Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
46ed90a3f290499e3dc7beb65a008c7f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
46ed90a3f290499e3dc7beb65a008c7f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
46ed90a3f290499e3dc7beb65a008c7f_JaffaCakes118.html
-
Size
80KB
-
MD5
46ed90a3f290499e3dc7beb65a008c7f
-
SHA1
c5bcb10e1cd13909f6e398aa3fd06d6ca67dd5d7
-
SHA256
b66419df7d895bfc0d89aee7c19f9ee417e3baa152b81a2baefbcd22c228eb3f
-
SHA512
eedad257a84bc9f74f1de955d7e7d5cb3e46e90b9fa0ed7544c6cdabd1e9a336ff330cfab70fc854901f51f452911f0ea116a1fc3e56f9189ca2a2195a4139d1
-
SSDEEP
1536:JyPRozHoz0QzQnjIJzaTzNen0tbrga94hcuNnQC:JwRoroQyEjIJzaTzNUq4hcuZX
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421950843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008b390afee471956e94b5977fcf980b0c2f8285769f54064bc03dd1c498969013000000000e8000000002000020000000e40984ff7ca5ab7f160c0da5aa9bf925051625b34209b3630b1a1d772f06555e20000000953b38494609fbcf09096d58de0db9fbd91f89167d67b95225e2cbff220d1c3b400000004fd8f2f64ec9ebb4247c71415648b7b19a2a74365758ac577293c73bc240df423022f803606aaeb0320d10692d7f39cff884e09d753c72f4530732f80996635b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97EDAF71-12D4-11EF-B944-E2C1BAF7F8C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301f946ce1a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 iexplore.exe 1768 iexplore.exe 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1684 1768 iexplore.exe 28 PID 1768 wrote to memory of 1684 1768 iexplore.exe 28 PID 1768 wrote to memory of 1684 1768 iexplore.exe 28 PID 1768 wrote to memory of 1684 1768 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46ed90a3f290499e3dc7beb65a008c7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7a4bbd63ee43003eb6ff56b5b4dec1
SHA1252d739b3285a248e8de23bfe4cfc0ebfc6c8402
SHA2563d5b2a755d2f3acddac15fdb43592b751e99d09b21a501414aaa58f55c7bf47a
SHA5124b7e86e31b5608d4be3dfa09e1ae3478ad04899ed8aa34949704e139f321121d04a15f0ba4f3a0c0a486b27ca10fe4701e12a7d7aa26a24c23b4ae6608e4edc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f391417908e6b17c20cebe383f07a831
SHA1164e4078a48e22ecbf7b2d2ab69e6aec608cedef
SHA2567f06cfd600df42212033c0f219ec94faf932ea736d1d0f287ca2cd5010b34926
SHA512a8a894cf1e69f0db34322bce97cbd448f781baad705755fe4be89c14feba7b6d6c728a706b8146347302e7d19dec33599cc8d09dd0aa57afcd67a4bd20465594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56db075b85f93bc48395d993f1ae40636
SHA14173baa9b6d63620f2b3d29d773403e26e56368d
SHA256a3b2f8b5a17d4b1e10a8c28aa0b5967462d25df0d2b8829aa5e2e6ad808691f1
SHA5124a355b411c6511c87164f18e03c2fb0938ca598c6d5bbdea49f4c67be37ab9b44c92e2af828b1676efffd43b1d7e6b681ccb4aa54b01cab8b1c65ab2e4306911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985149b7660e977d4e7b0ba1e858d7c8
SHA13f82f2fea3f57dac680bca2e599577f6fd8a8771
SHA256ec1b43d4bd7c9346a43fcaab2e6be05c8c916903d3bdd76ad146683b4db7a039
