0eff802f2f
SHA51267fb42c8a76256bc078ad614512f3095286259d361e6c79b4c707c0d3d632077fee49a9b4a1723416edb1ff5353f700035fe257e8b904a984a652b051047e998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2c134250c4350e773d14a9a15fbdeb9
SHA1f35276890c981243954476242e506d185aac7125
SHA256b5953e6bbefa797bede2dbb92bd0472c33d09d412bc802c6a3793777420a95fa
SHA5126c679fde70bc9778d2b72c6535c1ece3725457320495e2d0619001c284350f163c19ebf62dca949cc69b42b7856703f86d34c0a89d77ebea9ca79d3d5b1e4b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba54975eb8f375f1f5470f68f8d48586
SHA1b92f5513d976a728f6d121fa2171dc811c66329e
SHA2561b8e02ae1da8516704f1a46165d83ba8853c1ae181c7733e7199e767dab4f8f7
SHA512c49e72810960ca8f889329582cb1986bb912241e3d84c4289a85b1bb9c189e9b9d87af6c938c19ec2b22f9acc84bc6f0cc5decca14ef5c00af52ab8adaef3cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6488ef4d7545082be6d146e8afbea18
SHA1af511aa84ac0924ad4f92f4da804edf5bc31f30b
SHA256ffe311fcf9034d40fb48194451a3151dffb573798a7cff864d3ea7f405d2333b
SHA5122ee56f169751d0724443ce77990b7ebbdce15a957705bb7d5a183842517730b350e31087155fa375673f0a60fc548584a5c8db959b4a880bf6ce764388610c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5148e8add0b7c36dc803de62e78e5607e
SHA1a25bce74ff4a06f65af870dd3a0f660d79c14feb
SHA256785769d2119be3fd3b8ec8689e800901c3ab17cb2e9c8003749d8ffa4d9e3422
SHA5126f668b8a36bf1775bbe212e67576b4bccd92d4782ccfede3873e20ccdcb0eb8eabe2f25a2ea9a7a570cda5ee7f563a11dd6cf3565c5d48006d2c275e585ba52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552bd1dfa7df445bd75ccd512a0488946
SHA10af029285a279539535ef294a7b99e3316004af0
SHA256c37a00202018e92673b8b58b228a0638c91492e39c11f94269a7175142102097
SHA5128c5ce173d341a6df4049ef9e09378e1e1c932dfa806d8bb4f5841de6c86f84e7d9d3ec025d0ad8f448b654fa4ae4913fe3a70b6ef9352e1dd40b91104f0f36b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a