Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
40638365757b7e4766e1a4dadf7cba28_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40638365757b7e4766e1a4dadf7cba28_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40638365757b7e4766e1a4dadf7cba28_JaffaCakes118.html
-
Size
94KB
-
MD5
40638365757b7e4766e1a4dadf7cba28
-
SHA1
eb8cfefab8226c51b0c4e3ff21981b96a06aca2a
-
SHA256
92ce4c2e00c313845409b3315eee2da4c38dbe828e54ee4bf25f0f15cb3ef697
-
SHA512
52225fe3c3c345c4c4f984a67f328d2757eae38ad418220ceef2ff1db812b6d90d0592009480578ba17c65401c989e1dfb474cea9c1fdae1655c86c436d760f0
-
SSDEEP
1536:WMLiNar1QLV2GSiCg27L4FLU/NjvAfLBZ3yz47iBdkrY8mgHC+qpEyW:WAiHe/BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421779703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FF3A9A1-1146-11EF-972F-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402925f752a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000006663f3f5bf36356ee5451ceabf1fe41d220e12d68aded0b6616d7cb7d6ebdb7a000000000e80000000020000200000008c037c044968c92b1943b76b42b71e500f071e9307c6b19295d746637aa87bd920000000a36d169138645bc0d01f375d2cf31f4a66d71c2db48a9ff54fc844cf16dc59f540000000ded070461cdb7a369a81b95da7824b1c42d1c6a66fcd7c25cf8c8dbd7f7fa139b6abc616812a26add13ea2f9858d78ff84498a24561e33f6514007361e91286c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2840 2112 iexplore.exe 28 PID 2112 wrote to memory of 2840 2112 iexplore.exe 28 PID 2112 wrote to memory of 2840 2112 iexplore.exe 28 PID 2112 wrote to memory of 2840 2112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40638365757b7e4766e1a4dadf7cba28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e53f03e34aa0e78bc5625584c177a20
SHA1cb1fc09909cd8b0e5f406abdebad00bde5e1a5ca
SHA256829f02b01eaa6621e5ab699e3972f3008ff4829c49028d68a1124122efb56a38
SHA512ba73894d9e6a31bf8accd07cc6e11de8429797ac29bcbb90a408aba60cfdef6a0c063401fa7c3214808efef959942bbd1ade49263d21859da89d478a1a62aa45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3f236d394a5c2a9c8363ef2b1140dc2
SHA1b85eaf75add01207af83be5191672742c4095769
SHA256dd758c6a11fae8e5c756798e5ae62215c797b2275fcf9296ddfd993b87e3a1cc
SHA51226b6e823e3d1d4b2f4bb6a7c46dd6e821ebcaa1527f43fde02a901f21bf2614b53a1df32a71e4cc1b09951cd7061b9b716fb4de166df50b865ce014cb71dfb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995d13217cc8f698b4cc63310cd76d1e
SHA1770fbb3b4b9959033f3ad82d63a9cf18162fa39f
SHA256cfd51a3731c294ac557c006c5e6088138d8921d6cddb80150d5834b1c5f6e3d5
SHA5120ee7e23f3b039ae6359f85950f916b0a3aed9948b19c2adea19a11a71a4136dc2beb9ff668590096753e5881acc82baf8cd2dafa7fcada702375940eabfec7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ebf55c3d01a1c491e832672e9632d5d
SHA14fe00d1a5559f963e8f1847f860c935164d366a2
SHA25660a8b24f28a35efc9cec611ed07ba1c0e1f3bd6ad08605f22b510eb7ca6917fd
SHA512fd95f5e3439d6d4cff68e6d47ec7c0b175f4e177bd109064fc48dd0c6465510af5b7ff59097fc90f48eb7d4e9a3f31ff659c55c54c861fe23f5817949f43970a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0aa93b5690eca90909d28ed5d50e092
SHA173bdfaefc187ba08266f3fd2655d53bb681e4a7c
SHA256b5fec6e57f32559424be13bfc4e18b9b4fa15ccba7780f1bdba4176303c7d07d
SHA51297186948f3442dae8494e18411ec87248502294a73cc0e1a88f30cb30f7758f76298ac4ab8176dd80cd0aafdf65dc997efc5510adf9f23c1e74510ebbb1914d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504406f76a1f109061a9816d217af2e88
SHA10bdcc48c7716ca857a9c219cf18d3be5f2884cb3
SHA2563eafd08f3bf6e9695247b9736f9ef807fb88f7e03c112bbf9cea51ce2d4f5f13
SHA5127ca26e04102fb726c2aa711b94de36a58bab5f9bf9cf7d6902819598db5b3cec9cc451ba341be1440cd25dd2efb39449dd426e85ab9201d3e40290105a6395b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5243ff9dbb4ee21dd2adf5b9cc7b3cd48
SHA104502871a94db57096a6be35e18471dd70a139ec
SHA2561850706e5aa4a28df856abc038d592b273d216643ed49c7e911483870543d63a
SHA512ef12c560f1265f5788796e1e488f42d95ed9f5427a598ac81d841e4e4ec812e100f209fb2bd7940a685ea4095ae8dc89ba8c86376ca619ca2754224a8f0252fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51447dbeead055d9cf578c50cc0da6156