SHA512bdac26cc8cc3ca84c7a98c0795de2eecb78fb20dc4b2487eb19ba7b4617525321982eedf4e05eeaca9cbf758152d10e96e9d5861fda4d6ed8e7899c2d0b6defa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5550ad141ad70a72745b7d5c758530fe4
SHA1ef02f55098b975030ad220d7aaebb28c0b2d2c78
SHA256a47842d56cbdd5f6c0d35851a0f22acae83a23de3d0e330ef78ce4309460f439
SHA512fa53e6779e435d1c360d3c6a69f7f719b9ce5ae2b0255e5ebbe16b221d50b35ef6a0f061a68e33b38f908f9175dcdc2e48d7e552dc4a547130c092464e96c9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56967e3f1f58ba6e752911cd17c52f5c1
SHA15542fd7215fa92c4cfb8c157337743c6a892d612
SHA25657879a587163e6cc9bfa6aacf7504edc8aee9210c22a10cc1dca37e7a0244e9b
SHA512f3b31115c450c113582e8b5c20dc3923de7d7013702d60bf95a223a0c55dc9b29ba9837928c6e38d4b869d7bbcf7928c002097c3b8ac5807c994e0c2fef0de73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f840d94622497defd7343b2ba29cb51
SHA16334c7bf5a127cf501a52058ef81f97c6db415e0
SHA2569727577a39b193ba9cfea3d3d793a409138864fecb007e0b995dd7890aad4628
SHA512d0e7140e57eed0a2ced9ed76a90c3aea5ce0cc617947132f5801ee40b5de71af576d64841e0de49b64e4c68ce0155475e0200166ef384542028a3b7eba1ed457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee197e2cc48c40f5b5accb71e6666ba1
SHA1902146bac68f719e7d2d7eb0a95502c06a52551c
SHA256471e843f37750b8b6ca50cf09446b2693566ce0b5cd765c774b522c892bae03e
SHA512b2980b7fb842fc95cef44c20ebb4b240bdc4e40aeb545dad18fa61d043d05925775c15d805bab9a5b7a8503aa619e2eccc785029bf3e78959eceac9e45469aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e88822a3a6bcac1dd25316973dbdba
SHA18f299d2a8db89cfa2206c6b557e343f08a0fd719
SHA256aff0fe0ca5a92c836a3746d273433a5869fc5215eeb499f858ea8b145cfa17a3
SHA5128c9a918762dc03c3b66fc44c95dda217637d186547cc36eda1b6c11ac72c05708133bab364229f07caa3e0e93b6ed64170a225c708a17633ca031e8398d9475e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54177f6c325dce220606ea34b6bacf36a
SHA1e61efe7adb94768393aa229091b4cc33bf5a0f9e
SHA256499bf88610cc9a9f18547f8c674e1a066803aa5336fec63e013ee1eaf3df86cc
SHA5129a3ed2867ae9ffb473a5946dd604df7ad52a32496abe6850fd80857eb9ff05fd341f8e14fdff2293e587ef9c6aa04e73aa3056648a805b472391d8bddcecc0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c86ee9740ce24158c84d4324854ab11
SHA10ef1d0d8890380bf2f1b3cc3191bc4fba6d57ba2
SHA256c94057bb8504391cd2cb3e5c12f8f959aa79ebdbe3255ae0f30afd626afb1798
SHA5128120ca45cefe0956e7ae854933621aa34a0c89121a0b4f92ebce539551ca7e4aa5773e089d857d24ad68c68f8fcf7cc42b5eb52f9e7e7124b508264ff00f6f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50094a72fcafcb618bb713c98a164a77a
SHA1c8ff53edc962fa03a3c66d9d5b5739ab3393de16
SHA256c388e3933ab1b6bebafbc116d11fca50b4a2a8296635f0bf13fb47c3b98e14e4
SHA5128399b2726199d8935eec1c6c0fcb3d59808a11fb2961c1fad30c878dcd94def5f84ff55660baa25e28aefa4b292fad11c8594b094af7eb72f832a59f9aeebea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8895552959568032031e0341dc92b0
SHA165a20a12ee0c8c2e8677cbfb6277b2eaeb1bb051
