Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
6847cb7260ceede2f77a1c0eaafe951c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6847cb7260ceede2f77a1c0eaafe951c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6847cb7260ceede2f77a1c0eaafe951c_JaffaCakes118.html
-
Size
1KB
-
MD5
6847cb7260ceede2f77a1c0eaafe951c
-
SHA1
512d4f0675d9e9c3ef8c0f33104685336fe2f2f0
-
SHA256
b44a541adfa5bb3d8e2a3735d788377e5a52e10a38f37b138b60e13eab209997
-
SHA512
3e3bd88c39542a86f5b213b3f64e9d1a485fdc2af75a9a66490d382c2e6023530b86da8f6808d8eae99b1d36f77708bbc49f296e2c53bcbe1a9b70584e7a52c5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422566189" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a64d237aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc1f62b5286ed742aa36ac8449a0fb4100000000020000000000106600000001000020000000093715269fd5ef54ccd88a67c8be259bb2cc7cd78a6a09410c9a8555b2b17063000000000e800000000200002000000073d38f6f92a8dfa4a167dba81a3ec48be8644b4f0d6a80d0cfc80af1cd0fa80420000000b61b991ac50bc03a831a4c0d25fc46a60e38576bb732ec9e018055cea7ef6a6140000000ce7ba554e578b226ad4dd1f5fe3adeeb6bb43f92b30951e7c87f87177bfc20f412ca38767dfdda1b47d007808bd3db64cb60f1ba5f8c5807accbb72aca847c76 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc1f62b5286ed742aa36ac8449a0fb410000000002000000000010660000000100002000000078a57f5f57e51ad35cd813f72b69842c47bb6c4b1d2a6cea29696fb578a5b30e000000000e800000000200002000000042dc019e117f8baf40a8e8e5c2712245600da61d69eeb88ee22cb99cb28a31bd9000000017eae63e59510d5c72e505127b5e324eb875cbf3ed890ecfa9af29b588e81203d44cbb20d4523a269d6b7faa0a6f8754d1133e6caa81bc69b417c75a258c9e47f33a56023415ee89e88c3cae731b7b8b0509dbd7f822133bfedb4706f6d6caa92af9ac0bdc1bd724736196726b6a96a155fcd27148fab45978f232d6fabbccbb4a4eba1bcd1c4bd743d56f17a7c68c42400000000bb38653f12cfc90eb36e467130a341fbbff51204e5cc1220d64416685a4c9407e2c4b47c198db69a3a565bdfbc64a6969e788d66bd7169d8a319e9061cb0f72 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E2777B1-186D-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6847cb7260ceede2f77a1c0eaafe951c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a95566bcdbaa60531cb0e65b61ea95e5
SHA12e6b1850d96ae5b8685221cefd1359b0f18003a4
SHA25686f6810d2816630e1dadc8de215db070831f97ee6d1b565772ed762ecc9cc5bf
SHA5125c1e84092652f036aa6892709eaf1b8719e0b6f92a0cc0efe9dd5a0f8be50d20298954243a3b6a52d4044e8596a7327860bc9bc1a3633f3f250e4e1f44b20b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5397dd2a4df31aab33c51ae89aa6a5c9f
SHA15a05ca109a699cc45732b55d88cf57cb37acf609
SHA2566fa30e9b7f601b304743c61a844b259fd3d047781bbf85e8f330ecdaa0ea0f37
SHA5122e6dd2416cfed5ae487bb65b83481ce15ae4bf13d5e6ec26518720fa4dcfdb884ee096545cee4a054e9ecb540f7b8f608ec2943101e67c8e772685d2008ebfc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ea6b9d89047020630e053ca02a4187e
SHA1f8aa3cb6e0fa9456279ebe4e2c7288424a2433cf
SHA256d418fabfb630d084966ee3234c9a9966439dc77245340de55e90540d7567f047
SHA512f2274b5194ddcc75b0a3172c41681449e22dc0a3b771f7e840521a0da861ac28b5f96207e2fedfa139d5a3d3854435d1a00dba924ce0efc1e5626a22cd9fe821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd806b0ea9918ff615a38e58ab564db9
SHA1d5abec9019342c7fbb980bdfd21983dcaee1ddb6
SHA2564bd608c1418ab48778db1e976ac45d72e839d810646d5dddc5dfec0d9a19ff02
SHA51213f623a1a977acba6170e35dae783e45db5fa5e14758bfe5671326d96d2f8779472b269e550d45eb453297ddfac23e967cca4812fbc9c1850c7256189a4e8115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed1b87cdec234a0f37fbd9d10f2eedde
SHA15c6b4c8a471c5e87699f2fd1d88cda7824c17021
SHA2560cfc791640089d5808db84a2d82f84ee5fd74a9b49b2922a55271624d35c7b31
SHA512bbcf20eaeabd5fb1b85d8ce4a7833a0fc78f4e1a50c1a857b31c08eb899d2e3953070f9f36691595560fd5b266f7be419031fb29879d52b4027c04772fc45273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5780680a18ac582f09c2dcc5c0d7c3019
SHA17554b1321d4b7b03d846d1429f713267cd8205bc
SHA25607f1d9e45130d32fd972c33bf09aea26f3a71b169f3a74582265a71146963fd1
SHA5122dbca29c818da911f97abfb73345fe10f59bdb67b0268994a026bd4866bf51907b00c73f29a58a713ea799fa58060eb506e57ba79836822d7a7f8eb42e03b298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e811e8a2fc36e8e928fb470f343310c6
SHA1686136996a5188c48dc8e4510c4146001f58bef1
