Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
2daa9fa41a8fb0c2a037112028dddcfe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2daa9fa41a8fb0c2a037112028dddcfe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2daa9fa41a8fb0c2a037112028dddcfe_JaffaCakes118.html
-
Size
43KB
-
MD5
2daa9fa41a8fb0c2a037112028dddcfe
-
SHA1
b65f148f9c814cfb3e4c4bca16e7c2740de74ee0
-
SHA256
e97524fba87d35f55725d0eb61b03cebdeabad12b5ad7805592c86e87b19db84
-
SHA512
5555e6ec8d1b3e1ea3311ef586a246ab36e5019831ca01ddc3d3c425e9fc52ea284fb18b1ccb3ccffea6d109587b8b37329878586304bfd93c6b91801f1738ed
-
SSDEEP
768:StEjXvEzM3NMqIMcQ+gUqIMcQ+gWZ2ln6iPxANvrm/b8:SWjXvEzM3NMqIMcQ+gUqIMcQ+goY6iPG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000009077af317210bd3ca793ed1ee8bae931d67ac8abcf137a0882d83deb0cf1f821000000000e8000000002000020000000240138a159d686be993af259de0ef5412a465e9fbb155c4ddb786937f6ff7f5520000000e94eebe40bdf6c40559a4e4da8c823f1f1f51c87e2fa9bd7233eb2afce01eab2400000001711445b28a46d685a965f3b17888dd99ceaf6e2decf18f5fb3295f6213b5bcc0bf18bdc5c6db26464b764759170644de4eed19927c58c7989e0479e678294ed iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421482302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFBA1F41-0E91-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107c44ad9ea2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2920 2416 iexplore.exe 28 PID 2416 wrote to memory of 2920 2416 iexplore.exe 28 PID 2416 wrote to memory of 2920 2416 iexplore.exe 28 PID 2416 wrote to memory of 2920 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2daa9fa41a8fb0c2a037112028dddcfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de45416cf3efa8766f21a5d2590b23e6
SHA138d020ffc813b5911197e36836a0132f95191a2d
SHA2567a23db7a22a2c117eb2e9626cef16cd02e4510080e588c48545e7dcdf94f9633
SHA512dd19e4aeea0a81fbacf8117f43fbf4043de46e84545b6caae5257a0b81a862c981e5c98281c84d53ad5342db2121adcb82a76795c55d1f5603e413caf2a7aee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591788742f8a1e69c43d0bb28fcd2fbe9
SHA1ec232fbe72457932d13f0ba45fd30c4ddcf221a4
SHA25602d20650cc04d0a1ae0c1f3f6245e9d039cbfae1c775beb140bdb0a71e4d59dc
SHA51244d01abcf44fb18137ebd11f29e4a52c48c09cf4783bdaf7f1e776fc86a99ba15b72eeaf06c67d90bca2b00fcc44801422cc1585e5d15bf1e67a3911eb3fdbdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152829f8c178cc45522dfcd10787cecd
SHA19f06936564fc181d3eb019d1891bc5c66e73ddf8
SHA256be827811db0c48fc5a34ca2eb2ed467398f2de3cd4da32fefcb58a0aae2ad2c5
SHA512e93df63fbf41226308f6004659ab290c82b2ab7250a07573d56c2e921a02e86c44b88d40e5a76dffcf8ac70d78a1d44c22cca4132b75a9b5b40041c396c749f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c753bdb1b20c31d34e8af2877a465c
SHA1a311fbfb4e24332b33012e31bcb5dd5825b1d893
SHA256179d545c4176b43d20d5696631476f0a8f7df963ed977fdb8ab759626d16f7d0
