Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
6fc0d3662452fdcb7c3c930d95237971_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6fc0d3662452fdcb7c3c930d95237971_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6fc0d3662452fdcb7c3c930d95237971_JaffaCakes118.html
-
Size
50KB
-
MD5
6fc0d3662452fdcb7c3c930d95237971
-
SHA1
ef917608246097514499ee6cff6b26965c7fa20d
-
SHA256
218edf1a55794fc643705938fd575c1551eb56ee96d69c26b6bf6ab007419489
-
SHA512
174bdcad6b683a28a362fa49e915809cc782192b6b3a3fcdb9c7ddd9272685429f83d717cff767841a807aeecd635256b1a8a33f5ade2c66ac61da02a417e381
-
SSDEEP
1536:+dlgRyyf4aVEvKI1xlhrMJNSlurvN5NT9vAr9beeVa7lB/0vo:+7gRyyf4aVnCa7lBn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49D8E681-1A0C-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eede1d40f1f35f4798205a18778b235700000000020000000000106600000001000020000000504b847172dcfbc535fc51389cb7cc4e0b4dff86af5fcbdfa7ad27254aab4438000000000e80000000020000200000001366419cbe90181724416e2d27ac160e4f592679e8b84d718c224599a529d5fb200000004b13bf238876307a2b77047eba6844f2eb0c734c021f4c30bfe0f6dd1898fd6040000000a4508ad5702b5a87ca171fbdb9445800dbc808faa84a269bd5c91b7312509e48036023cacf489bf09a111934a34ac72f12a3078364f71f415639d7851f9b8f92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eede1d40f1f35f4798205a18778b235700000000020000000000106600000001000020000000809fdb1e9968c23b96397c90320b1b7c04b2b6af72affa54912d054a584e1753000000000e8000000002000020000000c9578dd44af0e1fafbac2d914a0913161d99a71837e0d1ea52783e54acdc19e5900000004cc3d509d2c95a25f43540549dfd27848c6e80ad1868646ed49c34158094934cb0a1d0ff55ce86d678ade38083a37ad76697307aab026a3671260fda302f0338347edf589105fa2f3acd25bfb96a2ef5c520730a990362c2d5883aaad4c2d492ddb58b91081f5874e416fb0a43d16bd399469e1ce96b47fc3fb0206d1cf474c65d6a8e27d059d7572ab4f496801cbdd740000000573ba76db19f3d6a6f13f93110028d3f2b3d51c5acfb39e975e4c1010c45391ccf2c59c183c7e8b9ce3639d74fdeff9c158c8a5127cf90e854132a2ab9a1801b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1057951e19aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422744422" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2712 2768 iexplore.exe 28 PID 2768 wrote to memory of 2712 2768 iexplore.exe 28 PID 2768 wrote to memory of 2712 2768 iexplore.exe 28 PID 2768 wrote to memory of 2712 2768 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fc0d3662452fdcb7c3c930d95237971_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bde18081ed4c2a66da243b78cde948
SHA1700853a35543acea5dfb48c8b4fea0052ee80ab6
SHA256855722010b7576839861067e0b4ac29d1606f1e29f12577acb6891325f8d93e6
SHA512b84ff7233b129b608278ae41909e31c372cc311a13a293b4c2f0c61130e7606581e2f584b63918dbbbf5a7ce27e784e968a3a55be1e3ab5736de14b87829104a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0048b4a1ed95ea01f6c015ef3ccce97
SHA1d2416b05aa758328dfbdcef0974807dc6ce0d80f
SHA25698db87fb2fea328bc369a18c521909cc25a28f81c4d943d56c50c21d904769f1
