Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
65d0476de58f71538249700ce0fc92d7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d0476de58f71538249700ce0fc92d7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d0476de58f71538249700ce0fc92d7_JaffaCakes118.html
-
Size
24KB
-
MD5
65d0476de58f71538249700ce0fc92d7
-
SHA1
3642fab1e5d04b73d5455326794e5fec6585cf9f
-
SHA256
96f12fbc90703f2a0e0f31bed02295811833b7c78ca4ae32dbabb7854239a985
-
SHA512
fb2ebc66407d514a287eb0314cde2f805885fbb8058dde6fe1d1b7c8be21c7896613c42b7113297ad86fcc66dbf112a92589b2ff85222a07b62a7e016e7daa8d
-
SSDEEP
384:cDzfSn9l9zdCcinm/fReQ2Ykhs8xpMyuHFM:qzfSL9f3Re0qBn
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e18507f6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509450" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{325D8FD1-17E9-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000413a599d14f36e4ba23085fa4ab659cd00000000020000000000106600000001000020000000d5003972a589ca5f6e9efdd214d71531c34ab91b3e4c974fa372822cf0b6c83d000000000e8000000002000020000000fc4fc9f7aa976a1cd9fcbf209cae1e10316399a36eee6b341eb3c58318a7d9e2200000008a63e27e462f5290f33601a71f08d0439dcdce6180edc27e9fa265bef22c30e1400000006662f2ed3272eb29f1e289dc312a93a6b3bfd559d000a785a8da0ff616f17c26c15c29a083c6003532a45c8e2aa2209fae949d353558b0cabccaf641fc887134 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2020 iexplore.exe 2020 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2020 wrote to memory of 2032 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 2032 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 2032 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 2032 2020 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d0476de58f71538249700ce0fc92d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a9af2602c501375f536718a4ef0268
SHA1d7af6b4724485e1d5dd574033a4a780825d10ae1
SHA256eb73c02514863ebf2243f7b8baa861a2bcae9f8f27f4507beb35eced01772844
SHA512825f0bb706c5423ac24aaef9ce79cfc590dfdc4b2a7fa85f1cac29ebdefea7ae0c5735918a5e8e8f317f86b21d10fbb38c1dcc0722ff2544be13b272e43be4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9f91d5e43b236dda24e95ded3f7c06
SHA16a4a580b90a8cfb5c5fd6acc4b76aca9e507bff7
SHA2562bc49930d271321dd854199b78f38cd9dc49e2acc784d8364f16dc4c84ac7dcf
SHA5126c90e0d994d71dc02e62f98aeca207a19b837c5ab7eb3201f57d748106e9e3fe331e4edc67cfa51fa423fcc4728ecfcde68c9d7575228026637394ecb74bb40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5876881377d00883bbee71a074e649a2b
SHA135646b80aa065b251db351a476f6b2391c891dd5
SHA256b3737a44e7a4115cdbe53bd1587923fcc772524fa6c5e59b16fc9bd9b6a0e5ae
SHA5126ae4bfc59a7653c27cc9007365a6ea909f9cb08097c4639d33985c989786301ffafb34d7007f0cc7748c15c2017fc4689122f66b0a718acdbfe4a64d86b37982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e389e3540c34cd9aa90dd6021d961892
SHA1a0af46f67608e4022ddb96a33ff8edab16b1f416
SHA256aab584b4d893588cbac8a73cd2aa56f53cbff952bfb851112c76cd973a02aed6
SHA5123ed1e1ba039ae13a7c8a7d687a352fc1312b2411f72c620809160e41b4d7f1d4d9dbd18852613a97bbca9e4e4fa9e27f31ac24e85a97ac1cade61d49f8c62983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc1cd8869d5bfcaa3d092490eb024a8
SHA151b1128490d14bea049bee54d5f22024c1033f90
SHA256bfe86b5f23de47fd565672cf57716d74334ab8b4cc2cba0e9c7ddbf2869593db
SHA512537e5eb86b94b5195e8da0f178deb5d9a94e38e701efabd05a70cb5954c0dd9899806802bc17ec19a2ad36ca86a7043ff3bed97abe0446a1f16d6f30d1a778a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0129a6e692042e7e736b889c28df49b
SHA1e9da181c1695a3dd73ad9372d9d262dd62d8962b
SHA256235d9adc001e969f5e354377c9d7c8b9afbb78b6de01bee8986caf9dbfad2a56
SHA512ee155a82a333bdcdb66672b90f08e768975c71d87910ad66e6b04b3306ef5b252e55708e0ac1522f2f777671e094322674e06bbcb39f489f977d186f0ae10619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a8a9fd0c74eaf4c698f3b32d569c501
SHA13a35d2232e2146e98d06320d9c06209bddaf1789
SHA2564a173e718a46b00c8dd6c6f1ec553f5588d68b8eb13e135e4a40aa34f6ac1158
SHA5121be3a427fcb5a685a9235d816b6c3202f77b343e15135ca462cecafa7c50fa1b5eb2de7071b7ff95a0f7eb40b973fb0cd251d2ea0a8c9e8ebcc1fb082138bea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50504d3c46b84e3864bfa8d57050e5830
SHA1c97c1056eec98cacd04e8e4d7095b5c13454d016