SHA102a99808879a2a664862377d020738bfec3deae1
SHA256d0e2e4a0725b21f261a15df30338135d6181a651109c61ed1a0cddcfc4e97933
SHA512b73dd3f23d097792e5092495a9edd70194bc395028c0382491863ca0a7e3511bffdfe42007467f4ae7f8f6d3d10f449ad300f060c633779678a73e22c897cd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5982c24ab8c39d9ba55e8e3288ae0bdaf
SHA1be0e02c4c5c7a8700a4e2cfc43a4a51bd253daa9
SHA2568fdf0223030b0f870bfa84637798f1081c4b757e37165f049f2d99d26f0233ff
SHA5125bd3a4337ce922615710a13ba3e91e8f9e9df28f2991b9cb909e32f3ffdae4080c56ccfde4287b79a15200fb72b3e35e2f638837a32897ffd88f5aff516df04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a95fe8e5b08d385e1b8e743310bd278
SHA199c3870caa9e812f51afd1bf5df91262cab7eedb
SHA2561f6901f9a9201efe6201197ba94da69f6e87f314fe3bb27c7483bd3e82f7541f
SHA512a9e42d84a6c4a887ecd83b296560e307af4de5046088b4b7573af752294c0ee0d1ed368d36815f858db2dacf70bfb3c7275cb04b93fefb7cdac860967c1988f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe3c576d04cc35027585e950d59bd39b
SHA13b70fae8a20f3325c9824ef935481cd3c3585e91
SHA256ff250d3d1ef43d3a3d0fd4b32ddad01de0d63f5f65237ea116b8dbc699da60dd
SHA5122732e72b1357bc97b3fdfeb38fa1e8fef8bef52753b36703f119aaa2daba5c428ff13c536931a475254af897e5d5d54fae4e5b06c819d200fd0ac2e87dc31415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a8a4dd386633da98bdc8a64ae02f0b
SHA1de2e13dbce602756ffd119c95750b10f06361a79
SHA25668db9f6ae9600a1d6a34e21e6f29a2a2dee8b8116684d23dfc698b851704c966
SHA512a450d087d23310056eaea58227360f7a907f837942572948d1b2d6636271d37b26abc19b38b1304dc759c67251be036082df6f90024801936a6ded4b238a2b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57003901e74bcd619371f479ea8c00b97
SHA1b314f145aa2260c84ab818a86455d2b87089d187
SHA2563899dfaa3e54a17d92528d286d9a1e2ffab7327da0e38144780c19792efd20fb
SHA5127392836b75a73539566a8347bde8da5dec9ac80e41e13cc642003671dd4ddb76fd51a601803e64b8d92a082107b58fe46887163bf856b1b17fb4b3f21965f603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c98b8614c1475cb0909ef1ddbf98085
SHA17536e9b3ccf739ee838e8ae5c2da78e6a06625df
SHA2568a87d7aa6a8111ac1b15649b69f3f0c168c69d5151ab0e502250255d4c384143
SHA5122722e0240c82813d7943febb83badbc7350453dd345f493e063aab16bc3c6759d6d89547fb6b7cbee0ef321743aaf9fdbbdfc6393b685e579ba30e4c06b5cb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19900ad1364bdb94484308f18c1ef78
SHA10ff5ae91207d5b00041d2b88dd8d1b8cbf4f15d1
SHA25631ee90b66f0ebd46c7595be9e3595d92a21e63f85c93035808f240c34c0aa8cc
SHA512bd535bf808ccbbed7f67303c87bfa9c9b72482a8dae1489ad2652b78d085825a74fc098e15b92f74dbcd8e4e5c1876f284345f69b9935ba9dbc947f4ffda06f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52206c6e448eef65cdf459f733162cd0b
SHA115f2ac35d2c99f1920c0f99d081955f3d8c82c9b
SHA256fa73b166aae02bfaee0eade930403a81575af15d63154ea3075e07689feb2d40
SHA5123c94f9a745d1898768279fd7f282a52d6128e341b86a105b81c7ce71b3b62925527e3e00d5db6f93765fbc7c6f04f34e9960524c5c5a4e2afa5d952f89d59b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8d97ce82ef5a86379a2d795f63b8bd
SHA1221aa44c1ef084194d6cc451242e8fdb9e7ed35a
SHA256c326c3efcc012e79406769e8be91d4275599b96dd4b6e7ae268cc93ba884a8d4
SHA5129932cfe9ca0a1c7a74189a8b6b0372348807abc9f7f3e782dd614ec52bf2fb863f238aaac0c63c7eb3e0b56299c9995c2e475fc65d58539be632c5bda40e86a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a126ad7d1e037c9c12b27b6e71aaf2
SHA1d6321a4d6cb4f7d08705601cfdbca95f59afd0a6
SHA256aec1d0e5149f0f4b835a14b1c19d99da8172de8555a85d6e6d6ef1d33173bc4e
SHA51287fa064ee367a088e480eaa302f600ee2d6c471d847887ef6a65c2dbd35f3d83ae06d5daf02b71e599c5bbf11c8ba7d42f9dbdf9e150a3b1bbc706fb408b1c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b417ab5a8f3b690cd942c413f38685
SHA189e81d2de88a8fe77d1ff7e0f5b564906b839011
SHA256e317b23c956e179f1d8e864d0aa66688fac67688b79139de521d0dc65012cd3a
SHA51243ccf36b87e2ed9d95a30d8e3454a9dc371a46cfd7d326506d394f42caf9593d3e2e762e2485db3ae3fd8ea1bb0bf82522f30b817f9e79114ff7ed08a4f19e79
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\content-slider[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a