Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
76019d72609bf2c7933618ec682e0c37_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
76019d72609bf2c7933618ec682e0c37_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
76019d72609bf2c7933618ec682e0c37_JaffaCakes118.html
-
Size
4KB
-
MD5
76019d72609bf2c7933618ec682e0c37
-
SHA1
4acee4a36655d6d446b319895e8f523cba1d6dcc
-
SHA256
febf512ebb97016fa25c5944407c7c0992be5a871d01bbc3d4b3d4342c5fe4ef
-
SHA512
8687f07f306e77f7ced42818046041c7105c64d5e59d8fa2d559f98c8779da0f2046a04fbb7ac68a34555d2fdc831b6be636fd06911b00de6f57f9d071be12f6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oCAF6Rd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDR
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003c21112d86d7f4f44d3f33bc1b1879f5049a8b841fea6721d5993cb5fcd90099000000000e800000000200002000000021be680b2a6a64f9b520fa3603fa050a24a7ad0f9bad0d2e8c7776f3610703bc20000000cf23b5213e3cc02babc590c09f9b03b1f551e45992670dd120a05d59f2d2039d40000000cf7e36db653ca124a3d046a1fea2851570c91c5b9438581026cdee40d62852670381e09d8c3d3c9cfd2d82dadb7f316f83ca2ae6792f314a30e4a42638c3b4e5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09a818785afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2EEAB11-1B78-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422900935" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76019d72609bf2c7933618ec682e0c37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516fcb570f9e007208f636a45f1efb0f8
SHA1931b94ccc38287133dea64a98fe14b742806a714
SHA256227ea492800a7c37a23ab7042ba9365da29423aa1ce678cb311e4fab7503d147
SHA512190ed1c416c475b046c866709e15cf3e7a31617150cae193a80a4d53a1216520dc4e8822038d513637b9218b26c035a808fea05039102d91464973966288ef18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528323ff4ca44895c1af188e1b4093a77
SHA161c582806de5769f3e2109af2e2b7db4957cb3b0
SHA25612dea21b512642445df225ffc326b7744b46061cdf6b7dfb097e8776c88c5238
SHA512d5fcc3e73bc572db51c134cc926d99df4fefffe9970867b326df012bff976c0c6ad12dc0047b383d6caf1ac9eed88d87accfb885f6d9c983888846db0be7c6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590bcea1004c64d9e821ce4550ff5c9a4
SHA1c7bd3ddd35afbd59cf9903850d8124aa0e2e6841
SHA2563c432d61fc64f38bd4138f17c44daa2ad4bd27bdb0a52a755d27aa540ce13d71
SHA512a22c764aa2922d74b69641b80e14f8a028f9afcb8c8bcd97b414ae6892ef788fc4bb1c6f4efd2805a42e737329805e256de0211f8f15557cedd3ee1019e42239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aecd9d0e60fb3bbf56a8a9740af80979
SHA1a402062f6e3f2bb607ffd2bbe98b286f303abdd6
SHA25696fd68350de873694b397e5fdc7479a480e20d076ea0aed177ff96dfa945f211
SHA51284edbbbeeeea28833329b4825172f09fad129feb4bc4909dbf1b9ee2c2d8ae7d3600d3d490c28274c1a780f444ce0af24a6473f786c57ca4913a47fe6d1d8bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561dbb81ef3700847964490e1ab5e62e6
SHA135717d9d478804d119be2896ce2da75f87cc3de7
SHA25659f76599a4bd383268946b0be4fd355807b7beb7e692623e398b1b5330dcbcc3
SHA51222370dc42025e9db4a4c356ec5208cf1c7d014bb9f753b4057243b7178c9234fe21a735a318f1bd0626e6c66a47cc47663ec0553b638b1af435ed70845af4415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505098b4b6831014b05668859e2566e32
SHA1c8f492121f4d21099788e32ad90a0001f1a2b2db
SHA256545c44c8e38ccd6ce2962d7b4f63ce6e8e83c4b50a921bad2d3d769f96e2f2ec
SHA51283508c3711eea0936889e9dd2ad7f9b7528872426d45307fd1658a81f46e25b3fc17ed413f7234060d809331ee3e78f4e4838d432d704902ba55556a02e4af8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d9a48f27cdbd1fdecc6f36cc263f4e
SHA1abd671c994a528d71a50381a055d54f6f56dabe0
SHA25613dba15606a9100eff8859f007bc27718c90c476f75f53d6fd4ef21ff013394a
SHA51238633d55cb18355a61e66d7d57dda1b41e8b4acbd81a5216a57bfcfffd041516f3c176b814a4e94ee9b2b6630d968e1e44d27105b48d5bac67bb36cdb1022b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59580612ea19266dfb2dbc5aeca9096dd
SHA16a68fdc72ba0caa241cf0989e699d621524d21ce
SHA2567332443d43cce0e3bd2df57ddc98cb01a00ba6fe174099cbe0d0965ad793795a
SHA512dca71ccb96a70d13fa51563d2c3acaaf5c84fb75329147c68263e2222a4bfe64fde498653b53cd0a077c307ab68ca713afb05643d6baf0f2d9a42e8c92d4b1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55881136db4753ab10f372f4155e6cfd0
SHA1dd235aa1f3570e33f0740f13027651cd81170fdd
