Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html
-
Size
907KB
-
MD5
6ffb18cc3442c4c42acac12710b72618
-
SHA1
74e68171f773961e4198e007baf47f413239cd16
-
SHA256
d6ce22909fa7c0da852669f7d13bb3a70f22e17b48a3e6858419ac53ba19854d
-
SHA512
8709c006cf36de9df9672ffadc659419519f7bbeab43b4923f55a01d767cf8bf00adf0982f5d396a0f36b4d155168d81963ae9e5352d2bbb1cdf273952212084
-
SSDEEP
3072:6wwpZf2szA0N/Gd7ZXtjgDJtdYyVeeXnxOMQfw/vf2szA0N/Gd7ZXtjgDJtdYyV/:1sM2tdYyYDM6sM2tdYyYDMpJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422751206" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008955d6a3a06e44ec651c7687ba4b54e291de1972bc61db859688911253ce157a000000000e8000000002000020000000c14c9e5a7676debb37ed0ef14d9e5712036625d348c7014b2e32f0bcdf070c9f2000000081c0f4c3ab0f417ae34c2f5876256e86e7d977c15639272790adfc8629dea14a4000000051451a09021625aad36fa3fd7c927f66bc2f8cd608873308eda6e095fc1594975ee87ed9e9cfd07118796d52eda2118bc458a5f58fb80e51dccedfd2cbba0d39 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{157832A1-1A1C-11EF-8F47-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209b08ed28aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2996 1744 iexplore.exe 28 PID 1744 wrote to memory of 2996 1744 iexplore.exe 28 PID 1744 wrote to memory of 2996 1744 iexplore.exe 28 PID 1744 wrote to memory of 2996 1744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dae357e2ee79a22db5fb6e857a8dba0
SHA1ac368fd6dacea486f7a322ffaff7ca40af9a8adb
SHA256f46cac2e43e17e1a3f600ebd174057db8fa182575cbcc23262d453650e86c2d7
SHA512ab8db23d1bdee903733e02ff8901812eea3dc494f99aa42715a562256f813b5fbc265183586ccddecfc6238a3d8ec86500f980ba7a22a398346c9fdd6ed622ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aedcd5ac3aad3239c403b450933f8d7
SHA1a4da48fa16e617b378b4ef3b98427ca28983875d
SHA2563cb826bbcbfe48d07f6997d6ae3c96b0c0ce17550fdbda608ebfac2df5851049
SHA512ca89bcc8fe0ec7c99cd65ec4ac046e5e56ff6dd3a072bd4809fccc94fa291c4fbbd1b045cc82fd9f613dd0d2ab1caecc6cc443093809a27d520000a1ec2fd624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6019066e645a732b771eeb91a2ceb7
SHA1049cde25284c8a5f3d51f2796b1ca82524059e79
SHA2562a0254428234c14f306f5c492e5f188832b24206c4d012759306ae1a1e106d73
SHA512bff0001b9cd8e5a0081ea6a3a2fa121ffd0ea63659ae33c47543225e2fa4eaccf4106451abbaa0f98074dc9048e24adae03672327fce20a81b0c102b136f8bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5753ff615b4559dc3578b97b2afd9f71c
SHA19f829b6ca52eda2b2504c8a3924cb4239196c081
SHA256855969d0e4444509759e852515cb046ea569ffccc50ed75111dbd04f4d798fcc
SHA51248cdcedaecbae7ae7210ea32d9127125d541b899ccb3a5848fae7b9472cc5c1916a28a04e6e308602cb85f786f2f54725126badf2bf13c8af201d4330f3e65b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312613676813d2e01605e41caae188ce
SHA10ab0979aa03fa94f71f67e938f3275233306954a
SHA256f0b4c5faa912db1c856ef2c143370fb0fa96a031a622ef7209f8024930a34d24
SHA5122279555a1209cd93638cdc4b97f8897e463750f484df44126c3b22f737b8c6e1dc3e71df1b5dff4d0ba4379e99d93f81ae4e69ae2d4ecab7d41f2235e0b3588d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b1be40955c3ac1d8700c1d6d70c4d7
SHA13678b4ba68f12abdd1cb81c1e12f2139a890e2cc
SHA256a427e3874dfcb5eabdf371dc3f8a5d790651ae462842f4c98601727db1c3ff9c
SHA5129c4b6fbf2d528c679b07ec0963ee87e5bafd4ce66bd1b9a156f569cf824c3cb80b1477cfb72bb3f7af8dc376cd117a780d7bdc32a07dde34e1784851ad2c8620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c05b85991d6bf859f638e8b2598234f5
SHA1ea3e156877df75c67ded0a4badf88c325a650383
SHA256345b5c07bb6847f0937a9c5d269af3734254b05895ba5f79040f495bc12e3088
SHA512bf38ea4bdffb9a3a642ed40c8d7db5ae2f8e00c448d78d76b54fe8824a40308a222a3ccf8b376d96b07ff35836f551f7970ab8d76bfea53ed891cdc8815af183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f845ca690a9cde90720fe65fd83b113a
SHA1c12082b8ac25ab7a1fda88a33b82e034dada8db5
SHA25617741a0ddf49a6607d2816c137dc48fcb8524aa89ddc2b1070766c3181b474f1
SHA512fc28e07bc1fb92013779cdf33af9f62b82a03e6ae89eeda3567ed40bf2582bfba382da75ed50734fe2776b6e4e8715c5845ec0571b48b6a295d005695136f5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554d1b52b85906495402fe152445174f4
SHA172e2875798b8c19880c25a0425f1d60115addc83
SHA25647056e74b43d01e256e7ebe433d033f250a2c8a9b3f2d79667ec7428246166e5
