Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html
-
Size
461KB
-
MD5
4d188a780b200e9ee0f12501e0370004
-
SHA1
ebcdf65b3ef3afe3f4c3a4d46f19ca8ef39dde0a
-
SHA256
a53b6f86f6035bda93682ae199163d3389e9b4ced422daf05c89a56d135a39b9
-
SHA512
9e0c60cb707d4096fe5bb42ddb67d1d5c35a0facedb79cb68da0ef327b3d2956b3e96cfc5d55da2a8ac46886f24a0ca80f297dde22a004d521342e1b5de483e2
-
SSDEEP
6144:SLsMYod+X3oI+YyV9QGsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:s5d+X3Yx5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CEFC4D1-13CB-11EF-8F47-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422056777" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f4cc11d8a7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000047ac3e37d8309de102e849527cf1be39972ba5d6bcdc1a3ecbc978228e8b1518000000000e80000000020000200000004e7985fb06d82deb21d2bd473a1960ddddc324f9830f607f22a704f10a237fad200000001bbdcd72748aa63fa9df2604f41844a0b8ae01719978410db88f7e81793b4ad340000000637d033da0721e579fbb4fb62eb91b3bf067f9c3691f5e00b6f11a312683517a28f140e14b157a06e7990ac1477d5671d2c1c22217a83a35de7689e96fad4bd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2004 1744 iexplore.exe 28 PID 1744 wrote to memory of 2004 1744 iexplore.exe 28 PID 1744 wrote to memory of 2004 1744 iexplore.exe 28 PID 1744 wrote to memory of 2004 1744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585a07f12ca094eb916230754981412a4
SHA1559d47320687afe67613d12647b5611df1461453
SHA256682f1a1d323a50b04b7df6ed839cd6e98870fd89beaeabc5ae803f5db5b89134
SHA512a13a2176fd39b276d5c13b8b21b7ceb877f150a9dc8ce1bd136f1e779be3d5ff29554504d536e5bd03ae4137338acd5f8be63ac753e66231403216b3188c5577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed814d7cafcbc2ecf3e43a63ccacb859
SHA111fbd55437a4c0d8319ccdbbc0c2d4669970bbea
SHA2564e3650ca350fd92fd513b2d309911312ddf5c2ea667aff4a7ab768c32dc5241e
SHA512f5c2e8a4cf2eff4793a5d130010bbad286f41e6fd426dba0685434f14efe9fb633d0b80b677987ace773fca21596dcd6bd307b4318e8d4cbb0027b7a7edea1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de98925ac3ed4cb8e381128e59360a6
SHA1216a6c810a008236e994fcc53c4d1de5393183ce
SHA256c3bf58926ef412d5a5948b2f1ca2d928226f8788b1126c40f05cae7e82733fb5
SHA512d07e143998d898f996798ae17b10f63a40676741b9b311f39197cdd52aa8792e11f7ceececf098376f5f3032ee9aa09edad8104896458ee93b66977b2808852e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d7747003fb4c78e481b55bcc980414a
SHA121de94c54fb8eaf8c2a7f6a99e48c38cd06e3cd8
SHA25655b812340a8fea266225ed80f0c911a652bc54ea30b0decbba3102e862340dde
SHA512211d84574483adef520cd39c64ea4751b2eaf88f008259faadd0b2fd72f02bae35404340ad35de64231f142bee4850498da52363b42a83fafc06f3433dbcd419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa53a043977047d266f87d492a55483
SHA1462a89a1cb332cb93ef51e568610e4a70eabf9a7
SHA25679bca35f775372e8f32f42cac2b12b593679ccd7c2a2aed1ef918b41159441bf
SHA512075e6cbad612a9d43e94d12a4cd55cecce219be09dc61ee6855e25e493ef86b2aa02c4482ce9628711ba38a5ba67fa470e4d0b3e174a2f0d7bfcdddb756cf327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c9b6adcce967f8db42fb6f351e1ad6
SHA1f887b4105d6702b8fb760bee27100e8128f25799
SHA256d0fa3e2a956e683437ca0db522ec5c5c27e816e94e6577d7e31ca24d04f3696f
SHA51274e9b25f7a2665ffb42d5d99abe1a5011342ced2b6dc8b6bb990a24983961ffc1e19499d06f5076ab22ee3f12b5c3dcf52db0b8b41314be1588dd1999dce408c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587927e77a44faf121fa3f359d47db5e1
SHA1c6ee18218081926a0ef8d14e5b5763dc5268c640
SHA256ad45eb84122e9fdd29fdac6dee2b55e5bfda2c7b4e6bbec363ef1d5950b972aa
SHA512bc8805a4fb0ba7d59b8512910274a0b6acd24d959e55fdcebf46d325d385cfc4f3cf750ab327e9a5ff1c90a2a2f4240be4480ba589572bd17efbb87767a32dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd711b1d03fff0f97944c3b73908c882
SHA1d702e0a3a30f726e57a0703fe969c52ce069d8ea
SHA256702ee549aa581e42e1ae8deffbb7874a64e77de9ef5df8384133791df0d9565b
SHA512674ff09db5379bf47a4bbb27d03e29817aee30aea9183c52527fc2523565e1293c442f354daa59df824bfecfc93df45f0c1a756f45473f0a255de2c4972682ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be91a7531478175a6ae8c75ce311cfd4
SHA10b3b1ba340828dc909affcd556092b4e0b559557
SHA2561869c682efaf2cb797bb5a1eada10d77a797264c858d7aa579c726595f62540f
