Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
7a17e3f28029e035afcac79fe67bc916_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a17e3f28029e035afcac79fe67bc916_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a17e3f28029e035afcac79fe67bc916_JaffaCakes118.html
-
Size
22KB
-
MD5
7a17e3f28029e035afcac79fe67bc916
-
SHA1
c0f40d5920757380c7c28fb451248131efd15c9e
-
SHA256
f6eb2491f5daba2d0d5da23f5a5218feee2ef65cdd95ccdb0d90eb85a5cece84
-
SHA512
5680720517e11acc98a4268a447939be7931966d72ce7fa384ec9cfd137a9dfc9aa6addde5662f19c48b68f8cacefb68af99432747ca2fc3fb2d23aa1af54fc0
-
SSDEEP
384:0SeHRXXVcPwEpwlgiphzk9hjdrdjN6qQOa0FWisypbHwh2fXSU9lZPT8OqcFbYX6:Sk1pwlXphzk9hRrdjN6qQefsypbwh2hz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90896efa63b0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000fae628dfcfeeb5901ba15dba9e557d053bf0660e7ddb101b275558d7f242b384000000000e8000000002000020000000cce5a22d45e0367bda2251102714d92a14facb583339709903d24fd305c6a45620000000ff219d06555a3d65e88c6851f3b4ca77b0884ff2eb1b0e908e58df3e952b61624000000073ef0019dc0a55b29d3fd452b3da7ed4fda9827e49573e7d4f75edddb57d588846cd18198d04fc3bcee4e4c3f7b003bfcfa8eb7a7a21b318fb66e9537166e9e7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422996476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25C97191-1C57-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1744 2348 iexplore.exe 28 PID 2348 wrote to memory of 1744 2348 iexplore.exe 28 PID 2348 wrote to memory of 1744 2348 iexplore.exe 28 PID 2348 wrote to memory of 1744 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a17e3f28029e035afcac79fe67bc916_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa2b59e31f598255cab5cd03ed21567
SHA100b3b808bc28f6fcad349faba411b3436847c471
SHA2568956c35d8b136081c9dade02cc332829cfeaf7ad3d012040a114b26db552ba7a
SHA5121b7aad37a978f492ae8aa73c5e99195b19d40bd7951d8c1f25aaf8306482634a8d09569acac3359f633c1a3423a082ab1c92515b0266bf9367321c5459ead7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50269fb4bed6d84e6a87dc496cb6f4787
SHA10f82db3bb0d19881b3ccbb65a4cc870c31730e80
SHA25664642484a18addf8ead2f1de7e57bb40fe4c5e916899af3bddc74876eb815d89
SHA5120254d74695f48355d0942550906e6786046cc720f0cdb3b4c18ade7e0347774978d2057a5f61b25c99bdf1de5789a03a53d91e6846a04fff3c183141517ee049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566bf18922b1494fd84dc5ed9a51cc593
SHA1b80a38d7a5f9255f1ebf76ea9aea99ae17040cd8
SHA2560fdf7c4ac1e76bed540714f549ba585ce3cbcea26a066ffdd0d940f32f2d969b
SHA512aeb24501e937500992851b8db40c0ad48cb1956017cc5a33525ab3625b4d7f80f9d66cbdb77db5ababc6051936a481ae8097c53c84f31f5f5801b486ca85f98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b6553f83c2616835610be46f694f74
SHA1f85d8b3879e8b25bc97ad647d9aa08a94acff0ce
SHA2561ccd2760054fe5539e69f65bdce21e189f0e99ad305e96102ee2f54b9ebd8693
