Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
fc7510d633b6d02c5725de3134c99bba_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc7510d633b6d02c5725de3134c99bba_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
fc7510d633b6d02c5725de3134c99bba_JaffaCakes118.html
-
Size
35KB
-
MD5
fc7510d633b6d02c5725de3134c99bba
-
SHA1
b3c85987a95fdba04cecba4447f4665817ba3e8e
-
SHA256
8028641166a90fefb396d657968bee010417c29ca09537152632962cffea29b4
-
SHA512
30a9262f3b514e760670cf57a02b4f785579adba4eafb986416dd0fcbaadd766601c72e19efeb2929fea5e0a87aba7f8e3203e0f4128d77dacdac77069dd3326
-
SSDEEP
768:SO3QVDLk8H7CEXojZ3gKyoyqy8BwheRPo:SO3QVDQ8H7CEXojZ3gKyoyqy5MPo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000fc8833c48d39a7c01cfb4acb4e3402472b185f92b7195a456f3f72bfe37d7d67000000000e800000000200002000000032b4e20d5cca1f44aa0ff99aeb74a44f6ffaa74d2ef19d981e5d22f8aa256d3e20000000087d93a390870fa4962c76dda564191b38baa256759646a9fcb294fb450e486c400000000098166d47cde0196a260319125125d63a084979dd0872871442fe0f034cc90d4b8c970fbede84a61f113f882b77e8e3f3ab5f001a6eb964695a6db254f76a61 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419767686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809a24550693da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D02BFA1-FEF9-11EE-989B-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc7510d633b6d02c5725de3134c99bba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d9146a1194ab651e220e732f2372f3ca
SHA1d0f5184bfd359f42323f15f24d5dc73e8578419d
SHA2568e87745197888d8be82d60e7d2154bde259d8264534451e9a3b245062a78919e
SHA512e8cd7da080464de1225c5d5fbffe11247c67f7da450c575606cfe1fd82836224b771efcea6515726f988881a842c50ec76d7b9ccea6b411bcb18880da25ca0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ae2697a21b2a5aa8468e338f0bfed6
SHA1450a64030fb7c8e3106b2e67333d7d7926cedc88
SHA256ebb0c1dedad6317c3e63963c13f37e97bf2bf08532ba742c39217fdbb54179a4
SHA5123d57d51c09561fd850e06bfbe3e6934dbfc31e71d85e3b838867f019549fd46413bdbcef53d3624a488f369fb122d0fe28e31a9359b1d60154a501d599479e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e77ba1500ddad686b8d4e321f6347d79
SHA1ea785a2f501c1c3e5a4e8e7eadc958544d905108
SHA2569bf2aefc605ef15f8b397d853abcd3704d27136c0ff61f3e724af26474b109a4
SHA512b92fb988ac67a0a4adc6e8613950b4012acade7158383e40e21b1acca6d549ca2bc76ffca23c0176a28e262deb262ca47bcece0801f94dc5ea2f36dffe2c0ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385fcaf7b1506bc2681e8a19a3217080
SHA172c80e5064dca554a2d222091f69fe5aa0a51986
SHA2561de8f708d333fdc41e8d0d74707a56301a46e52c8eed5c3d66e9bde111185be2
SHA5125f48095009675e52149a3a8b7c132d8fcbe45c011fb02dc8680fcd5586b2d6f0e55643bb73575fca0a80b839666c2bcfe2b604b033ab7e5c253cc2022a209623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87c8a560bd07fb626b85b6ef12bfb31
SHA1104cce0b10dd00f693bfb98190b206681c7112cf
SHA25680d8040941df0a314999d388ae6a1346ca48c25fbb980217c86e93b0d6e2c165
SHA512b17bde0a271da6278d14e22f9250a74e64cf688279c69ea3783c24e4188fe2723a9095a5c30033a3252d4aabcf7a8d1e19e22ffa8a3803f99b8f44df1aba8cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe07ee86807a03bbb134704a9bc68351
SHA18d0c2f7c8143e4312e0c6bedcf3dcdcb8c3f89b2
SHA25678e86d542fa484415e773fb6a8e6d82f5de64dbd81fb3dd0218376b1a9f49ebc
SHA512fd889c8f65d1b5bbcef3764307d1b595f0ef360a8223b9eb8ab0f8ef7ced7f229ac60b99843a36db46b31392dacc9a960701f6f35f825fc785fe46837d611e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8318b5f58f26b70422e00e08e7d3d7
SHA1fb1ae9f8fefc7f378aabb52b7981982a4b30f605
SHA256494f8c199588c119228188cff1627cc43422bf4129f75255824232b34fa70f1f
SHA5127433c4dbaf5ca069003f68e4c1325f102fd9915b4a0bb768b4c73ddfa8cbd37b2876c46319fd18d22138d249db46ce5d2466502067db3fe806704f7b81fcf78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7d01fe3fe77511073707fa680db1256