SHA256b9931566ede3d1bf405cb4d05110d132fc2a5921d15dfbb7e8f9fdd7168e67fd
SHA5128b82befd4603f6fab321229c2de7ef8dcfc3b6ff2b6a478477ef3490b2968a242eaa4f6aecbb2acbf6b26899506f3d5e0270cab8771972d9c7f6f3c8b1f970ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593fd8fd0edc46ca0777cf04ed5f7d821
SHA12d1c842773239363a5c51b0b276c5a1de1ee8037
SHA25668b4882f0f2bcc141a1cea410f246c5faa5e8da17f5e73edddf35cdd7826d8f8
SHA51205472b0172057abff1d3b9ce1a6e224254e55dec63ececb1b120f1cfec579b9797dd9a1610908df77643e07f06744f4f769cbb7e66c07f6e167e0a2518e45bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10ab7162a59cc6b13c08b948c2c1d01
SHA128210b996e389045199a816ca066d618e8b56b07
SHA256de177c9dee5bd58d4ba1306db3087f82d804fa88f9ba10051c75ec221c8e9c4a
SHA512861a934de500af4a45b03213ed45b577d28f0b91d626b13974e21b4450043ba54d02bfa0c17e5908a66ef4e39937e3645690017a87e98c262785594cc1e594b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba768e5f44f62c2cf139d0fa3a6714be
SHA18f9dcfdd3ac7db6503ebd5a1bcad8bd214e8f29c
SHA256546c9a7c4376593d1f3c01dcf6efe59bbec801d32fe3ded39381a7cc6732c852
SHA51266ea244e818c5f44120907c047fab3cf23919cefaa9daf582cdfec236c79f4ac49441396e799fda084dbb63e6bd4505de7f8198873d846efbd9ab713767c308d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573449e889134813c4b8c8ea971f5f52a
SHA1b38c6a2857e0e520d90462aab04a94ce2931b35c
SHA2564f014b8744f0240c328e53db96acb01e3f73da3ce7dcd57c68db706c9a3efb9b
SHA5126557744c69f51d6a63db29949963d29455639d2460215a59e70eee3f4affa1e72b522e3ff820a83aa9fc826fcf9c9fbf388575b74eaeee4814c20dbc629d36d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7ca9add3149e7bf5e0cf70b65fca12
SHA1249356c5898ead89ea5291a36beea0a98407eb6b
SHA256189aa6ad0d3d9ed6371ed90722cc48b3254a147130123e8c7d8177373846f5d7
SHA5123d7cb0d3dc6d316307166864690d1d4c0c3f9b4ddb7d2bec20b49670da5d47882b91b7670d2afd0b2b4d5517a5a1b6f10733a0ead73ecc8ea49d4c86ef87b740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587da279a8b5258e8b75540ec01331d3b
SHA1c94c49ca3bf9be3887334163d7e7b69896f10914
SHA256b156786c3ec442bbdedccce33429d5f5bea70be929833b229ef4fff26a93e5fc
SHA512711901a606fd0e3c7d56eba4188845f156e2c77fe3caf6f3f7d100fc5fc5236c90ca2a64ed6cc785c7ce85ae1c9ccdf5750e97f7d0191ea48c352226082e5136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb47f1232f9e83ac89388d1ff4ca3f44
SHA16f236888b54037d1a5975d3dc7600f14de2c3286
SHA256c4c4074446d7833aca594827d5243c616fc6b851d6a5eb86e76965925fe6e70a
SHA5124de182d1f96179e2be62e7092711a50a6144e174dbcc740c98f9d9a2ca5877bbb05b464688ab9def797c72aad7974f87acd79aa40ecb7568584401b91306691f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516aa2d90917c6e08045d62564b1c1bc7
SHA1d2818629bd218abf397c845fc7c0f89d4d2c5e30
SHA2568e379e1314b80191dcb8011d4e7b1d9a7153b99f56a86e3683bbb68ab1fe6cf2
SHA512ca7a9047eb7c754cd3ea10c855860d2c6afbc0f0c7deb2a1174ede27526d491189585704e6a2e4db13ddd04fe74c4adc4ff71c97d366956b89536606b0e1af2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5877a1df030d274af32535550b3df38fb
SHA1c696ceed1061aaeac308cdb1abbcb5d161023cce
SHA256b2e4f0b0bcd2b7b9f7c9b035a87a24ee4a84127f716ebc7de44a900459ba65fd
SHA512377b9381f41b8d5710bd7826e98dc81b2a37ce4b2e3b4c609e9c3bc25c3a63d291695e66ef3307225eeabd26b849bdd7dbde4afb12f609922e867acb48bd12d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595291c2eba0b9426a53740e360bf90eb
SHA15a4f4bd12b6e634818c3f3ec7e543dff6fe54279
SHA256a6342e8aee50477ccf626968860ffd02dabb5bc8a5fb4c3a0b085a44f17a0f62
SHA5127253a5e090411b11b6c3ddda2f5ef311588e128094fad5bd3b7b703bae30b40819ef2e35547ff1d21742439cc8e4333afcb6802004159376b13cbdca526a1f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9571295f3b0062a06c82cc0e2695498
SHA1d83403f3ef427616fad75ab7679fc19578ba4d72
SHA256731dd5adcefa41879fb8d7826997d79f6939f6f742d1104bc7c85f8d12760fae
SHA5122f0750d10c06c6cfe63fe0d86a1d0f215cf63bfe0f74a9149a5d7909fc34c80fb7a1e1f70d9bc6de5575d1d20c74dd75a1b318f285cfc8b4667df68a63e27700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5090075e5c20505abd992c686f1e10
SHA1302172ae1c740ed48160a2b4fc19e6f70391a210
SHA2560a1dd6f06aafbea0b7d9864544724251ef7d56fe03859ea9a430dce0168b9009
SHA512e0ff9888bdf85208b8aa5a1b00f09c95178e1d84b29b5e7c61b05946e049e55d95c3fff06f025e237251253185389dd7d62a1174ecddb947abde5d1e7162ea53
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a