Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
68f6c0a5a29a51dec360cb6584ab8284_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68f6c0a5a29a51dec360cb6584ab8284_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f6c0a5a29a51dec360cb6584ab8284_JaffaCakes118.html
-
Size
22KB
-
MD5
68f6c0a5a29a51dec360cb6584ab8284
-
SHA1
d6333fecba4dc9233e7fb17f160acb3efaf04fff
-
SHA256
c8159475403f2102f4743628000098be792e33bbe4a86aed34f0b2f811113725
-
SHA512
c5368e3e36b0fe2c22f1788d8c2cfb92b6806cfe76834993f4a0a2af539fb2df44263e0d080bab2fbf8289cbb34199df9717bb80cf51ba962906187c49c01900
-
SSDEEP
192:uwyfVGdYpE6whb5n16fVrzY+CE0nmybnQjxn5Q/HlnQieTENnQp3nQOkEntJZMS2:AQ/Dv06kyfJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a078e29dacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DCDCB51-1891-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000006e9fed443dd19dbec2a131ba33a3823f0f5d3b2101212ba76c9b37c4455f83de000000000e8000000002000020000000be65499e98ba2780b5cad4a25ea7da4e21e36b7c6973c39bb17dc2260d8649652000000017b0ea6f56f87aa26db25da7ea1c1891e37d91afb3b1f5eb3d0e2dc2aafb083e4000000010660ab48c4afd9c323d92b5c59237a82e06f5ceed187d917a91d3210c2b0a90484c360e35628548e695e0ff9dee9fd5584a4c42889d85d47bbf7c115b8a46dc iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1720 iexplore.exe 1720 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1720 wrote to memory of 2932 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2932 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2932 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2932 1720 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f6c0a5a29a51dec360cb6584ab8284_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8a8fc775cbc4ec703e7843ff1304f15
SHA16e850e0746de67db18e9b14425b5ce13278a9f2a
SHA2561db8be5db0580cb24601774670e16707838e3f5d3fea461c41b6b4c1ebb52272
SHA512a0faee8e2576af7708dc80098a0a21ef62274a208dad49002ba6e23b450651c913d9eb31ad672ccbb9ecb5e0f0f571db0402b835155e5ec2851232f5e462757b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5374720bd47e3fff0ca7fabc77b91fc94
SHA18ce9121e6bfa8afcec32ba92d828b4f6c3d15f38
SHA2569339fc68fc02e46805b2d9fbe3ee16e7cc00ed6af083ab0ea58310e3b4cba417
SHA512e0fe994cd42f0ad0aa045d7579452b37f001410240d1bd6b17acf7936965ba118e9acb4e027190b2c71fe51a3ae078a3cfd385bbddeac139f3a9a603af953d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516b2643dbb2416a3a154b598c20297c4
SHA1a84e3f1be6d2afd4379bc65388608c6a7fa5e6da
SHA25619c4f285a333a0d862ae53242d98bae4e7d0e016146a3ef96cf843ec03edb810
SHA512a5bf270dfba55e6f4254f8fde0ff4906b982f1d264ba9a42d26a01d99ef6ef4ebb24ed46bbbb8295eb1bec5afd49d0740f294020736b71ebf213620a611bb949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55393a50e61f99649576b9adfdf9287e9
SHA1bae436f3d708327336b9c037cda4a7185cef8bfc
SHA2566c98469e82881fcfe42bf272899b6bd6f5bcbce609b60f48ec809e5df92cd324
SHA512de71f90b2b5bdd04268858c6c24f5f82b1966f3770abc9ea395dbf97a2fb25b5c3a25234e7642de9193a7e740cf7950541f42bb9ecc82f3a83c4b4c022996716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2870f569f0b81b15d0c679a8b159114
SHA1b697fb0e77fc6c44e0d9e21b48ab31df0dbbf005
SHA2563c2fe39ba416755f54d83cb0440fac33196cb89456069b90c8b764fb4c12a757
SHA512ae90478db03f7e0ec3a0f93a520dcae3b0a8d52e8f23839c001b0a673064199d2b953baaa0e405697578faf50e5c93ceb1859deca0c6f1339fd639f4c49e5d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e955641d7949e82cf546e1cfe22f64c
SHA16522efeb4bbe178042e8c04ff9d6253cd8e620a3
SHA256721cc5c79d5cb442d43e672690226d7f4bb00c26d88950623bd9140babad9266
SHA51202900e3c8db9a44bf0a174234294626a91a1cd500eb20dd5ea8784c8846e74315d7f1ee4501dbf0bc02314a7b8f6c6d3cefaca1a26f70a827bcb2d0f4351e515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3095a4095a826299b8a7d8002e80442
SHA121641c3780cff5b56251c0d33d84356b881f33a7
SHA256397d8f59bd57706c4a96f5f99e01f431c5c9180fad566db528a3ceb1634d5c9a
SHA512b3601981b315a2452134be0b4ead751b849a00f3d75e5d523373d1b0b1d76ae6aa0ad964d9bdf00af554db43f1c946c5b439faed8ff8d31d2aa79b7689d0294d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50246f52446843bfe810cc1de32da039f