SHA159ebb49120a6efcce5da1f68fd9ae8dcf93bb9ef
SHA256333c7dce0010a3c1bf0b577449a767c60aee0ce84418d92f5df83c6039df939e
SHA5127d698dff7172ee98198ff12634b19c2784619f3393d1dd6454fdc3b2beb338f6100012797c0d143ca7fab83edeffc3f34edeae11a8625bdd113c6074e6ac7430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5891bd7c27a3d930f4f95c2559694b0e5
SHA1a3bd28197a1e26c2bc6f77edf83d70fead17f8ae
SHA25601e566228e7d2f439eed44f4f8fe84862da77498eebcd7b2bbf221cd6e814986
SHA512d2414767382330c69fc5d9cafd26a903a7d154015aeee3cb542e8c80238089ecdd14ca15bf571f2d5ef8547aac08dd79ea25bdd599f91e49957f09b76a2bc742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d2e57f579064cfb81daac8db7209dab
SHA137d65adaf81fbf0fbc82052640fc60129e9ced7e
SHA256c747f9a334c9e627afb7d81a2517db3dcf85536c971a5c5b39d878cd20e8002d
SHA512fce2b4c8a870ffa4e7247e84cd14dc44515dca56f4d87c07564c0a422585f2eee5f0646bb24412d980f0252b5fed3066d9c006d28ceda83d2bbd5bdaa01bdced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3b813cc1ba2b075e637c40aae80d12
SHA1a8c480b6ee663f9af61097d5a2dfd47b3eb93fd8
SHA256d2b6a41bd3c8579cc5db820209b772306f646230876b2d52e55f6a3e040f0cb2
SHA5129040ac2591334d7e39526de7bda159ddd38317a93e988efdd9d6ef6e317db395516b7ee01330a1b5c6139d8cc44a8744b24e471f290878e5c10a2bf442973955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f5c0f73390f5c3476ccc01672525f54
SHA185a74481fa9e5367618973fbc7fa151c029d3f3b
SHA256f54d654c11d41f0f4e76924383fa818af28418aea8c8b2299768a64d45201129
SHA512331aab1617aeaa92f04ee29427aac41d87ea7ed6c2ec12857ad5ed6b28af64aec461baa59021ee070ccb85a2af4f612a50afabfb14b357592e0ef017c3c00957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bbcc0832f5335f3130894e3294969a0
SHA1631490ac5aa70f61f1be7462ac44680b9ee6b9c9
SHA256bd046ccabc3bb4207135afd0446e84576c996d754665d029c957b1a3a519dc45
SHA5124bc2353a04851c294e519a14bf09449659f96c68882b6eeadb6da5ee10b5986fc113b13581a87fd9d2c7210ac3247ee8f9d6ec08a99b690e0049f7a1b1a5ef83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53305057b1f37e82c3243e256fa60850e
SHA15c91ecdb155635983595af74a125b06b992cc723
SHA25624b8a2a69c9054843567599e4d034bac19d08bd90fc1447e682e02d53c642687
SHA512f5dacb3cdd6215d2bda28611ea2f7bc2cefb5d17e59c74c58bb2dfd5afa931f26075389a1ee8e6929d6d18c3ab7ccb02b1494f6f6108fd9cfdfcb8d511a899b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ec8e89e185f2ab2f2705ceff32d2b3
SHA18537a900196a532c3bb61153d94da314cf3d6343
SHA2561915254f8c1831e8179c83f2fefbed813fc8e7d8080d98ce4df3d547e5affa81
SHA5125b7969e9862963a1d6c84655f67a072bad78865b458aae272201f445387fae80a38a7065898459cdf7ecfd43e77637ddbb56d6b65d3e7d9e5e37ba3aebedea9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8b6985cf3c8213a0a4ba4c379e8e85
SHA1f2f6f2bd7d70b2fbfa647702f88692c550127765
SHA2563962501aca4943d07d4f9499455fcd4ea836354331d4fbac5271821074f45ffd
SHA51290b384635147de2ef45a3aa497e15894700c836e7717fdd36b9a2bd61f6a1445c1fa4e91a218dbe014fd860b32504f97defb4062473e72508acbefa46a0c0bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e652c0ffe2eaeb34ed2c9aa5ef193d3
SHA10fe56dfe6223f98fb16da5a6997b2eb6d28e746b
SHA2565b7bb055ab6b3c42ac5f0a02d360cf323957616751b09048bac76ee060410c56
SHA512a93e7919da668ce4e20f0d1dca3e05c735990d9d6bee9544562695d3a4cc646870a97424fd10506a1d312369c78161110e15d26a5c38405e0060876974d84667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b074788c49998b6fc8a02bfe6361d7a2
SHA1173000abbfd905fdff7eaf78de0f80cb5413663b
SHA2563f3dfc50fe7af8781eafb1138f60c9e2c5244c0510baca93f7174f34b9a09044
SHA5127f4d648f2ec3ff01d53b988887c0142d045e67a8be0f0a143a2b7c606eef78c76900032c9dcfcc4bce5554a17d9f5a59f63ee8ae5b85102e854fbbbd1f2a2c13
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a