SHA51206fa04fc4bbfd368ee88cd010f9f4ee4a8dee9dfd041a8cf922892ef0f6ea5653128a0848a527cd5373049810cddef8d2fc3b14f7b6281d18ddb3341166cf172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ef7f2f465b09c622cc469c9147206e
SHA1e3540810ba5dd19840d0a06e29da8dee3bbde1c1
SHA256f0c6dd08237b835e4f1cbc292e51d122b62e17c1c197d0a74b5c166da8059dfd
SHA512e17b62c3099f8ac8bd25945dd96948c72b69aaca271d1cd80b54b0e0b3b7c1a9ca2f7ddbeed9246d0be506c68920bc0611e1cfeecc17cd9c4a79b5ed45d12543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475a2917745ef720fc080cf40c87ef1c
SHA15a10060104487eab8200ce3ced336f39ea8baf1a
SHA25699700508bca18b4ded113ecf57b29ac7163e177a95078ec0e2acd643bae6d726
SHA51229831824029931680d22272e4b28552ac4821e02459e20eff232e8453428ae7d9ad1243d4b6c52ba17899407f0014e302a2ecedf06037d51d50a603bf61bcbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f4713291e52ab8f728382847deb88e
SHA1f9abcf1fbba4a4a9e633686f0b7f2c5fe392af25
SHA25607489a501eda94d71f637b1201ec893adff24b64704cc799135e74f42a686b3a
SHA512e384b328843278c739b96f43f7ddf5b6acd815e66a1a020106e913c2d77750a714a89edd584af70d5e28a7b69488e2f08c46836c009a4b404634b0ead59ff591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca7071c9b4490b0d7d031da788b93770
SHA1ab8169239ccf740e9ca53df0fa886ae34326adaf
SHA2568792c9d80327a61d486f27d88cd139f200a3321e5ed21e3d1405eadd7fb3f9a1
SHA512c6df6b9128ea711d208666d81a17af5b357dcaea558ec9a236b67741b53eba37a72da78a3d65a37b31191ae66cc0f9075e7aa43c5063567aa014816849a3bffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6842692e163870f6ccbc60e3f1b7cd
SHA1af2de190fac55b5f2a5c8ba82b361767c66352c6
SHA256ad218d2ba581c2aa9c54411ea46c9477f02ffd88ba0b325c3d1438c72afc7f04
SHA512784e3d53bb505d1f35baaadc4dc133b80b55eb15f6eaeafaca5599e36792fd0394a921ed8de31144aa0144898c2d2beceb3cfb60bbaefb82db85eafe06d9c50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50208b70c42cdc79cc93f0650b52615ba
SHA11117676f4fb1fa335794b181e2c48cd2acab55c0
SHA256ee6cdfa522816f1ab1ebffb3aa572c5e412c5b77eb69975f6e9b8f5a6ddc8e42
SHA5124c71c9c060c1ff40413bcc6ea79b3e7a37b192ff0a9eae3416087d805599f3c1e69ff7bc20f18b3e439f98b7bfb2aff7fee9d7950905726ad0dc2aa119b0b7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea984ca8308db39c3d1621ca120e891
SHA1760ad0cf4762e411eafceda1a5240df55ff4aeb8
SHA2565e02d286a6c4239e025f3e4c88182f73459095f442878630e745f81716103281
SHA512b89b901b4ecb3cf127cf69a709e1a08bc18353cbfa62876e0127fdfcf522099fbc14d8971ec83bf1ff049fdecb31ddc735ea9e5ff2e2286c48a58778eb99d888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50043ef248dc47b7dc1013a77574c2c05
SHA1d73d96e9c19e13e9ca5efb4cccaa94db662c5095
SHA2564c19b6fdfb75287c044d8d602a00467177c31c447d26ad2bebd63fcd0d7774f6
SHA512936678040692e1ab4429844d64dfbadfec41e5bd137c7ea25208f711c2a38aec0419b3c917b81969174ec24210183370f962498af181db92fdace59d2a8f91e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a88394cba15e99fe69fedf568e0a1f14
SHA129d4c8e3e83385454c98439a9da507c4cca476ff