SHA1a1f676a9c2316f5fe10fdf96eda53a2932fe8edb
SHA256f262426a166fb267c1c108c91c19b897c08a4e5fc6b8b1726c67f570ca07de8e
SHA51208c72d3678115ae2d44ae31a1c5fe3c30fa7c46be8d6a985954478542cbfce8388ee15f074d0c94696f091090b97cd5e773247c5ae7857f727de0b07cecab4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a7b5fda210e4138b093eb44174519e
SHA1926db53b84158786afbb17ff1da9b6ad5ac3dcac
SHA256d117653bf27f64e134bedb01220e59d08f1241bcb6f8921b4adf997c0c406eb4
SHA5123fe4e1ca5c6410efd09909e2cf4ec2f371a00808e7b11b7b05f6640a45fc51a93ddd28fe5fc97401a2e4e2f2fb3a2a7d2d7743809ce2cacc35b52c8eb193a7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de712f91040189cacc781f767a4f34fe
SHA16d71cdb70abfdc381352031a39c91b05a406fb03
SHA2560d208356edec5716f786ee132b354aea44eef5cdd104fe6db8920f379c70dc33
SHA51236728a693b0afba84173d2870a81a97fed8254236dd55903d3fcbde3bd7fe4b0a949842dd8e83a79dd5f4bf580095dddc2bbb24c78a298915a24942d808bd50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e661031ccbb376553baeb5df2b4600
SHA1ecdbdf40ddbcfc0b02f3ad129ee683642543d811
SHA25623f479466af86209ae7741fc9cb3e8bc5e90f8af6725b2c5d9e5faa51f7c0d66
SHA512d35397b1a23b57f7a0e3ae81673566383fcd4e3cd18af616c546671a3ffe13887879921999eb41d65777907ad3e9535cda0459d862218545add495d1f32d8e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569682fa0b09a5950dbc90f62aeac5d74
SHA182dd983b2dbe6a812cae46428d5cd4dfad20db8d
SHA2564736174e89a31060b8b5e98d681b8f879b9f2f16a5f2a1c05202295cfa126757
SHA5127db32105a0b8d0f831c47f824ce5591fc13e3289c4a468eaf4ed5504b2b04c5aac8ca2f3ecf5df08c55e2dc910478e58461aafbe3f4823938741260c03612756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af93e203b3aceb5998cdd226bda5f38f
SHA1dc1e14076b6095aa2ebd36e5452481d548c26156
SHA2563153a3170055efbc863f39f8b21bc3dd0db126189309f3324622bc805bfc6f0a
SHA5129225971e21e3388aec65b749d0d953d2580dce4022021fe1b8a45af0f120f7712c3011db002e1a71679848e72142afc5f72366014b96e8d6cc449a15700a800a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ed3ef20ec758e557b585b4b4e0dbf4
SHA1e04c69f55e39b107ab55fe9b2595133f6bb6e8aa
SHA256b7a4fc7e02335da800be1e972e2816602a82c0f5d5d64bb1a52c8ccde8105005
SHA5129161d4ac334f4907ff8f46dc2c61553a748b2f18e1af3308699075a185be423ac83e0ba91af28b3cb2bf0919276c9324148c96ca874e168b1f5a4e82d6155eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3bdb270108c944ee43b2cad219ef3f1
SHA181fab827f0f61da2f8843744b81dca09a0195419
SHA256ed24b69ebd1a2175481d42774272539a071b97711b18ad55635221d4987be0c4
SHA512996f40496124a50abeb30075e902d099cd466a34e3b0d0f68131f68201aadcc76c20abb445e424b64daffc08f9fe75d65e67ee22583cacfd29cf4439b052d7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f2150e33218c5069b9bd0b5d90ce460
SHA1274ac9d8332214836eebc491b7c436f58aa412c1
SHA256b5c3a90f0ef187d90df85eaa3939ee27d1dae4455817d2890cdc442eca9729bb
SHA512eaeca4f27d3e83e1511e38271ac7ba6a7840a09246a2407f48a085fa85d4dc48bd1f18326d99ad969ab2f472897a5967deaff08d660ee478052299f8cbcec503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4be357a86050dd2f22e128c41c579a
SHA1162384fbb55ed15193eebe45a36646530fb60087
SHA256214834e5fd643098bce9b4e5ab845d3de44fdd341e3391df17147cf6b53fa4ae
SHA512b800ccb25f58a5567299ff8e031a39f2eea56fa179023a2e13b0a068fe04bdab6ec8ef62d3651096de0a6fedb614096aa49c7893c0da8895b70a2966f8e09290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca3128869e766e1dee862ff9bcb29b3d
SHA175e3bdf2e4064bf983cdcfb64cdca7d4c3534a86
SHA2560cddd077d97eaec10ef02b160f9c3ad66bb0880dbee74cbe20fbc5e34051a17d
SHA512cd59c57c9751c6d4a012b99c3eee1c077942ca0396f2dfd6c7656f197271e35c3e95f09e9b225a3274f93de8ed81483daaccf2108d9fa6b78330a40bff3fd276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577930c1f22d933948c6725dbec9dce33
SHA1e5aa88a483b7bfcb8e1d66cdcd2296d2897fc17a
SHA256e0542625020064224a4029a4452ceb645c8bad776f5c1df2eb8e2b54c9608688
SHA51290f53677d8b85590bf40f9ee625d773793895519b4ce48897d55fdc5d683accf2bf68125f39daea96c8754f1c8133c77a13de674086aeb7aabe3a87aa9aeb9d1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a