SHA512d36b725a924cdf4e0504490e04fb0d8bd0c8f037d5c07ecbb259abfb93dedb7f94075a7cb2b57ec5a7e8bd4d207964a489313396132cea960cc7ed775aa3942f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc8b3d349459a6d89259a2e09f2d7634
SHA1631197bc396d00188b17f5b493df9d37d2349b36
SHA256357f2469773e607fdaedae14e9c4eabc2b5b1bedaef253b8b5074e6805655f1b
SHA512d646f0a62d499bbb37e17e4ed0a63a9ea5aaf21979c30667f47a34788f208da17a647a35e3fd3c965b321b68b6caeee985d8a6460f8770cac3b70b5887715a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e6e85f4d4dcefac57e117da265b53e9
SHA1bdd19d4d0f0ed2db6469b6c270d84dd6130c53e7
SHA2569ff9cf51750404fad3c30c2d9c739d83a30a531576f2e11d1901cdc86b38f86d
SHA512461d58de9e6cf8efafbf2508358544703669792f6eb587a35c5357ff2620d1cd2c3da79134d32266e84e61669719d2ff5125c10bb78ac880d3fb0bcc7950c281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f52ced350659a3e53b466a3e9a424e4
SHA1e6b59ce2e84fcb6c0c8c4802367ce2f3eee969bf
SHA2568b276ff5e5b89b3fa4ffb34b7a3f4fd78be14a2ee32a8581d677d628d1b03a4e
SHA512c841d93e3cbe8af2e65cfebb2a3b03db2ef7bca96f1f238c7d6335904e1f04881cf939396068d5120b82730200319cad08ed9731c397328bdf884bfb357cfbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bab480afcc7ee1e26fee450215f1cb
SHA11647e174f4f3cb5cd6b460b825b5db092d9ad1fa
SHA2562c81264e4f5c8f0f8747f20ea356c786e5c2321329c14bc49aff479c8fe6a043
SHA5122dab1aa2cbd0d98b2dba450c457358c97112f7201abd71b968327b4d5f47afab36692cffaa7ce7ab53f6cfde57fbcc7590c2e80163870a1228b2139b093dc8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575cb0009decde9936baccff509b4078c
SHA168c40be7036ee203bd362a4a6611e0c5caf2ce05
SHA25622f33cc13546df76232972718ab2dd4d28077e74a715930ddfc78491375a0de6
SHA512d42bb35c03eca23eefb816f2f021c90ad5ba9a37561477e5fb568a98c064e5ab9f77d745f48d8627220a0a48f26187685544e407061487fd9296711262366fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52053be564949efa97ccee2cdd0275fa2
SHA110b5311b99b04afaa6d97f536ddc9646ef31190b
SHA256737b8cae2e874ae639f2d58087546d9cb2335357bc8ea86c81e75d0d92c61b8f
SHA512319f32339a47215e0b1ba7e0e0d7b1d5ac22262c57664803609f5115682e9378ce11b83e1075c24992deded045d3601598204630319c441d9284227601aa3dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f0fad1a72c69a5a6d5fbf5953ebe768
SHA1e2ac1d1dc53924489a384d773bb2feed12c5b8f1
SHA256a3f7a11b27962706656f5593a2a9a60ddee0ccaa493a104be6a2f065967ad2f7
SHA512d182b3481662a44819c0aba9f86cffaf6647ff693b68ba1d352caa4a5c9dd062d3529ffd552f5453256239f23fe4009bd52e38f3a98bec41fb8a25d7613ed1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c314219a35cb2d80f2716e554c3506e
SHA16b8ee8c05ad39a3d19ddfaa16dca28dcc88c54cb
SHA256fb40e9994eceac2404e5c1528f89eda6dc418a2ac0bc4ae4b585594831f608fe
SHA5124279b79b2ca62bcf617c450c83d2c36ff20d9216e880c18abfd88f810b06a7f3399c692faf778008d11780f395507f659d754c3db890360e178e2c25b6ad64d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ac512e093363075e63069a2f6d7e1aa
SHA14a942cf404f0379577f712e0eba1916f61b1f7cb
SHA256211c40757720dcf8c636ee2f76299e11a79df737c6d49c83a5b52774dee02e0a
