Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
6b197be854e8c6c60a1721123bdbec36_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6b197be854e8c6c60a1721123bdbec36_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b197be854e8c6c60a1721123bdbec36_JaffaCakes118.html
-
Size
94KB
-
MD5
6b197be854e8c6c60a1721123bdbec36
-
SHA1
1daecfa7655b08af34bb5ca7b621a36d022bc29f
-
SHA256
d44250b7c6d6c0c7d1aef30ced11b5191b0a6868a9df37a2aca36977f9a0eb7d
-
SHA512
3dc8b3c94a46ce07d3237d2059d2e010fa903d3e89cbd3fbfe3b60139ee8b6f1c500b12721c68405dc2bccd63d819d763e487fd35dbb3e46d3a4427479d93eaa
-
SSDEEP
1536:WMLiNVI7Lv4+P4xfrzaw9qUreshFLrXvZbFyayjBdkrY8mgHC+qpEyW:WAi/DSBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000834425d81cbf9c438db568ed2a5c81f80000000002000000000010660000000100002000000053e9ac735aa365e15ef667f0d0f330fa349c81aac7348bc322171108d9f62326000000000e800000000200002000000093584b108858f9713a99336f7d8f1b61c757a03e3a9ee5c2b275b6ac64451955200000005c75ea0977948935d9bb150c0a76de843881c2426122236e589f47f67d42d5da4000000092c382892cacc7433a95207a9d93edc13f4ef1d6404ddd2d27965c5bcce83e5472b54e276ad1e6fa7f090bdf03fa6d11b038fdcbcead86a7ae4d78a35d23fff6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422747297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAEEC421-1A12-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e20cd21faeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2712 2260 iexplore.exe 28 PID 2260 wrote to memory of 2712 2260 iexplore.exe 28 PID 2260 wrote to memory of 2712 2260 iexplore.exe 28 PID 2260 wrote to memory of 2712 2260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b197be854e8c6c60a1721123bdbec36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787c134e1d1c349b4d17e381e6141ac6
SHA1fea9daeda7e74fba805ecf9108f294270438994f
SHA25628d102e62a131c40ec93cf330b40ea7d67e7004ffb1404d2130a718c2ff45fb1
SHA51244184810fb22f14701f06b2116f45a6ce193df8edda24607d9beb52b3557ed3a34595e9c1c4e02c46258dab1b3ea15c335ca93f8595b1d528071e538e00b7aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5278f9b9e01e45931d162110fd0f4cf93
SHA1e36317287182f67f599f074790da84c46a12a65c
SHA2560426a474a0f81be435bda395493497fa81efa89b4f3a49ba42c3f5f4445a6acc
SHA512a60404347e2e9f05de129ee6e90384f012487ce851f75c196cbd7334805c960b66e59bbbccd1ba24ab5be725ac3f982b1bdbd4d4ff0fe0867ce9f069d8246410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b23b1560edc859b704f1bfed47a861b
SHA16df654d91904cf65a264c09edf714e8466dbea81
SHA256f643cef2d9b3442be5e9bd0391c8e99e79e8b86aa2eade638f4b601302699456
SHA5121e0c90f8cf5a9637ba97495de37d1a91bf503f107e7cfebd2fe808c44817e00a8a47a8000142ae231b3503109a26b467d763f8a2714474a1bada3d9caf7246e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e67f385a7a73b0c8b91c263c037b9a3b
SHA1177cd6fdb09a8fac1a131613805bdfb7c717507c
SHA25603a260277087a01558fbe9ed2f20bb2d2c8fe17ff3b056ed1b937ffc8da500ff
SHA51238936b33760e9d58656ad57e135c0b7f79eba5f824d100f6563abb2b9f450e75f8b9cede1c3f920830ea254fe68d923b9d438f890aa1a613239e170a2df62bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f1b8920de397231e12c59298d56540
SHA12cf7896b333fc63cf9c6d8c448aa99bea28972f7
SHA25623b5c1a9c6dfe59f0dec2598c808ee47d72cb7ce4644d7dc11a1ff62dc84fbe7
SHA51293af1d0ed319a8c5d7f2e0cb1a0550c70aae611e8a94c2cfdc5c79dba5554724f8a7ccbd28a0d3af4763a6cb3c2b2280ef684621dcccb505730013e358ed8f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562588e68d7166cfb9de37298a53f16af
SHA15d07a439066e7a2e4327fdff444536f3993a8551
SHA256920915d60911466f8f250c9c7ced4af7e965045560eaf4d49402a7277c8c14bd
SHA512c6b6e6a66106eae21635b87ef2054bc101d48636855083f8ec316d94e52456749b60695d7009e1a88141d1a543963f80dd6a4cb6dccd3405b5d4c249335725ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc8d1dfb225255fc4b6cefef5acff97
SHA105a26528b5be9fa1a7a344c4a8f65ef14c14353d
SHA256f8f925a97aff3b55761da6dd2b11b2f7a89607111117f5612bd53d7f6976e1ee
SHA512e52ddf3449bda3f79eceb2d72eb577cfad0fd1e2cef19881065027905ab2e838e1a763109166ff13cd6068f420d1287e04c65ac4a55bba824f5146dbd8a11935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a91a2a13de2d6c1c12411f557c704b3
