Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
6553c928a379832fd04b24352fcb3193_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6553c928a379832fd04b24352fcb3193_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6553c928a379832fd04b24352fcb3193_JaffaCakes118.html
-
Size
69KB
-
MD5
6553c928a379832fd04b24352fcb3193
-
SHA1
4aba907b738665d63708253e8fb9bfade9ad8105
-
SHA256
a6803771ad388ff0e0decfe20b03313c4ac4bb3a3efb63d6ca42ae43b09d09dd
-
SHA512
d3b34a6ad083dcd2bdbbf2000990edce5236cedcfb18413b9b3f7415a929a07936e3ada3440f852a3265a057f89bd9f53b4cac17079578d6a123ff01276b44d4
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sM66HzXoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J3BTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001835cd552815c64c9991c99fc757b4c30000000002000000000010660000000100002000000028e72c96525789e439837f36ab723348c166fbb2aa8ed56643d119421ea06901000000000e8000000002000020000000ea7aac6ee9a5075b43a210f306ce10442ab1c107bf02804f5238ec84f0bb496420000000c6d506741b5b59f943b53610017fcb354238e49cae6b3a380113d16c18cc30bc40000000f542bdc42589ded1bbe6f1c769ca74a71a18c265f44c7427c7a6e4cfcef2d56617aa678c5fa03b6b8056b12e1a5d92dff6069074eea1ad391709e350b39a38e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a063304cdeabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422499258" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{778920F1-17D1-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2360 iexplore.exe 2360 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2360 wrote to memory of 2628 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 2628 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 2628 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 2628 2360 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6553c928a379832fd04b24352fcb3193_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0de661025c617c9e68923179cc852b3
SHA1b0f4abe37158bfaabdaf6db641b8fe28e0e32773
SHA25651d4c2b7179bb3aaa15406de1d61b0adbd70e544fd1988a9b0f8d31c2ac5a377
SHA5123232d0bda1f0907bd28e73feba028d4e1e52850321073b4ca235530d31177fb48dbcfc4b6e17718e657995863b280e7a8da58fe80610b723e51ab52603c017aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d5c79c5e1b5a402b2356ccd9ffb93d2
SHA19f189a670fe018fdb4100187a9329d3c167ee3cf
SHA2567ae72a01841d6971d3c57b5528cdac895c4823e613d854637b38b13d42f08d7f
SHA512ff43fc4d13e2f3c87bf3488bb556cce55e59f2368c33e7a9fef9778c911d095666310de6a1cecdd346aec6c3e410e6752bab717c1957139de40e9253744f02cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5794012a0a92a27bd2ce34faa23f4c258
SHA126973c50c139ac292cf5445493a61a5a78da7628
SHA2567a89dba72fa6c1a777aae966695933829d6996ef50905bf96ab3243831d5f189
SHA512f001a796681ccc83cf4ea6a4839d3c41394e0bfab0040871821a89f0f5dafddd65d929d5f3b82586f65bef409da4396de5fe31dd6dfe13808ae61a853041e1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5675c89aa57ffd79790da659172a76572
SHA1254c7a20191e397c7ae98f3a281562f4359efd55
SHA25686640b1bd2e8941f6e7e4c6617ecb2648a7a370ba6c0094b23b9cb18b32f1a12
SHA5123b21f7e3a362d83c9a655c15aee7ad9b3a16a1c86292d145fc8d71d2e21b99974f71a1fe829287c14c52194c9df9a0dca1c8bce3132b083987e878c930d0a36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501f94419fedcd72b7c156b31b4cd3c7e
SHA106f8205517d6853c5ce75e3b1e5113bd4318ac1f
SHA256a227af23609b4c5cbe623ee12949d3ea2916deec7ef63c43f0305e81daec059c
SHA512f61a1fa3152fe2da8275e707731da582af167214c747ef28b32da315cffe7ead137f6cdd9fbae02eab5a54219d6701cfc8e4a9059945b820ff850461ac356d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c221ccbb62284398dfb69f7686ae45f3
SHA153e7acd4878cc1ce85898b89365bdefeaccad62d
SHA25639108fdab12e32fb6194c57eb5cf69fda3e5fce1e5a5cce159ac5a44d6f313e1
SHA5125e2574a91df5ab56102570e9378055338fc337780e811cb21967e64b609ee272f7361d327dc35863cc80848342fc4d7bdc768a21d4c3a801a3f8d601cbb33c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745db5552ca37ecccde80ef2fe9f0708
SHA1c9f1c1e7671f2f68df2e0515a7af45ca8606e4dd
SHA256751d4b43fadfa4207ec10e9d11a7fe5433e2434b17ad9c87e11e74526e894242
SHA512e11235be564f96502cd0a4759cba74822969251ec347e13cfa84f3d4e604c54d268a958e01220aa8617776eb348dae87f230f2bdaaed8a0444a9fbcc7364c1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1187370553b15bc5005c8694530ca9d
SHA147d90a1d9771f4729f3aa9384617641df45f0cb6