SHA5121c7b0799874d1b33a435478783b1f59142d2175e4a4795eff65e5051fc6b3cbec6da5c4a53c9efa9483f4cb5527b39d648e8f851fe6a5496d28a8b859ac715a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c2f715206b4485fc82cd6892951773
SHA159aaa064792252f66e47f1be96622b84e17fff90
SHA256902d7cda5dd9a89cc6a0d7fe57c5fae3402e8e3f220578c0cdfe28bbbd2320a4
SHA512c479aacd5f33f776a5324775e3962de6e2a0eaccfe022aa999786075c55400b6a224126ee0497c2c3f6d1563065146e41bd4ec4c7e496432e17b6c62b169eb0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546cea831c256551cd37fbb81b47120ae
SHA191404d6d574a6df7a6992421810644545aa2909c
SHA2561b02571e5afb9af927e5abf82fd176ebfa5995d9e8343a9514ae65f72d1e4a7b
SHA512abe69e4c9b73d37d2d6111e248ba03cb50b6458f1185f0271938b9bf4c5544feca45c4f34bc5494fc7b8febc8134ae7e54320d92a83430512ac63702bcd9a75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594bef0db4028f3bf4d5d41bf011b6d50
SHA16d2413182fbcb64dc0d2b41fd8fff3711a6eea44
SHA256b2895ccfba16c6b45c71ab347e39175dc1e33dab2d6cbbd9307907c604259ad6
SHA512537af299e7c77a78e0288c89891471ee7fd4c441ce9060fb548c0d0636874fa749a68d1ede7e2cad399ad50272886b4ff1dd9b0bc6806ef9a593e26cfdd27fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533081a3d0a0001a9137e90a1ebd9afc6
SHA1c391f845638aeaf10fa1249bbd54b6c4614be695
SHA256e73df71fae9504e7814d7db0d247d98c2815e9b2aab00a9b8f1ed8f06a6af8ea
SHA512532fb9486e4cec31eb72f327352f0420b5072e6bd45255d8b46568577be0d71ee7a66472f710be1b7a9e0809cee348778f21b51e296dfff22f83217c71bdb4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e225e87afd1fc5ca4d2d8d0193f5de
SHA1f4c1e57d8f974f0a4db72f4a3fd3acfa9a8e38df
SHA25647e4ed6a5f851a3f24b33b0094119ba9176df78731411d993c5c796e5096ad4f
SHA512c8bbc3913064e15683185afcc2d870ca864f3bf1db4b860093b9f2ab13c3069ef5afe75c2a3940a226a343d7e8a29b11733b432e73c26fe29c2aacb53c53a1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab56116afdfa838eb8a221d07b57c4c
SHA1f4ba290dcb311ed376fb80e29e93bedca2d17ff7
SHA256070494a328339055049d0f033103ebc94f00bd115ce39b8d5d8d8d58ba41b615
SHA5124dbb5a13089ac9900b47d548028f7c01e55e7747d834a9a15ed8425556465eafc62460961b6fb933285b52ed514b12accdd9f872ec8cde1870a5f1ee34383c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ed2f97a76c13f26b05aa77b7ce7975
SHA1a42ac36354757410d0d73491b163025846337001
SHA25679b36031b4230456d9cd4a6e74e14af07dce37f55a5b26bb461edcb79b6b8efb
SHA5129044d7a4ddbea852eb745d293a1b789ba25f7103797c05e4a99036229c5f38bd87538ee376e2d56c1eeadc180dbea5460a58ecf67527ee8b8e29783a8e859c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb02dc2ee5d4b243c0d713f3bec1df73
SHA148d9be2b56712e6006123ed3c5e7132094b5feb4
SHA256ad7f0157e425c78d0ce014285fd46c74087faab5e63050755002e44515216ea2
SHA512227863f338bcc82d730722f3ab6734093316a5e10319a9ee92c3bd5584bcf73f157f7c0a2c8d21a9e0d27b4cfa68713e5eb7db2de6f3520c7cbc95dc12f7eefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702d715ea53355d218222873aef8fc86
SHA1ccaa5137bc4eb40c65926cceb489507c3c71d42e