SHA1b9a54208e5345811d14c6bd773468d635d4962b3
SHA256991b6e4174b61b10040ffabdcbf7a1df0eb6d87de705393409a31f0a11610bda
SHA5129461443653cda035632e601e9d335cc4655ddbd32d4cb871ce43856e131227b016eed2da717892775ac50d304a597344ef52705c635d9abbe0ef0ba6c6de638c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc4a0a21ff7a666a2e22fb18b9404d0
SHA1b502a40248cb911ab8a53bcdac1b03a07c12fa96
SHA256eec6d72fd26331e477d274af936240305cf72f4892aa353ebf4f66cb7691c94a
SHA5121195a89ddfdb29d6d4fbe82c1cf4f6a67f1d951e99ab6f595441416a928c980ce446655c023fc276d04fdb48aa04ff088fcd89f58d5d05e59a5e5b3c4b9c6f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524db5b1b2b8a1ce8fce6c17262665d8b
SHA144faf304697c7fdad6465ef6b1ff75ba9ad8f796
SHA256f691d4b29681243b2a457ed02ad05003a8a763c4f173fd4dbede6e971d84c627
SHA512de646a13306fde178d94f0ce69f4a0ee3b2f9a19469c1e676f087f9614a748aac6043a30887c9c410aab0ae2ca903f6cadff6a1ce0db1dcbacff4be9b2ae9608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb11273bf9eef59a88afcc97e5ae87dd
SHA1358bc8a4ecfaaf1c7a6efa85ef7f95d7cf0954a5
SHA25614010f79d72b5477539b5757fb67d8ec10a020395bc87ce63148e7e5939ca0fd
SHA51260febe686cb862fd199385e558edbd844c2666f928273c326f8eac10ef7f1dccd65a0d9687db27836f2fa6680fca2386a2dd5bf2b3ca169659a8a9130aba3be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2506b409def93ff5783db8e8bbd930e
SHA1712c9fe391c03a8ff19c47dcdf7aae06039d3030
SHA256854aa52f5e5c18f29f5b9cce9783a7aecba970a38cc9e65a2c822f897b7ff06b
SHA512992bb448b953ad26109b226c10150c26a7d74cae95d0c66f4af6e3ad05572bec24525b8e7cccb6bbf2bb2476cf0a480b3036b0f5675544f47e4e30b80aa2ac71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4e045b139bab1d186f9d79f5cf53d1
SHA1f1f42502e4b6d43fd23163a786f8903d5e89ef24
SHA256364f5c641961e41a2ebe9ce6ac6632fa745389fb1d975c7b4fdda571569fac70
SHA5129c65b719ea281986c8256607e9bde7cfd9dde80d631477ca21d4d75416302327fa239694d8a854f758ccb86ec9ab099f2314218f1bb723070b871471a68688b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511bb97612c505fa4312988c9eb0ee8ef
SHA1be762a09dc19f705bab8682b0acea96ec6a01011
SHA256d0ecfa8c5dc36e29ba9a856c85498ca6f6dcf809220b05f58c5f22f129c51382
SHA5122a4db42ddda945c3b80a20ddc1dab3f080fd5f63826f4a0508cff2b6304b723fbe4a72f1e4dd7368060b1d8b97d13424a67b4c37e4b8479dbda3fbb2c6fd7204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0bcb5aeeeee8fe4337753cfa66f6283
SHA1f57197b904ac9d11dc1695c20694cc7d183a7e11
SHA2566bae5dedb5cbb38dca276f3d9fbf5c436f0b364095e1b754e7370bbdb224b756
SHA51208216c7c587ffda3fadfb7bfc2adb1333dd25545d5c178baed42b5657cc93aef54dde7ee3e97055b34dbc77b126fafe8aa841e07289085c214871b79ff45cabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61e449e42a0babf8adfae8037370d54
SHA1074813da165423cf18d4e19cd82c521fa25efd9b
SHA2560bf5491821b9fdaa9f3a2449002b9e3d2402c653111cc3e91f4519c50b97fe10
SHA512e9b1d46d141ec48dce522537f314e79e841a90db92b889070207749f6c960acac2e72c2a4c149a2fbfa8f5f2fcdc957677664faafada6e1a7e79052df7d82ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593920da804343762921c7cdec6675e7b
SHA1e9a6ee455e364492fb14854f10d86203b38b7653
SHA256afdd1a3cdd44e38e12a76c343da4a9ecd114aa009f708dfa372c24d5a53aafba
SHA5128d4ad2560a2f47552a16869d016db2c2a039e7b6e65bf10f201186b540736885ec43f81fecb1a2a41671c0baece46b7d40dfb2cc55778dfb7a293203c63e9029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b5038ae8c530e181287841fa2e30842
SHA1fe68f9b66f593282e3e3222574a4d456b2c8f924
SHA2566fafde7c4ac9efd1bddbf4ebe129c800adc4fecfdf5a0443b88afdd1b47c16e7
SHA512aff0c82870302b784b0876535f8c8f5a6a0c29afa266d1de2050d1e9087be0bb62307c1fc6a5e4f6f604579163392a2e7e51cefdcba72a2dcaaad3531586ac99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec94890cf78ba31c25ffd9c96116ebb7
SHA1a6035b7145a1e1999c8e68a3c8164e6903107b9f
SHA25654e6d8dd8fcf42ce7e6fec92a51d5c23e55055718cc455c96381894965a0f7e7
SHA512f4803021a65aa4978ffdb5b9f01d69ba3c2a507c89d088fb1f9eb0b02e192a108d09642e15b7073c35bf585a8e4e7398127c19108d70778925ed72aa004384a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\075-Wipeandclean-icon-400x300[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a