Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
3e9e20d478e125ded460628f5b028beb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e9e20d478e125ded460628f5b028beb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e9e20d478e125ded460628f5b028beb_JaffaCakes118.html
-
Size
4KB
-
MD5
3e9e20d478e125ded460628f5b028beb
-
SHA1
655dd8b75c0c87dc4c12112b0c182378f21035a3
-
SHA256
35c80720e190c7d6d0607e448daeadbe47fc43876a41dac1e0e1b10752115c98
-
SHA512
3cfed128bde84111ad04899bb8926e6e78a17fc624dde1ae26a9c81077a03022c51c1e54090b39e7846696ba5312259564daf07c1bf0b8e42423c26d3d7498bc
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWZfQT34:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f7df88a17921bde7bfdd61de44a9fcf9afd5f77dff9ff14b9b14955e4f23b0fd000000000e8000000002000020000000ae8ececb2af4944b41d77293a76a95ee92190649537d9b7e5243c46f464b1fea2000000083bc1be82b7d01b92db6a4415bb5aa9b371e80334650aa53183da0e445c19ffe400000006db4623b3dfe557c214e35898953afaf2337e62707c7013f28ccdf8a486a96553fe1abe6cf37b413f410603fc9e2230e26a7298959d4b8eb3256e09d3ee4b98f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6052c38811a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4384271-1104-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421751605" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2512 2100 iexplore.exe 28 PID 2100 wrote to memory of 2512 2100 iexplore.exe 28 PID 2100 wrote to memory of 2512 2100 iexplore.exe 28 PID 2100 wrote to memory of 2512 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e9e20d478e125ded460628f5b028beb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58536efc9bdda3367dd064a8fa2b0de7d
SHA185ba3ae1f519b281c2a29bb2e9c603c0da7bede0
SHA256a06039e578b4b073d149c102adcab961cef52843f5e1a533586f57b9e4c59301
SHA51231d68efa4010c55eb1bb54e1920f12db9b143f7ffcf01522c41c4d40754ec7f41b343a22d3beb39dedbbcce44e6f49fac6d887efb6a143c7c573ab134c00d40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f2ed4bdc02783aa5ffd1ba187ff611e
SHA154d941ac08c50c59a4ab9a32bcefe804247decfd
SHA256ed32adfb812a13bcc33f280af4b315a1fde7e315661212d2c5e68c3cd477bc09
SHA512d101e75abe696444d2467c9148b59f1ec3be8620f8d7545c08b21a3fe440cbde18993f465f214849030b9e2abb8db76eaa490e7b8ce1a90f1181c39a03973ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f535a9ebb8a8de2b7570f3d31150ec5
SHA1b89e616da93dd98600f340329d6d8c589826bb5f
SHA2569f56b3ae775195570f200499c6c125a34176e6e187ff33523e1bdc46a9ab4fb6
SHA512ceb00388817e2653e1ea14474298a3769f80c8fa3a6e326c5bbde7d67aeadc57328236ad413100bf422600b07bcc2fe9163f70db5b48bafe3b20eb0f50979956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7a9c3bb3b0dcdb6cd12f252593940a
SHA1a4efee8a674bb13a571fef7ccbf6d68c640e00cb
SHA25663d63acc7e0cbf960996b8876da7905b2dfe075b261cc72dd9edbbd51378d043
SHA5121423e300a2f5bb2615fe8527d859629319b91c1f592a54be58d7b64e40be5f69dbabd91762db872dbbc2c25b88d5b60df5b5599dbd7f26b7c8b9da65ccddc57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c46587adad23cf5d5adbd50609d23e
SHA124efa27fa3963a070b23251ffc5e2b9c9baee88e
SHA2569a9acc51a8d3343b113c1cdac9b9a05545b37766dc8b4ab16adf300cca208028
SHA512186a9e59a3f6007bc5de37458461f200b2302590f9501606fc6b09a1ee4e44f4944029e9c58949c651fc3698ca54676ffeda8fe322125e42aea4e50cc57a8b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519fb18a8dfe8fee39a0a0364a73e4718
SHA127b0f2f66ddc6c39e1d187868233e422fbdb3ea8
SHA2565690d271bcf8c55311dca3fa2e5c0027b3192bdfba0979ebb41edc6268fea0b5
SHA51214a026165d3a7e7ea687b58133b172e08e5239b7a4cbcb06f82b09a80a4c941eef45e25ed21227c4f413b494c7e1f44ab5c964a57bde36b1d4c8a416c4fedc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e69cd7ff6a56d4ee9976da83f3032dd
SHA149bdc13340c4932431f53fd7b8a87946c17c7d91
SHA2560498e5905fa36c6a3ab10935d2da0ab798b37e20333accbca8c227a8e94af3f4
SHA512345d34fa2f828adf9d66ff598ff4dbe15b28d79a42e37bdeb0bfc9ea8086342a8ff989faeeb115e74d690a74f2240631805b3bf108fb9eaeb6f802e28658147a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d1e1f6b1bec935c8d69262d1b2e9cc
SHA183b0f00473ada87a06fc5492ff86d4382ad0e714
SHA25626e9ff5e9d1f1dc77b1961f3f28e57dbcbe8c12fc65c469155ebdad05f61038f