SHA25628646efdc6a6fe5187bc62133de4de39480fd4ba0c687e8e19825717803828a4
SHA5121988c8d9c6b48b6d049ad6e40516142f9cf98b0628abea78b054a6793429cb31061c83090baedc962cea9938115410de0374ec5b274964340df60f083bb179c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6e9b8109ade1a9c14f564c9673dc5e
SHA1b6c647c0e3adffc23a033bfd621bbe34f8cbe4e4
SHA25687271c7e407f70352d1eba8fa69f6cf3d5ffc79b68044d63fae3e8ac4ae3a469
SHA51232ee603617fcda96e6504ce154b898ce597aa06a55dc9014c01f45c49cb3814f7f729076d1c0cab6aeb8b67ff2847032ec4c39e83e6888cc61c88619c1e185a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fbfd55b078d28ba1a1c73fbc8d122f
SHA14de63d5f76184f0c6df6c3df0da63919de0b99b5
SHA256779a05e40323febfacdafbd4bfb51b89374df81cf106e011122db9631a04eedb
SHA512b90888fcf507be0915c5b0b8ccae9c5fa5588e5396d4898f57abdc7ecba6ad7715dccce2649dd3f94fc26785bcfe88905e547af30945aca36a53b4aa19c58211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d9537a3bdc6877c9302eeaf7202e55b
SHA18c0e80547b1a1cb5379146a674fc9d7a9050be87
SHA25630169f7324d2e60ccd1e4346d24170da402279e667449a36ab352d681a3c0c56
SHA512a4a792b5c320655275c36f9a89951d25e83a7004ba3b4032e7b20fe22b2510addd5375b935b712d8cb7a53b7e9545fe71f9f546394078ff700236a815028e50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511732e03ca174d939aa4804966eee93c
SHA10b42b4840d7fd21e47696e4d445f1850dbc4b807
SHA256534c93cb37f3512fac9d1fe31582c2d26aa08311c70edb7b3d17e4e394f457df
SHA512cf04251034f36286508d1647dcb5a10503ae1bb3eddf96a75bd2bd7e7517337c70579768c02383b643fcbfbebd86093c81bafe0d168347d4b034563c5e28a80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b97f77fbc565f8b7aebb5904f67134f
SHA1dc62699a47182741200abca6a3a2716c57230c5a
SHA2567b10ad2b8c0a0912e4f52be962e4c08f3f8627a7eba4f9d26175927e44a0d877
SHA51241b4f9c68e42ef69aa70a43dfddd71998342d4e4caac14655b234f7a028573018c9161b3d35d82a794c8231faa28b6f324fc81d4224e51fb51c9571bc7c1b37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3aefea23bba941c2de35eb3cd438b9
SHA150804939d9330ed6d47406d87c3f8937631792d4
SHA256943408ea239782a29af849d3ac6e13432675978da59f8ec0832fbee8e776ea49
SHA51222be72499ffa6d8d159e9eeb5a26b980bb15ff231e37ed82030269443e9b65016bde61aa8e487f7e7b969b70b2f54f96bd26752727f58a0ed60faa02c07fbdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5386d4838ad45f194b408f6e746fcd83f
SHA1f2c037e88494b7c20d163684a77ab95d41555158
SHA256a21c916fc3ddcd48be1c1e4277233b5fd64ecc9ee1c23fc3a969fbda1846265e
SHA5123df43cfd6cfc5888780ea31ee6ad32e6f77e75ca30459b18a51cd65bc40d3f92cb9eb5b1c2107c383552a457c5efc758dff79dd5deb6f2d6ba431d911b7015cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555a0a044a99268bbd27bd06c03b15907
SHA12f745b313c73447375a8c96cf532e585fcf53964
SHA2563081f41e08596492a6383a44cdfd3e46c0ba6e3018522183f6b828c6ee0f1255
SHA512442fab22ccc3d282c5fdaec667bfdb4d0e520a3806249905e003537216dcef100054a6bd615835306c7b907aac08f812f23e0b42e7b27baff6276ec0b1d10781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c926aa6cf8a3a9ad35775f9c66b75c57
SHA1f4b65879a2a0130770faac3b1a9a887118dd7b98
SHA2563fd361aefd871b1479a4d8a424eadeaff3a3bda979242714bcfbf059b8bb88c6
SHA51280eafac651451a8c5ed8fe68836387d405f336bdf7edd9a4bd3ea4cdefa062e5a6cc086b2efccf83e38e09ca5088f5384d181872dc64d2a56afc18d17e284109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c286c8d5a459858a41c359764becb83
SHA1078a5e114b8ec23669badd0d67e332fd5fc1f424
SHA256c3320b565ff323e9676af99adcc3eec42eddc7e8238b2ff9e0f713b27dc68f9c
SHA512436a77297af4de59259dfd97f0f5bb83aaf4bbb0cdf7b916c99c9b1f35700302d106d565a13e689b8acf20867ca472ce522c9263b18b45ba1dd0c15b723d5409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a420c24a4817da3b818a95badb9be0
SHA1dc4381b3a89833e5dba88d4bd4df5aec20bd2b74
SHA256150588e5ee5c63a56883a64a1d962fad61d897600656499b0d0acc9397bf87da
SHA51206c93538284d4983e04eae12c850b81435be8d13bdda2a3e5b684ac00c8b17fef0c1c55f3b87f80fe8ab78b61a5566996c493316ca97305701300babe9da2885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695c74ded49038a359d01137bc3fdc58
SHA1b7947b6e054ac97e697b189de9a87d7dc5bd1b36
SHA256cc3af29b0265fee349e70c8777e411232e78a14fe45819d446f147d6a42688ef
SHA5127d73f3d147094265a657240b2565d31b89223b1bee9f19af2ff2a49f9ee82bd59adec42462e44a122d9e9878751a542f6b90b7a2e4027eae22eddf2192b723de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a