SHA512e51ac29241175788d5617881cdb47eab2b7724d46a2ce28694361552a5ad1868ffbe7744c855509c2b9331bad9aa4507bc0509314d627807e7b236352f930e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c2b5b92ca05a23129bbaa60b6d49cf
SHA1a6230df087a3bac89c304a96af23bade748cc5bb
SHA2566ec80f048b6331153e96919ee421947f3805dca69cadf4ec399aa4fe534eab57
SHA51200577c088e303e2fe4acc2ae79efcd813dbd4130a7eb700833399b164037c96a55c7e91d97baf46197efeeb71eaed38a11b7b44a3f3cbae6368730bda29bd251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940b4624a33b6eae0043ccd3dc0b2cd6
SHA1328fc483711324c54940e7ac0d9815f0d0ec3653
SHA25683960b5c50f3900e27e8101e75caf27e6d6a24b97a0840db1c59d120dc387705
SHA512d7bdbe32d0c8eba262dfb94eeb18228f3179ca7c9694219d32858700b10469e6ddfe93e32009568e33e239f5307ca109da4af7539c662f1095ee6aeb67aa531b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e8a8e9ae20f32f9ff6ee4c7107b6d3
SHA18a74ad974c423ca0c5a05f4094545e2003a44264
SHA256b4f0787d6fbb350ad602b435e8be2c8cc41f8574ff595f8be99d192f5cb99507
SHA512e92414904bb99cd2739303fcd93df480c9ce2061ba298ecebac465be3b46995c95589bc6e7a084479b9a491d1ef1653b8febfc37db9cc986cfb438dc55dbef22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53effabb19860cbb364e2a90cf46bae07
SHA118f78cd5ed1a67109f23cb7a2999ba8f42f6371b
SHA2569c1c591d5313766d76d38967c8690d9e74daaa23503bdfe8b432affd94e26f75
SHA51279fc8d194f805eb5c73e61bfe785cd64d756a32ef764cb7ee83e9e54d341e91652eb357f9653397bdc96ec49619195e211b93970728fc6c26c40772a54533a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea54e3f52726366c63f22ea462e556f6
SHA137e03ca4d928bfdb809c203a0619f4fc464251d2
SHA25612c0c4f0505991945ef6ec45de402a495a0eff671b1c48a6f54c2b6d2b20b53d
SHA512aafc29bde714b14a4798c669c31263ae1359eea5fb65101368a482c2ef1fe40ba08cbec9e17482af4a2b52544c09e5fc08b4ff4eed927256779c420490a649a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb42ab7da3270e7bd36c563efb64b9b6
SHA1cf6a4ce3de692230e164eb538faf21b91d1ee98e
SHA256be732cded6e82eaf73e0f0622927314a38046744cf778de720cc92dbd3b843a1
SHA512ec0258bf0f45ae55b98d084d91a71b2012f4ce7151e66d03979e611d45b80d28552d643d5151f6b2107140a5c07cd902a3661211e1434159dff78a16bff54d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a4de7e8768246901c7683b5500938e
SHA1f95a384223ad932e1e32ddb69d46069959656436
SHA2568ff77985c4ab984339244b9a1c3d0b92c63b89285163d662aa6c6cbc768e8714
SHA51219129dd0903b412f6beb7c2e06f5a288377ed0a95aa5fa8c110f6731da06f3cfdb52c7b388b05a6e67841f23ff8971202d578cafe34f9dbdd604cfc627b90417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110c54b328498efca83e0624b84dcea1
SHA1a0b4429bfd25244cf60397242c25d275ce2c7750
SHA256d506afdfb8065b27e4a62bcb07792819223818cfbb45b3132b16c90441db5285
SHA512f072e186ebb495e9e38d5bc2b306f0ab93a0955c4175cf12e8370690bad1ee3398435371e93f00f76bab3dabeac2595d04b1751f03b0357c44925abd40fd06df
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a