Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
08b7098e977fceee03685e4b995222c5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
08b7098e977fceee03685e4b995222c5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08b7098e977fceee03685e4b995222c5_JaffaCakes118.html
-
Size
44KB
-
MD5
08b7098e977fceee03685e4b995222c5
-
SHA1
65409fbb3e75a06f8ed5e88256bce0bfd3679e17
-
SHA256
71ef02b0d7c66658231b00fc24ae4f282a1f46f4da2ddc9494a2d3be869ea820
-
SHA512
d40330cf88289197d0a71216ff4e06943e75a5aa520f4c59d54091f9f6b26afbcab7d743a987ff7ac3385632e74e97b78d51db6055a547699c078af9b14fa503
-
SSDEEP
768:WvFwvDjvx+a6Aqp2EufDk/102cJmE8OJBw9hZbiSEOaW4iQrxogY/4U/E/6z285T:KFwbjvx+ZAqpPufDkd0nJmExkbiPOa8t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000064a949a1b07c9ccc1102c7b65eb5da385ca469b4baa6038845b8f4f8a49b6bd9000000000e8000000002000020000000f359c44da7b584e80f309ad138852ee2d44b6df5b71302dc7d26bf00dc25fd3c9000000082a8f69f2e80122ffba9a302cf51c20c97b3e69e8bca77747436b7e1aa70cce1ce0b126d6c64e649c5c209e42cd848e1aafdb3fabd5473731b71bc60f4b3b481db3ce658ca4f90a20cd00a04d2823a6e4645e5936a1a9044f1290d875dec0185908593c9a1a39a760570934d09cfadffee3f097c38c4d5a0b03942e6263ac511a1ecbefd1be59a12c13c2c4270881893400000005402c58e58e78e12b64cc9bcc4b190c944bfc710683c26517db94ce1b5648e70c851f07706ebf4a7d037c13682ae012c88f50da853b632ee9573630becb55296 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F981FE31-0690-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000bc3d2fa98eb678547823ae847d35eccefbce9a70c7579bcd757783a73791d98f000000000e80000000020000200000004069f3861c3be715cb5bbb506cb83042ce51d0fbfcab8da4efc39eb6ad2b0173200000004e00fff6868f06867a41b4d9d8d3f3c04a0827c2321330fec20deaed684b36e740000000651e899cb49327315514f693c137bc29f9146f441c4342b7d0824a58706c8edd16559cb0384d21fb484dbf86c66502f389dfd5bd159e8f2843eab8e8188ec0d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e9b1e09d9ada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420602403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2756 2416 iexplore.exe 28 PID 2416 wrote to memory of 2756 2416 iexplore.exe 28 PID 2416 wrote to memory of 2756 2416 iexplore.exe 28 PID 2416 wrote to memory of 2756 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08b7098e977fceee03685e4b995222c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59a4e71b81c412bf54bbb947aa9b3006e
SHA18a3110144ebdbf2ed06d43486921386fcacd9982
SHA25654cd7686cc5e7a82c70eb25c4185d01761ca5a42b1019e91e6fa61764b925c59
SHA512eedd2e42bcd69d16d9de7b1739c59ff7b3728e1bf1a0e3d1a7ce1db577e163cfa6da854fc18bcf46cd5e60a0e4d08fe2ae01d51690465801e1bc6c9f4c059431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b3b7db14beb69c0c966cf2191c09623
SHA1f3607e1151a18f15782235c419fdb98ba31c379d
SHA256c1acbe9b15f52fd6eb6550bae62abf10ebe1a11890b8c4212844bc37433bcf17
SHA5120bcf3b126118a9d828b034bbb8eacb93adaf343bcbd7ed3b29bd04b68a1fa8299dee6c4d5b17dc0689b9922e2bdc89c01672314bfeb9a3547303ab1c7eced032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58868a124eb30a5c16a3f3d4b590f3ad1
SHA1a81771995bce61b64ab3280e7ea8eaaaa312880f
SHA256b90f2e17fa32ade4c3e8014d49398f6ebcc5cca96184d03cd74ae905a0ae3e40
SHA512fea08a9907ab9298fd3a44973b11fedf512804221e7fe0d0f7cc55875921da1b22e0fbf474e34358a9985f2de3b937e018af3ec1569a45f36e03a6e6ce658ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56939ef6c3b4d1014be80f4fd52ceee62
SHA109855c79a2ba34315c8d972e3b7ff83cb009152d
SHA25685c184aec46dcf0b87faa5223ab1c8b9ee918e22e17bab5aac1d2f01dd66a92e
SHA512b32a94a98868e5ad365e514f98dd92442d4ae07467072d1859cb1e750eab62379a4db9a46040d6bc0b9962aafe611f8fdddea3239b0c622a0538bc18123c6e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca62c409c33b49b3cb20921bc5a26596