SHA256682dd58a90f9feba046001c2f86dc6731f9d52a478ec68bfbd0c1bcc4a7b8cc0
SHA5127ae555761e06113eb6ded389c01e7be0e803818120e4efbd92972c615577394770385b2b9666b85fc70512885b04449f2948a9f5b3fd5af7fec4a0821af585ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a5a4d07ccaf8c0d6740f9ae3633161c
SHA1fac48bf4f3f9fad1c0d48e379845823a7f543395
SHA25633ab10454fb2501ad1148f43f02cc35ac95ddf8d4ef6d1a5876496846f2a2e91
SHA5127362325a935a2a84a59b58894ce7bae3515a8928a950763951354b06a66f00724b45a9af58afb9791f2c5373f17f889897680c1d8f54f6273c127911bbcdc07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705572aad683ea905e63e6ad0ee6b806
SHA1e40599d9c461363e6b7f464f0c044e78b836dd69
SHA2564bc8ac6ea4461ea649fcb953435b682806946756cab2d2aaf08a6c43125a93cd
SHA512c07b253078db7632e997befa808c5913f152df9743a05951ce7bbbadbf90e1ac2ea97e2630c1515bc51017d155fefb078e036dbec71c3a93854b0f826222d141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5854887221d3099ebc8fca61774daae3f
SHA1de03a3e4af1c63ff8ee32fa1b5117e7889d78f4a
SHA256b8e77a825f07e7d901bb685d77d0fc2d3ddb70ae522cb5c160b12f30d63614b9
SHA51233daaec69e3a7d15029765d29ecd4b897a3850acfd4b3f46c02da360e18301cc6c7f15108e548db682850b5b9bea394095b75f875e1b5ff4d8c41e6af38719f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a446ba89bee9b8165fbc4a1e9ae977dc
SHA1b3d64bd6d59f12d37720899b256c84bff0b41649
SHA256285f3737602136c4eea10ad2fa5d8fb3c02e996931bfbb74d1dfb1a7a676a20d
SHA5127d5dc6f1badebc4ba024b34358fa214246e984e3136c030d927b379902d2de8732c0832a72bcdc55ecfce4e0010da96b34d8fa485437b45859f78141d640da04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc83abe59b0f2faad831cbf4e386a19
SHA1b46863dbc079e394083bc5dd8b0a2c288209d1d3
SHA256ec2d97efb40df2f36dd304f95e470decbea2310224bf06cdd475f84ab08e76e8
SHA512a02ad60ffce961ce49ce7e67581511588d686f6d13ddade452e64fcb45319b00117ef791cd515bcfac6b39e8c9ddbc34075881300bbb4fad7cfed5dd445b2c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b5f0973464f2b5eb4c7f3378cd63b9
SHA12e033cc50bebaf42985fab614c738c8a781fefce
SHA256ba541bf5988f6b07ceb39ce91f8832b2d7fbfe034f0e11e7a4748f0243d79bbd
SHA5120a8c32df30abaeeb55eb451a4fbae5439af3917d5d4fab9ab0aa09a74c2aba1469523764b19302cb647906e05c427fb9ba71c6fd027bdc28c4f3b8d0864c3720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55145d53e164b9d633041420c4fb0aae0
SHA1fb9f72ca6609013876b87381a78f569f01f9b172
SHA2567060b879b8e45b9db2ec7076fbf7c92e89f0ff0a50ff37bf1764090efeb3c7f0
SHA512a1b34b3e783b2ede46ed2e497a9a5c982086f043d6e58ac2d50b8f8ec09abf2a5598ea8e11efc53e0b0d7f211232706f7d7e88ed44e03eafb9f65ae77779db9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577848c4a29520fa875b93175cdd3b308
SHA1d337e9f098967b40d4446a34b758f3338295b890
SHA256e0f07a237a30bfff18cf7168ba85331819e7d60f2181ac7d6778dc8aeb3005f0
SHA512d9bbb25c9a511fc93e74a285a2480be05155f837422d52a481a51deaccf849b9365677ff2f9fb227cd296cdea3c47d8da288068e29f1c0503144bf0f897e7150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5661e1bb2bd6fea33c041441ca14c7e68
SHA128a1f5c5c621935d500cf5598073594204c91afa
SHA2561fc44d27fe3bb2255689c1306054db741c1b5d8d1514892176f9884827b90d34
SHA512ada6b8312cc58de2e6eb2b5fa39d33dc372eb462932b98325ec8bc0bf0685e7882024631695e631ad6c69e5bd899ac53c0c4e2ff5e26b1290eb62693102dba39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51991b83bc01e233089e0946dbb6df596
SHA17e949ffe7430ecddf80182800cf7c4b079ece48c
SHA2562daf99d921fb8dfc4e0bebb7e77674572a199571bff227f7576b91f680a38736
SHA512aa3c334161cea14e176c3270ead83e7e2dd096f01aa64f12809ab5c53dcaedb2ccddaa8de95b63a7a155598139ae27377540519ca6f0174e56efded496bf30e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba96fab12097e216f3ac16eca630287
SHA13a8006676e69a5cb425c8f2bb3b232aebe7b5dc6
SHA256cc95c0355af3df936b2607cce5f616f2f2a3f1c78e736baaf76292d19c00e171
SHA512226cddfe839b0eb1dc5d4f4bceaac1e46f108ededa69447c31628c26ac313f13e400d5f65307c966cb6149dd3d31e6d919be541e74210cf8d6870a64e0b7e519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eed225a04e3ec4b379715bcec4820ef5
SHA110c25757116f74ab304607dd84bc2963f62c334f
SHA25670810b3a9a7bb4d0091d6fcc90d93cf607b41415d7c60cee538f3be52e7bf2bf
SHA512ae7927f53343d83e415faa39a26ff39892e1a30ccd7b93cad2643a27c5995c580d5da59f48b642a9055dc09a07912177075f621ac0c00b20d307d78ee39a0f79
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a