Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 07:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html
-
Size
461KB
-
MD5
04a8268cd4a5a17ba05720d7b42f5447
-
SHA1
764ba57b145fd3ee9033eaba79d33abdd8eaf0d2
-
SHA256
5a15d78d22910bc52a0976d002c71fa64bcd9edd1160c13289e3e719a12ba1b7
-
SHA512
397898000b14a989f815443fa7554f5d12a4f27f9fd211f28fc7e1dc683504c9d80fb40390a0f1737b2a7d6d8b78465a3aea09b43c015054edef6a354dd7c34e
-
SSDEEP
6144:SQsMYod+X3oI+YMQnsMYod+X3oI+YFsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X315d+X3/5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e6f4403c99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420450531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6846C931-052F-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a425f8078b208edec1c857bbb4266eac702efe28b50cc38d49a10a59f9fda572000000000e8000000002000020000000d2bbd3766967da2784d23f70be7dba2b3b92d4ce8d02896faf31544b5b8672e420000000f0ed2c0260d873e7d1207826ea46463d87cc9ebbdfb9c06df597e00dc2fe4ec5400000000d6cdc95a2bf9e330be22c4921ac93047245d38c9cc87fa521e6030c1d0a9e58c1ac3ea996313914d635f35e6897ae8f2d9334f15d011cca9c8b73e0ec90792c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2860 2932 iexplore.exe 28 PID 2932 wrote to memory of 2860 2932 iexplore.exe 28 PID 2932 wrote to memory of 2860 2932 iexplore.exe 28 PID 2932 wrote to memory of 2860 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
-
747 B 7.6kB 9 12
-
747 B 7.6kB 9 12
-
779 B 7.6kB 9 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1529ef0707db5bcfb37ac9748a81a48
SHA1893dcb098434ad82bb27a0e2bc6ebfbc8a12a441
SHA2565d84fdc6169e202f43698a31f083596ff07d573de23525e97a2d774362992532
SHA51224ab197ff588e433d044e6741d832277fe7a1094d09004b923019e12eff4c9ba4c6c544d19ab1429547494c9fe697bbdfce59e9a97b247628585d615f22b8b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53295f40d04a8954bf63772080837d5c3
SHA1762e5ff84157d30e626a370fed4d5a64b7139baf
SHA25608dc2078edf3409151d18441bf0cc76c60b959fe18a52e5fdcd1ee0ed60175e9
SHA51272a631d8b66cd00f21dcd3e798379b9fb809f85b3d4e203aabc3f6812fe7f4713b04062a2368e8913052a9d7fa10ca16536cef7c401f8ac98a1f2005c274541a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2584c6ca69f447087c33415d4c8fe1
SHA1ee7073c8bcdd08e40748fbe1b4f6c6984bbc338e
SHA256d59b0908479ec387e6c1ab9822cc615854ded0020ae76770f2f17c7d4f312baf
SHA5123fad1be369d02b0926db795598da69984a47f4f55f0f221f91c11851ea196323cba6958db91f9518053c8334a52e2250e85340f90b8ee7e8cde3d8fa1432410d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df3f479ef418982cbf1af2baf9719172
SHA18a855f58e780a64974c235d7a2e432def31deea8
SHA256bcc5e4ef738cd61d63cc417f4542b807d3c1e3eb73a57f636b8ff0deced36717
SHA512652249d79507437285a6ab9ada01e2146081558b4d1ebeeed89d606897cb798fb5001acf9df66ee43f4f14374eed11760867fd55f1344d2b6168df4260be350e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bb3127c2673b2191ca405da8b989afc
SHA1f76b49c23a3fe7628a979945bb5a33014240ebdf
SHA25688ff26ba0fdea4723cb7acb849573a1422bd38b730eaa8ad467cf96ae96e2353
SHA51274fad1a30cacb4ad333d55eea1a3a81e72d2f95ea22a470b4423fd627d195a116882aab38501631de462770033ae92c22a79b8a5f9d907bdcae7d5f4479396b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571cd11314d26de00ff9aaae333cfb3b3
SHA150dd7786a440f438cd58aee7704ef0ebee23f1eb
SHA256bdf4b688f5ccd196f03d5deec7e790305cf4eaa0a8a1747d0c3dfbc078b471b1
SHA512ff7644a8383ca946ad2f6fdca40bc06a2a2c2bb5ca28dc01954ce07bc6c180f53495fd516b8b41dac84895d61dc9e3cb912e1cd646adfd4eeb44f83171cde579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589680b7257710765b3a364e22da1f599
SHA14d9fdc15f139c089aea5328d39cead60aa7ecd7a
SHA2560df09205904b4a38fa13328fe3bc6b39908a964c05f240e561e6f99f4c89be91
SHA5126ebabfee188346674d7a817f454fbca96c3f885c4574d7b345ae7ec3da38f63d507c4d29ad8740dc7b9da4d3f50c73d455837aaf99cf0590345bc6efd34fbc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee3361e9fcbfacf0765c3f9ef0016c88
SHA1aa2fb6f3ac46840864a32ea60599ebb535392bab
SHA2560b8ea80dc0d8697d95947854b6526c4f23e943c62803787d23106ba5b74ea57f