SHA2560bca6496245c208757a8aa863c2e9e43b9e28af32adf678b64595ec561e37872
SHA51296f4f6cda38d2af30301bacc5d1127b22abc00051f2c5f9dfba95a6d03f08358581c29359c43046aef3c2167489c3b38840db1a1691b04060e5993435222755b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58411ae7690489792d938baf9741aa3f6
SHA1ca131cefe3853e3ceb718f4bf1fb68a1b543cba7
SHA256696023015ba34aba7b259a15003c8b85df0843ce8d738c17a20f94b89592308c
SHA512c7af5f189ca43605c56267e82193e703bb4ccd5f120cc43046c3acfb4656f38ed30e8c369fda4a06a8275e2806fc340e1178e99cf4112e00229584baf78ac6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a4c56617c5eefe60a155c4956ac960
SHA1d66eaf15026ebf50a43446428b4eb85997e56e09
SHA25612b5759b3c7db1a3281b6aee5a571c2807eda367d24c97c50984cac1c7e5ac33
SHA512944455df48fcccb9511668269aafd3a470b8192ca0026a4a3d1ede140c520e45bf0c238d55a785a0bdd4c759f782dd377b2f0837b116295b30231f4d149ed2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d63107d09b1a1878ea7c1289afd9c4c1
SHA192fab828641c2486b06ca8dd5f483a77b6d80d0a
SHA256762de63883540075efa5d328833f47afbbf1aee009e89ab352faf2b6658b020f
SHA512aeec897e2dd720b3452743c3f56c2774ea3c742bf0d557bf4fc0f025abef12d743f5248dfbbe83dfb6e79e56e38ccf0bdea076c8a952f7d4b5c0d05dab59df1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b04a87a92e7cb000f268a62c9b1c527
SHA1f7c3750870a2d35e43c5797badfde133876a42be
SHA25604b7258b6b0f5412a8b178319abf4b603e08f38bf56bef12fc641b74976d497d
SHA512e47209a39f036f7938f59901017b88bd59b9cdf1e9ef07c9d5f51cbdbdaab11e6e93200e5f92fe67e75b54aff1c5f4491c36b7e014054d97f9bbf3c5bfd7f802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa135e3559c0deaa8aa8669dff6dcd36
SHA16311ce1dc31ac76691118b4ecf4c96b0648e7341
SHA2560a0a3daf5033ccc74f5b883134d2280d1dd9381322d4967841772249671f13fa
SHA5128919793f823bc4706b8e878d0079b3e8762cee90e1863662928f73de8cbf12214015c76da69fa752748315008cbad92b78f319f3bd5c1ec1658ff804a3f870ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575be99094c2af2c1e3ce1c61f35ce172
SHA18ce077bf429ca00613ecce24e9aea19aba61bf7e
SHA256925d6ed6bf9922ffd1a098d9c0803332c765a6f57598280251cc9f5add8ac388
SHA512856076c0734881a0a8e69a29e08c83030a1ebf9dbfeb42ee8878479ce6bd524106c8e02447e65a2642a38c43a11f4447fb7ed7740b7d0180915c7a01812c4c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cfc741d64cdfc55681d45eccf04b483
SHA16e6e344ced36b10f011e8ca82205b425ea9a637e
SHA256aa51cfaa85362c798df51bef8e18772a318e6f6e7232a40cf059902dd817a9a6
SHA51265ad42dc2dc66293ec0f9490a18e9ab53cd295ca752f13a98eda4b533be2506c1853901c26bae020f6a342fd95e626cc9746a9782a2933c21ac2172239409248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb35f84c63a84265b42a0683412bc595
SHA1ecaee963e50b9e474b575e0a9003cbe4913d0681
SHA25687c1c23333cb6bdf7efab5a028e877b731b19b5ef3af3862a1b76ea16c5a8b4f
SHA5129de761b655fa2c8a7e2cfe0f3189f999c3e0de5a3111e38117828f63c9e27b824ce37ec963843e937b62faf2b842f10164f9ce1f08a626fa7be05960b5110c4a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a