SHA5129dfd1ed6e53b4fdde4b73af13403cfced94f328064e6bb7e423decddc08e9ce4cc7aee42f42c2025ac74c4ea35a9fe8ddad11de386cabd64c99ac35315509905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5094f541deed8963ca1efcf1afba06895
SHA15237eddd2df9d1c52a0e4e4d111efdf31f8c78e2
SHA25602dc7b282fcb216e262141d5f6f6c668dff39c941d7c045df034c0360969ebed
SHA51262a5189f140e0a67bf6595130baaff8b96be33c2531603892fcf4980e70eba23b3ce3ebbb5c70b9cd9b82e29d5589786832996652e790abb0ff9cc4feffffd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d28fb50037e6b400324162a53c535bff
SHA1c69c5c1b680da40d07e54b54cd6bad6e4f812f5c
SHA256d5bb9f39add577e2d6b9c9c87ba1f802b8135d6f35d1883041dbd25f4c44704a
SHA512cde605f61ad677ad4e0d31eebfc2fc6f995f7897e82269e893544dde33fa5e567f80ea6cdf297831646260a79e0b7341444c3eba90b1fc88690d2771e49fee32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d55803f8954cd491dc745073dcb25716
SHA142d97e91494ca573d8caa7808126cfa58bda9fb9
SHA2560856827ca876021d868217649dad8cc9caf48b6bab5b2225b5943dbe823a81f9
SHA512f20f2016ca74c0411abdb22f8122b0b59ea5c262ecbf33bc462ff130670be06bf68144019098aeb2367e51f9fcd3ed2f2ee4f1335fc4acc36e74170b444a3722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f095b6f6850e2cc26dcfb900fcfcff
SHA1578d4aaaf417950951ebf56fab57a0982936172b
SHA256e2ce09c320322bef3aa051f0c42acc9ff26a66ae6ac2de1e1e3452d598fd2f29
SHA512db86d30b26cc81eb8dc9863063a8f3face511e9e49afbe8993d7e38f677e822d8db13214deef31b1599b1bae9827d4e9f0da1871e1ab3e8a2266fabe4497c7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf35855b2de33bb3a62b7d7a5f910b70
SHA1456620e2a324024289ac00716757c999177890c0
SHA25607b05600fcae56efad6bed94b98531e172d71d60cdce8808122997caaff74847
SHA51202ab0ba5869662f7debed9f7de47e8076096f6bfeb2400a863c13506827afcad619ad1e427db1081901a200ebbe885c7828856bc2a3229505e9772360c57691a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572121b4846cdb83d8b493d5c76027eed
SHA1b9bf3548e7a4b6c54c0d44f32960edd0bc1df05a
SHA25638df955cd260a614ee0c69b5ba713d9655a64a2da6a123848e154306cb46e416
SHA5120d45eed29d927c577d2a927b61f8c105a6ddbf10bab7e2beeb785b54aadab1a489c0cb683b08216f63dc4747d271ee03b6128f29e4839d329b03c4038fc73852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dfafd48050a616ad811a8462e67d6c4
SHA11a45df6c0060ea9453835f8dfdf47e787e48a2c8
SHA2568a33e607e52b5f57cbd3fe4635367bb22a26d79965e786c83f2c34ee22336005
SHA5125a4d1eafb764174f01d2a99474365c7f88c79dd8d538899e30863a64e8eff898815785ee312aaf41d22570c6085965a942b7ec38c7bf5f81b1554c0c5f9ec28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abea34f810060144bdf4d80bfe738a65
SHA11bec8e50ac87125bfde997a2576e748aeb2fb45d
SHA25659a9a822cf3a2b807a8382dd2f0e1c67ea39952786bc39da3cf4381bd048e67d
SHA5125aae14f0c025c72280cb85c8bac85928d0c8b43b3c856a8b0381ecd234ae6da31b2d37600f92e32f7e6e6a5af2a800392c44f0316a3ba79bdfe39b7be5cdd13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525ef14e0a53c9ed8a7945a9d52161a95
SHA1fc57997bc753fc239ae29e1b4ee0a14e6db4948f
SHA2567eb66cbc2da5255d0eddc154eee9dae93270984071c5b1b2637004218f5ecef3
SHA512dc31a44820e2658be4fe1bff00eb1873ddcb43f94d353a4db348d32395c3c8daefad8635d6dffce79e8cf00f06d756d751c0457e82da34ee7f6f3290103f3c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586e8c8e19ff060f4038f7fd66c8972be
SHA1a9fd090c4477428d1ec0cd5970e958501d66c431
SHA25645176bc4e7c7a48ee9d4be336309b1303e2acebff0c6ef5d26a1f40b6fbcb858
SHA512e7fa6f50fe76ccab1a61d85bc115daa411bf7eeaabc6f83e78842b77b4f3ab07f82b4da1a641a6b771f7af4e348d014f0ac4acbd7a41a7c01faa8ba57cbf5185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074a41a12e3b333f940ac9f2510459f2
SHA14cbb37736ec6529af0d873bb41bdae5ebadafc22
SHA256acd187a7ecbb6890afc9ef18161af5456563be98fd3c0f9b80b255aa8663e20b
SHA512e446427abe918339496ce1935aa0a707add8c0da776169d07bd190ff903b7b148f6c9ab62a590f92fd91dd3984ff6e6a80fe7aa01588a3dd76945e3a59b36fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f71465dfc92412e1518d2fccea764d
SHA1dc26d3e40e290a0a40e8d9e5ce451df3caac5aa7
SHA25639aa02377dfd5770fbddc084c621d2a9c04fb9d57338852a641c84db57f7c138
SHA5120bc3dcd76730b3efe7e0249d07e4fed69bb6533aed74f6bf987bbb8d4513deda4c13d529a7d3b7e7975986f7daedf9b08adf533023501dfa8ff72390e92d4be6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a