SHA512ff4f46a818b6f0956f327b8e937ef5888b3bcbb11bc4356b950dd45b235d7f3a0074e55848fd1c8e5157b2ed960da6f667d348fd7401aa4a676c8394d939c804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce896c234e7b4f112c03078ec59bf2ff
SHA13ab3e7eff485a579019a2a2e1f3bdd7b81ba993c
SHA25676ad7918172488540f33ec032d055bcd0d1334650e0031cc366872dad15f855a
SHA512f53e71b1f82255edb9c837a2b9db8f471437ea03f6c4893693ad3dd588f111afd247267c5dc98d2abf10a10318c218d67d894e35ffecb963cdabbd2e44fc748d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5964a60abcfcfcc37431eec0939eb1fd3
SHA13d72e99493cf33dbe316d26fa294a80a413db9e7
SHA256e70afa7adb3aa2d16769e38f4aa8a8e9cf63dd5d660a54d7bc97948a24a7807d
SHA5121e8c123ef9f371d25fbaf964cd7f80e1b4f1f78fe8fa3b312f2b7406ad03fbf0638ad38ee2e74dd9e62363f023617089d21cf26b39517647aba5905bbc35c72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba6b7f603c75fe8c521786292b86db40
SHA17eb6acd04abe4b8173ff86dd9a77823b7a9c5af5
SHA256f10a97b434fbc5178283eef8dc81562e0e8d1a485364b877e78bed096493c5b2
SHA512985973bb860778f776680473d2e6615f94e85b34f8629c9b1376ac65efddc8ae630f037841d17ae5318be7c57fc0e58344159ec0792dac6eb74c40a5432163c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412bd3d03573525183ba6856f212591d
SHA1eb5b364d01253586e0d3a3722579707f3fdf726a
SHA2560e9f812d58048e701d9f1dec109365a1952b27a29980a98414c618d955f68580
SHA512ab489dd17997abb14cc4469480cc6c28516c848490a1427cdd2bc17545a9470ca35b5e846020c8005a8789d849dd27e25119554308fe970b61a67c32a383df6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ee8310f86e412ec05d1892b38397ff
SHA1d3fe59ce4389943e74a4006f21f95cb9fbc676f4
SHA2562573b186379d4fee12d819cef13590e579504c7d10eb7c883bc2b80f137073eb
SHA512ce9ba89d1d204e0b2e6469cbcb92be5b28569511384123dc13af9031b1c6fa96601d82d8bba23df1576f840cf278bc2b8ea3f12fa16d48dfcaa58d274d3cea69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9b12a61b4185002c7ad9ce72b23dda8
SHA1b3c47bcf92f4be7d51953f7bb61508c113546b2f
SHA25627395b8fd8267e7fe8d11d4b9d668be6f444c199b09242a5ec8ccfd8b516e60b
SHA5128ec394c847bfa94e5db9374464726f504c0d5f5227a3c5415e4a9885af1b8c74610a2fb1e33d33be9d1f0ce3cea86623495dd884d4369c109d65bd6433efc9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e76470a49da377e90a27e78f3caa1ddf
SHA1dbb035d256fc0763fa7b735b7469fef7c1cb5019
SHA256ba191fc327556b3ad104e304c8fcec345876a5c3b9723aaed2941d4d04df7ad5
SHA512f8df051c17f74f32a391e58a11ee7c5730b2fb606662b451ddfa25e77521031e68aa3698c21d85d2654f58166cab1bb3a3e1c9bd429b8b46e0c9967f8d4e27ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b149df755a29acea15ec4ee828d871c4
SHA1624e3e3967c927464ad23260dc24d34d72478273
SHA2560f2a393431c4390f2cc2ee5fd8d445282de1134730960fc8bda2e3a4e1f033f7
SHA512d829745ce534bdb70d3fe207cb841fab38cd40200cf0478dfd8120fbb8f9881c9b646ee2ea127b0b5595f88cbf0f827d39e6efb512fbdfd7c20827a8a9db58ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a1652ba82cae48f4a8615aeddbe7196
SHA1358f4cf31dc2ef59f3279647b03273755ae7b8d8
SHA2563f9eb0688398e34a023667da213bfa25003a8f16d9c5f55409bb2cbdcbf87931
SHA512107796183da3f26a49371cf7373ca6ae028141ed26656cfffcbf4d127e607db1b92373999fce6ee920f4031cb49f4b59d40209297ae470f77faf2c1cb17ef0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e50a6a06243afff444be68f3219158f
SHA1d8fc2ce252c398c056e683fc796c0e6d0b5a05b2
SHA256678e9dd45dc38a46a56931356a45fe7b5370c8dcbc6d5d5179d622cd421eda39
SHA51219150ebd85131404bc45bccd89f5e68e0f00de5d850f552e5072ae8d759107022bf2a81814377d20f77027e658168ef5c7f0095473f95ac6d4e667a3a416906b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e0898d4eed5c17bc272939aaf70e53
SHA1194b2480b9452b1f39a837c0d6da971d90a12987
SHA256286c42c39670ad9d24ee1f27396abe6b657f4b8f18e25be2975ad5bb680a2013
SHA5121fcd8c08ae459954185795c33a87a045923bf5930397c9d5541ac386b1ad1c31de9093fb8423e6ace89e5e3d6413923bdab195589f0837d03c9df736d67bd5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2928eb242ddc8ab814ea2067e45566d
SHA11fc979fc373f4ae28edaafaeb97b06d78f7d859b
SHA256d24482e3723cfab9d779189f7a242c52e0c9935841f016f070d3433506aa050d
SHA51253de1c2f691cf0ebd47d24d383ccd13d59d052608c1a6340850cd463f76dbcf6ebafcbbeb07dc08818f5b44c034c8aed5c4f3f21cf252345d6b66d801d685c3f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a