SHA101c75aa4e09ce036863450fcbeb80f28de37593c
SHA256b494278ea23068739c4672f81cf6ee2e370c380135d0cbf15c14add91951cc5f
SHA5123ad386796dcf12099d252cef22cc2c3214f09a7508d7adc2947566d14ec986ec43706a95ea0fbd6f9d4644e46a4e05733ae872274e8771027e391629e3f16118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5509c208f9852a4ae4fde3be0c73737
SHA1a3cb8451fda70a228da52af3b9dc69d3a2749040
SHA2561fa1eef4794dc3cda222d9d140db09d7203099ceb67ee5fce2633437059687b7
SHA5123d38f373dd9192613ed6e063ad00328ae804f12c1ed5d74562165452364be548451dbaafef6ea10f4a7c9bf8a53f040269bb9ef405260653dbca3dfe52d1f10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f8759dac71ccaae3c706397afaaf816
SHA1f15b2aab26e55fae833cb2fa60fa51853e13ef4c
SHA256f53ebe51094d9eb49627e6ba15f603f73743d3d719b0f0196d50ed5c8535b2dc
SHA512e54a5c4c845958e0a6a7c4f4fdcec6db6d1c5d73e8dbb52eee4291f4bbc2fbaab27e7397d65b33db88c8203c97e826d68833822b903d3b19759143f7caf36566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a438c43ab629bc6904920f4263302b0
SHA13bae121ac7e6edc1f7bd609ba46a03ec3c64f44e
SHA256d816c0c065d3bac4c78ef46ff20b655352f9cdb1501a848e915604d029bd9c8c
SHA51207840eb75c07f8c0a3715a6cdd6a03cdb87393c90c06d5fb64322ea7b96899d319dd8f3f22c90cb4c2803910dfbf7651daf98bfaa0b50d73c9135dba9e0059a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15c3f8678f8c655b3fdf123dcd9b6fb
SHA17fe8fbf5b7c0521fee57a96329d8e85dc339dee4
SHA25603a1ff3b6c899e0c68da4f6fd22d8810e4b658d74da0abfb58972a8e9ca002ea
SHA512ce563fe813c22f8b14060e7e55c200f74be4a4b7ab8788491c8880be021b0ff69ef430ebc06cc3de4c542f4a7ad41a9725d0842a981e51434059991f564540a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea416e7a1a8fc5b017883d1cde1d0db9
SHA127e54ad7ea6d112c45e3b0196e1f051a567d5bdf
SHA256b25eaa71449f4cfe233af9b03b323bbcf10b921478991fcea4ff7b263fe42158
SHA5123dfba39d8ff38d5f6b7d3e43b86c93728d4e598d361904ee667e67293b6110d6694e7b2d5569252981e36a213597e30641f9b288468482506d16e4111b9bc765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc892c2bfd4abcf31902d931b31185ac
SHA12bdc4ea8ffb23bc47d25b1c0a0e60df947d2fa0c
SHA256d56cacff10101b3c87d096b050acf1603ee6ba9a8088c05799502ad09088a577
SHA5128feacdefa83eaebb9c45c65e6a6cb9d0d06c0b57e499a89ebaec1ebc30788175a1a519efae40b8cd038037e6017d684821c6d5d42d4005fe7e19e9a2d590358b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcad6d3cf31ececc90366277c2d19d05
SHA1850d9c90ac03dfa12ffa96bfbb83b3a0a894def9
SHA256db53d4ab87b002ac7cb613453ce82f8c4dbd2593e41ef3d8baa20b3403be0a6a
SHA51293595e190b73d66ee3eaea399835c15efb342a58495fbf7607466f0756721a44ec37532b3284e24ee513ac44e1993690d4e076adf0ae63fb3960b30f63a5afe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506f7cd5111d3d6d6dab2a02a4fa1fe6c
SHA1011a04bcd1e89871c826c48b550f69a84d8c209d
SHA2566204c34c234b10e3ba4e8bbe6af97c20738b97eef0a3e98da533885097d4cfff
SHA5120e47f54b197317a79dfae9a6b673bbdf41b5d3f3c2e9148f96398222726510576347f052fc6b489c14ef38195708fa0f8ea17346f7fc64dc57823533e98090dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0d6cbfea57727f3e503ee3664b1029
SHA18ab8814ff1554fef554d840d5469d750d8b2e7b2
SHA256de0c471fca59c4cf59ee7facf063bf60b0e3870bbc07205e077ac20e8fae1f7f
SHA5120e66539043238cec92d5e9981bba68eacf159ba87d0e8e3fd2d77dfed7e20ae098db0768930bf3c5ef841b5b855837d82a031fdb16bd9af50552de83bc640e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c97ff3219707fedc49743e345fbd1133
SHA1427d4169898963aa6c84a7ced2412c3d45e9b505
SHA256f787324bbbbebb2e9047950deba1bb5b6dc23a62799f508ec4b3c9bf22405059
SHA5126f6e8672c8745823abb4f3b3a6dfcf46359e3f83b6a875035c3b566bc9dca22a66d4890267fe052c3372512cc19a204b97054b904a2cb2c92dd539881ee919cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\eventon_styles[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a