SHA512cb98dedfde1c7527aa189b9fdd0740957f6ca39d9d3928c4eb0c84e04d68e89c5c62f790e38ff1b3d5abcf4e6778af648b599ce3b731ce11b016c0ccd60da5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5720c2bfe60d301cd2d0d47f37920c550
SHA12890d2244c495fddf9016fa8aa30725d1aec989a
SHA256677c6811d02b6f94cb644faa50956527e64aa25373c6fca49bb2d3fd12a1a9a8
SHA5122ad4d2fea21bd23c38658df03f950c88b5911e32f7dee020cae7f97ac9a582366313e5f012190418a016e13c474dc50fbf7885a29839b00fd001d71cf1d7254c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5756d33ba3d4b064796b6b5d79069b6f0
SHA1386dc870fc45432f402435e8225d2cd8b829cbc4
SHA256801e1a4d618d071c451c26f12bfd4fc06192706051d9b64fe49df05f9fa442ae
SHA5124824807aa4d8a6514d2bf62bdf3de13f44ebf5086d53d46894833bf0fa135760c2e151025e34a5fbcd08db44e7955977381524424eadee3dba0014de5eb14f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe6ba8e836c5e27a9aed6bff92bd57b
SHA1bbb593cf50e5916b20f7487a39c58841bd2877d0
SHA256451f224422f63cb6b7e6529f0edfc12a46417d7e411ca174033f5893e1f56c58
SHA5125b13d0714ada7eb91fa8b8f898fb481cb6a46ffd4848c9310cee7cef4aa952c4b9abb8279ed86691da786b1f75e332759745a3d9cc1187e75035e1128e72da98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56470a5584b881ed6fa7db0d95d44ed6e
SHA1158df04805424fa1379f3e9d153f296395a86e0c
SHA256384383aac9ed39b7df4e908fc208f8bb8a0fa90d1445aa773b79f85a7efa60c7
SHA5124ece4893fd4346761fdee6811ab8837617e1e8f0df314fe173ac84c1bc7dc509a9ece0199a9e90ebbede390c9227d67333e07b9ffc7289ad7571717e20403905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b23c454a6e8670efb2a52a7c3053a1
SHA174b7b14c91777fe928cd3ddd61bd167f1ac633d0
SHA25628b035dc214691e0dd5327bf0ec3217182f8820b29a82bc9293ed03a2d40e924
SHA51254b6541ada21b1188c6804baf8d9d14cf0a64eadff97877923f00a88b68ed7a037bab404b3e1075c80679365ad8439c3844d288829027236c0e27bb83b19cc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f71362feac650f0c05d2707acf4a12b
SHA1da33e9b8df45f13f9304a68cde6c9cd4e6c1b720
SHA256e2a7aaf95d58f9cb0c66c683466d294a26a42d70a64fce3a39c7fdb34d8123ad
SHA51248da86ab3fc4954882a39d4581ad80411a8d9354e01ec76bbb9690c24e81c5213dc462fbe0af3f02ee9f0114a53dcdd827112e6d093bcbf06ee7c8f3d6b64156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a92a3a70f95ba20e06f06da0837989f0
SHA1802841fe526b8e465e0cd03ff2c1ea12c823e00a
SHA256c1be2c1c97b56cdd501a2854b895acf8d5fa86a7dd43af3e04aee55c82efa016
SHA5127cdb125de184e551811437f1d0e475d9fc9f3ce8641a69bf86060d544eec5f5b2e57bd195dbec3c314b46001496cb5f99d34bbb7589124e2e3027505397a3ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a634573cfc992e477114dc76a4b94f77
SHA115f79d6bf288ee945d2c9a2f0842ed61a92c7ae8
SHA256810430c613f60856fcde2dd13c67a182e0661be575f8c0f51a9debbdf0c7c11b
SHA5126bfb6ad889cec8d4f0e760edd60e5ff6880be5dd6047e502e02a9aee41194053e8cee7965002912b3c2121e51a9ebfc3c7e51960c0d07af112a50850b94b0dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857dbe49ea18667d0ede999b22f5eb4d
SHA15ba21a61a2d684ec9f941dda24fce332074c364b
SHA2565a31c809ac4460488b0983a461f28ba0055b29eede4d50ab768247fcebb079cd
SHA512ebd6a8b5d3459c48acbcb26ed73d281589d95317cc813f184aa63e3d7fafeb0bf006a21737b3e59d8604a6d4f2dc3f82003fb56c0e974c42cc4e35eb0decf886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5452926a7d4a6213431c5864489526a85
SHA12c2fcdcac3556e1e26fcc78a1282233b10e8bf9b
SHA2564a4add83acc26adfed1527f94d1466c2ce8054969210588cb56e8522743ef4b8
SHA512b737db97c33c11af465be4057157bd5b30a84116ee003c5fc2378e150fe6d97eecb8c0d254f618e0bcd5f84dcfccb125973e18f79b5a3326dcb20f20303fcca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47a326599a8495216dc53abd88963e9
SHA18e2539354dc67a2160e39e344eb4df7c091be44d
SHA256a3359c13f823a869cfa7ea35d3131935d79b582835190f69adfbded23ce573a0
SHA512e3599c2b2d60213463d2a2a1e8e4d28fe3ead4edbd37c1f311c0b0db5d1e2dcce5c739e3ad2e0de8792023979f6669cd9987ea750815eb259fd595944ec754e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD592f0a1503772001b34ea421833d1b966
SHA132768d2b55be833c1296cf5ead62987727ef7311
SHA2560468f0267b58646703afee5d20826cede7f683b106ab829b215802c761df0a4f
SHA5121d63cba6016a3cd12d35649417d40ac9a4362256d110c7fc2576251a9569653712e8ff4e02a044e9d3e91fdbad5da5724e54586b2e9c9a2dc109a51a5320c5dd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a