SHA5120d59aa55151bb7fbb7ba8e6bfe2834f009ea9c9f0cb96497064423d030b15c43d1c0f342ee87d3d4f3612b6cf132c46eddd75a28ea933b01df1f398007d60e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba1fa313b3c5ab489147be2ca1c6bb9
SHA1860f8d2195879dd7011829c5d3940bf86e9b72e9
SHA2569c664750de9da53d0cca93343202f639f2d128a342a95a413917aec458979be6
SHA5129f8a5dea0b1dacdcb2a26fec94e87283b3a53e206969de5a054ed568f8e838df5c1da563077090784c6e3286baddf90eed151d82f25bf9792b946cdc26c259ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bad1b4bb4aa6baf61b8b62da84f42b48
SHA16c9827a76dec1e5e5e475c56cdf91e22158436ec
SHA25688fd5155c0f8174956d567995b2f80505e9d478aa896b8c028d8fe6528fd4690
SHA5120852431d8def0808d723dada5104a8ba5b08d0fbf82f45bdbcd4973b32a523bd61d74c853641d65a966b2bacd808954ad54280eb01193481d3a9bcc5a6163db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cffbd3eabb9a0ea7fdcc4bd2d031cfb8
SHA19a821f309627855b38c2367731f15b3534317728
SHA256eb39c6eec034d68d793fc3c507ebbe39492f8089524fb9b7225d9e76d9e36013
SHA5126ced09c59211995e9ff9d6cf2779d3e7b9ba7696a59ca6394d3ad0c24f652be3998907137f13c81bfe187773e0aed48abfa2e43652936fa3f8ba54c0bab773e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595783095bb06c7cead75a2d39eb8e0d
SHA1494c39a225fda18f854e2cd94efedf6df75cda87
SHA256f1f55dd89f54e6f56c598c44f79843df51941115269f7289c71d05ee6af0c8f7
SHA512a611632ef6ce04c8ac0a6eac8fe0840d393bd6091bf3229dbef58449891c77713cc81813bbe04eda8558913f8b8d533267347615f9cc745c851f4ec9138808de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56186cbf8a40ade49d1b222c0db333824
SHA1bd4d6f68d5d0ad91bc6cff2c0f8e179655473a50
SHA2561ce1bf3f02365f1754c341152d605e25c359ffec99f5bd54d12addfa37cc2de9
SHA512f84797bcc67fde59949b2d83e743cd23608059ca7e08d77dacc1c4a11d487d2c1275c372bdd963ad8bf6156d3417b3498ddb3c06bdb04a1c85d68144a14a1974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340d1e3545e57ff60204562a505ace8a
SHA1806e8a344656ab83750cdbac6e2e1f6553bbaf1f
SHA2563958a5239373a583e13a59fa79fb99d87df6650d0e31ab19f773b6a9a1475a8f
SHA512564aea2dfb85e35f214d326da44a515f58a00fdd95704beb913ce06c818535442dbc10c13b822c0c1b3abb1e794821679293ca5e1218f4f02fd943f127e4353f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9cd08958f90d36494077d14afd8479
SHA13c4a1e5a47051351ecb7fd4ca130cc0ffd63aee0
SHA256d60374cde0d5c7211297096875ba247ab7d4391765b7891ceb9a1c0b8149ed06
SHA5128869743e7c8433a0abcfca742e0ae82fed28e6d5a9deb608beef7120688e30016c0cd6d30381249aa824426eb4c6e4f53a7e17940471aa8d2101e9092d717fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e869b6e015a5351e6f3da6d50ea052
SHA1458aad196468afcf565615b892ac86c62c491894
SHA256749c66f1a85064bebf3dc0f9206c39b473a36642c374fd6cda1c97c37b01ee33
SHA512f209c3606da975cf18efbaec8ab4874fb2eb466e98c51b8f9b22cdb75b98216cb0097403dd5354ba47b937bb42141724c2bd19096a321949c05a79e80e6fc2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad04feb18ce597f60168a5fe3ec816b
SHA1b4e903cf4dae25d2548a8e6531b2df998d7fb61d
SHA2560092e0df996e20ccd5c3156aca7f647ff093623aa4b22675a78561471fa99b1a
SHA512f0a2534196107fa7614128abb294f73f714451fe6e75c3eb67c6090eb8b4c58cd56facf5dad53b5721610ac966a8884e9a75ca5d4254b19d71662f70f16b4f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54905ac7135769b741a470dfbeb7e294b
SHA1e96c36b4ceaeda8e0bc83ef2af1b5d33d1f67e0f
SHA2567855598412e7acab399bf06199b4ce260e5ab8cb420fd4dc7b4bebba80f53a76
SHA512839afce7bb43f7785cb9a286f6fa3daa8c0dd954f4a2f1db38d2636f54003d5dc094024c7b539c32192fc95784741d0725ee449df52bdc5e6f55d547d41736a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5f24e2a1434d6343f701ee0171fb62b
SHA1352fdb1d2346d067cbf33e0a423d4b9e2d3b2c2c
SHA25648c8ad1570ce514ba208f52a5baf582d212fa9e114b562d6dec0d1fdfc005941
SHA512beed7c4634b954b3e475dab66dc08dbd4c6a27b7b60b13e07d5244cb8c6234d0a386bd12f94ac201a7b35747e4d419dcfcf669f6b619899dce0f1535fe6074ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b5f8c19aa01d96272df7476060cd8e
SHA1f4e642f952afe2c331bd314015c8f8affb3a552b
SHA25651d54213ec44cd6ee4c8cd8b26f2f592a3d00e841f71f09d8544f30e75ee4b05
SHA51277a9f25ad61c8ebb4b268db580d199e5958994ac7f901d6197da7796348857bcd29f21b22e7f34e123eca8d4afcf05fe1f8c526e2a98d553b0275aa9b2d9aac8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a