SHA2568cd4152fd3c0ccb02c0db1325b012c997e81801da68014d1fa7dc0ed36acc239
SHA5123efd35ce667dd33969d7d49bf84bff949b9fb7bfe7b4a341691231f66799aa079e729044f571abe8a119fc46f31b53f6d871a6598a21f3df2d692b2a94b97cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d7da67b025a93a9987c60f5ec7234c
SHA176de230908396f42416e107854114a0ddc0ad0af
SHA2560fde62783ee3bf58c6c474125997704c73694249633127d02bbf8a2feb93b528
SHA512ed0408c3b2bebe97f3d6669f7eec1f2b8556811c7c0282515414f5d73074c58f29cd30792abe2d938c7988ef0efa4c465e95e138baecff393b0aea9c55096f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645a1528d8c6b1b0d1ebf066cba46d7d
SHA1e53cc1f14a7a25fa504a56e9ea55c6f80e4c0f76
SHA256e128d7681574d9e29f04a252e2e43a87afc54a9ed77e0cc64b74293e4083d7b0
SHA512e9172abc4979a7277f5d8a471895a8b673acb07eb64272b5340982a5abda763727b9f288d10c30e55c809d23c263a601361eba503cbf574bd75718fcc6a3609a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5272c873efd83e6975243bbb062be62b7
SHA1b8b725cc31205edb60c3147470ea973951ba546c
SHA256557d175587cbd4b550c570d5479fdd604155b9561009ce8ae63bb92beef711d2
SHA512565cd9d95f929c2156bfc26d590bda509c345234ea7542ca3c3b5a440b5753924ead697fe13ac14a28b2d25512e47f5246da58bc533a5484925025cc1780fefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d927e341b15bbfebbd24ed1c4b50c48
SHA1aa1c92352e9ef69a4ea71bfbf6f73016aae9e815
SHA256dede8dff46e9c14281ba76648e1c44417524d1f4de736161f77215d8e88cba0c
SHA5125c7a842b2c66d90994d9b570886b47d138b7ac825b2a46e6b34b25f0bbb5ea589c9139c95d5780fa7171943cc5b4a554c932ed1bd86d9674010c48da2ea47f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fdff98d5bffc84ba21cca8004d54a91
SHA18d7ef1fa8fb21681dec681658b4d0bbac043aa5e
SHA256cff68813fb7db28e2f331d654ca30662492f69122e29f735f38f48645a87a088
SHA512661008b6600f190dcaad66a58db2ead40434121ca834d2a8e8d90f73288db97206ef15dc1229ba302f816c6455c8e2a5577db824f73413f74325e1ca5d84f4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595504aa080b7ee795639b81fab1bc2c6
SHA1ee02f056926518dea4c5b813907e6d87f9bedc1a
SHA256d4e31ba6aa58d56255bcf79bd0f9920f2f46b342ed9efb47ae2aa62fe037016d
SHA512fa6f9971aeea269c99b5886e754fc1be0de8c934b7e6ef7c6fd68d83a560b84887e1364d364341feae75267dfa01f614217bf81c139c8b34cec293973e8cef65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5210c1f1c340e83bf29a45bf995d5d8b4
SHA1928b57fbf68f02459b155b8066ea39f7648a28a7
SHA256e27151e00e0e49445fd6202bb62d2a30af1b1c4a7bb815d44cdeea32505ed6cf
SHA5122a352542b0ab54d8cb60a9be861bd1ef2577344570ccc8e832701c9d41808585cad967ad4696da6e4bb27b02c5882151af74707bea05d9c6c37a62b1b5668b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170abbfd7a356d8e1b629b906f05ca2c
SHA14548231b612170763e99636dd30eee5b6695e3ce
SHA256a0459fca3aac4a70ae0e8d364bfe1fa20ec42be383af0001183dbbda244c2e56
SHA51249cb5f99ded4a125ad0e66eceec0f60aa921fdb9a6ef84977f68be6c2f7dafe1873da5dcd4779bca27921e7c6697d126402433e778540693b2c62451b4bdd2ef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a