SHA2563473209bd49b37c406cf1028f564cbfefd2a249547871efd95cef66bf548a30d
SHA51212723c14bb64a15717fcb6a3f02deef5df14767d4246428f06c4feb4d3adeb3c9997580c1867fdd004fcc6489b3f267b31145e1ceabaa26a91b75a26bc01b4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c03f39ba3360f781d76b8182819f12c
SHA172d09610e6691fa42b9552f8d2b62775086904eb
SHA256150a379cb0bd24f02128d72792444e8ad50b684e6bac25ff304ff360de5d7faa
SHA5128b07e57744b00212b80da9872e69275ebfd262d0b2dd2183145e603afa2cf6449cd200841388555b054a0205a858527275245f9c7f39d905fe469f114b5d972c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a5718c00ae7b42a70e23d13825e18ee
SHA1e903a343b5172f9a7ddcfbd6819240de72c8817c
SHA2565867f9c1b5e52f02c5a05c16660cf221b9ada592dcc075f66bb1843f56617359
SHA5121ae61460594184f6e99dd85e4cc8c606238ccd79dfa22add528b48cf079c6167b472976b320856bd38482f157f9725657a768a8630e515c0742a18c68f258527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54089b0e5ff61fd2ead507be9603db627
SHA1e087bf870261f053839432256116dc8f71a941cb
SHA256240a916cc5ee8b0ef18c3e936f724c6b1d532995afa4ebf0834c5df99f0135c8
SHA512c839b832ce2889c149b92ab3f222e5a4f3d1e2b15413a807d2cf7a3ccc15df881039a21ff275b4e3b680d1ac890c36bfa96a1fb5d748afdf5ad8461fe8a2dc61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ece347d87de88028fbd69324c1b358
SHA10878d521db4533700c801aa990fc0033f09351b4
SHA256c4bd3271b5d02cf7a62ae272747650a1fcff8fdc19a9d992551b3b80db5d2cf7
SHA512bd39e6345e29599f68322ea8a690782cd9b463d8cc130749048d5e9168e1150c2c54013f3a42a4995e2e1846c8b9bdb7174c80c57158b57f6b22665c06dd25ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936da7308aa98dacc4703c9620af5471
SHA132272f539b5ff0c916161bb72e0a71675746edfc
SHA256c0b620cb7f1a9df46f4ecaacf644604c927fe6061ecc2b9db2dba307b5ae5992
SHA512cc677d5b558c267f38571533f0e4c28e32ff65666f73a76cb154bd002bd2e2715a84b9f271df34ff8e4d1c724e9918cc7ec7acdc37c3dff7bde8c365b623dbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a67954b12ee07557f486380b228948b
SHA1c27dcb73ca9e557e6abe8b0497c9ebd664b5b0a0
SHA256087b35ba220e4a4b71aacde0b135d66479c5726ec0164aa914a672eed8e3fceb
SHA512724a85431b0e5374f12e9956adf799264785b076a01329d5fab08f30d888d979bbf20f82ae06683eafa1413376049a7e8d9b357d8b53999d1814ecc9336d1be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffbf817152973220345ec565d0cdbdde
SHA156ef47e8bdeca819f4355ed5c94c467ccf76e090
SHA2563603e62cefc37adbe227e236471f77c76912831d455f294392f2a48661ca075f
SHA512052a839cf96171149a03776ce85b6ed3e73af596ef1340892016974ebaa815ddce8b09b955f949ec519961230b6138930b34f3246f55b2f7420674d87da23dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5d43881e83ecdd17368f965fc65d3f5
SHA14db3b573fb92c0197f4ca178c7c5f3a4efeac87b
SHA25691dc2116144f8292560556f744487185cc302c9d117dc9c8618db92cf9acda74
SHA5128b2e0b31bdd2b0dca94a4f1e2edf3c87ecb7c4842dee187c5de41638cac82e7c333fbbe2b1ebb56e7221622e6f82e94fd2ec6d4260b4752e36175614d9c3cb7c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a