SHA256745480b31409d0ca069874c196b74f0ce503d449d85f084edcea5c9d9c185e32
SHA512f91989472439abbfe1165ef3bb6d19723db0c18061bb5d340799650d979b38b1475462678479a556332a8832ff46fa0cf61bc47d41ecab8ac3692df51e25b078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560897b12758ed1b775588b88d1fadf04
SHA1f6e5b7d4faa1526ff622b58630d7868e41c59851
SHA2569a51880d340feaa681c3954540a4ad77cf15a47aac1450326a45479be5f763d8
SHA5127b88b46f68eea826e70aa4058e9874f3b5458cc26eb1b9d57ea90e9a0c5f33c684a1684be55ed0dbf253b32c28776ce0c5a76d243e55f95bd09b06f7abf34c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f277ee2dece03e2babc8f6469930062
SHA17ccf9e90dca89a1e63ccf1f70c4957c3339734bb
SHA256c1f0e636c531e365fad7378a9a8efb26233f1d4b6e5283ff78bfa33795da796f
SHA51280bd61c8bbf21fe3efc8d73516ffe3e82e71f69510ce777b0df2ab2efe94b74190060cefd61217a28814cba467ae0d3e82b0dd11c48b0489c47efb09f3144523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf7a7293fcf25bc4489686e323c2f76
SHA1c36372ad2fd3a38799d39c06ff73531b7acb10e4
SHA2566111e218f315224609979d6ace2fc0de88857e98af8a6f50ce41245652847de7
SHA512b5a8db04e6e4ee74ea3a549de8b5aefabedaf68f8fc6f3632feab87f248ee8f054141dbf1dcd9c3f19fa9f850caf41aa91785e8d0d6da55e754339fa9f108c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175d28fe155d25747a34531bb030c81f
SHA12c47fb79acf31ec7433f963f6ba8597c7341bd53
SHA25695dafcaa4d7b287c25cd2824de095b075fbe4675b249439d75605e5b2b03671f
SHA51239fbc3aa70bbfcb56add556305170b5af63757a4739fc36b8a15cde0c286cceeb97aa5b6081ca56ff3a2ce38829fb34f0357d169562c4bfee300a0b396cd0729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591df5edaf7627bd41b7959295b878376
SHA11e3d44bc6be65a595a2076b2ebe951551b8fc8bb
SHA2567315b242f1fbc9d0f18f967fecda56f0b027a0d0cb3c6c316168c7ed6db063e3
SHA51262b5fa77071dd62129ff8f1047b28d6177395a088515362018e624b924d62c01018db1ee3f08333b4839e5557bfc7077fcdd1b6b54eb92027d9533349679a94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57173e650f627247850dc5624f3dcdfdf
SHA1d0681fed87d14242a510e66c16eeb70ad51747b8
SHA2562f19944b6439bd040e6ece4debc59a28c9124c2e2ddb53e6ef43378b481a31e6
SHA5120a0a1520458401ed0b0665e962d2546745743f02c117013444224d2401d5de241b604e3bac027a6519d174c4e3866e80e8ae4aa6858c937091a068d4dc09cc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a9f0a5439b7f2c2a077975feb0fde52
SHA1ae86c7baeaa10e8ab9270f035d0944d4aa78d30a
SHA2564e4c68a85b255afc36a0abd6ad2b92e35f178acac5e978b98cae40a83224bf1c
SHA512c93f1cf3b7ae91235b43c8ef8a35f4867215e5a3f3cb812b4894c2d15706bd04821d7307d7939309a9bb657ac47424c75b51aefa620d9b2160925ce5b2fcef7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580088a71b7c75227922eb19706a0a01b
SHA12a0476cb01b7a9875878075b45bbc713c82b430a
SHA2565278e1c25e65c4885e46a4cfb9629cfa6c77dff5026ef0466c07a646ba43fb5a
SHA5120ab8e1be2ffff2373a72c31627ea91692fd4ba60ccdd692f50f4127f07ae1c9071a7897b0223b269a609fb7fc0df931b9230c81d937ef4a3b79c2d8195df520e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596edc7717f1809b0650c9ab6e37a67eb
SHA1552c21b2f475d4f9bf93c50a55bf08137499a3f1
SHA2567c66fd29efcb41db91f5f5b0378c1b97c3c9d724448bc8732b59ed828d839db9
SHA512d8afcef02f9d29b91159aafd3c5234907da1a1cad21965868516cc58ef0de43e4c7367a6cad7bcf3b169fa00498a6deb007fd625c032788897015f738bb9febc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f02fa279ee0f57ccbbc5edfa668bc39
SHA1f46c3c11cb2a11bf3e7dede2614532740d207ab7
SHA2565840a94d02b2827456a33a6a9bbcc22e27f02e7959fd5b1534c0341ecaebf0d7
SHA512878be493d1fcf68bf2e4357bfdc67b3a45636409b901fbd0a03318fe0f68dcd82c787ffef6b6d25a96d4caf22f4bc3d1d63e6634fd40ee29c26c7132572c15a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebe36108fd8ec2c9fd39e8d2f92ad92
SHA114b520669e2f0e74739a7ed1c472d3eb3afa8385
SHA25695c7474b3bc57e75b94dbb4c19070580de8e9ad7650a546ef9f7fb1ae85cdad9
SHA5126148a3d26e34deb72bc11ffbb492914152f75389486350ba83bbaf33b36c17815397eb43328b32a538397eee24104618bb3358ece59e95fd7134420fa3072344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276df32df7669ca588660202253b0f09
SHA16837893301079798a7f02de64d44394f45014935
SHA2562da521febdce9e01ea296a00f9fa4329dc9b3ad06d4bff1c508fa79e21141aa7
SHA5122a87334de24b62bab4858157e05093818f30e796cafe8787da29c6405045425880229859a58cf90f4a5bbb033c84547f56e25f312495d00ae4a81d658ece5425
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a