Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
jXgJs3d.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
jXgJs3d.html
Resource
win10v2004-20240419-en
General
-
Target
jXgJs3d.html
-
Size
15KB
-
MD5
139fad7d7809546c8588b5899a355de9
-
SHA1
7ed673faea2fa48726085f24e9b08dc1dfa8d252
-
SHA256
a50ed0b8941d4cc4de739177df69eae79412f17221a984b11816395bc5d7bd3b
-
SHA512
b07b7bb34e0f2c642ed0216b8718a96b8cd0279dd92df0dbdc5fb1e0564dd63ffc667f2ee67b1e59366623ef0414f109c1cfcf60f833ea8ae7ea7179bfd79163
-
SSDEEP
192:PNx5Ssv99qXoqTJkNr423koT7p7juhU70nNZ9NewaH1IRy1N:5Ssl9qYoJkNc7y7BjuhnNewaHG8N
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420836622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104f0e2dbf9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000017519b5e554e8697511ef9ce5bd04afa4058fa90d81ba9a852d2159ad7177077000000000e80000000020000200000004ab296c41919d0dea98431557a4e1c5e15e8eb29e1b2d7fbd4ba1552de49fbb290000000d48c22679c10e738ced92fa6d759d76ede12558437c5ba9a4ad646e79d62f02fff6ba3d2372d0c29e7b3ffcf08826f4879a1b11822512e3da362143db99ad72733271e13f69a9255f2ee42bad034ccab57d06225536d9ad63a64698b617b12e27939022d54962afa74d02cfab96ff34664a9d9cda9433c3f487c89c96c091795fec214ff4f32b5b49cc33a642f83cdcc400000009dd234dd492e1db65b455a6931f6b66cd3af98af4a479fb8aad424273ebe5b7eae8c95d7aa66e8c63e2b61baa7fca499684c7648f1ebf611ba29ad9386c5a3fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f00d1bb68d79c2e07d811a5a657af6bf7cb58c8d7d7087e0bd17c9cf6963c92b000000000e80000000020000200000005caebb52001914fb1b05641e2731814762d10e70f0c8962c054c690c2a33519120000000e87110cf8b15a11aa874d2678abfcd2f02c8b716e871907635d87de909b791fe40000000e62fe62af26dc897d10fe25248456a47eb6995fa908fec0d34833e663ae76901b5e42bd80650fadd3d8fba6245bb6332e5d5852877c4ec2d00008ab7b3c8e864 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{587BBD41-08B2-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 3056 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2532 3056 iexplore.exe 28 PID 3056 wrote to memory of 2532 3056 iexplore.exe 28 PID 3056 wrote to memory of 2532 3056 iexplore.exe 28 PID 3056 wrote to memory of 2532 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jXgJs3d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cdb030b644b7e49c5a1a98f50e72130
SHA167c5958fa7e95ac0e7c5730f0af5dd5579cdeed8
SHA25649eff9431996e38f60d7302399b0f8beca24dd9cd812268c23a316835949dc8e
SHA5120190387dd5f7e263363a8b6f9f320de1d3f790ea8facb40118f45f4446f0376fd25fa579662ad95a5978792b8f82c7e979c17cf695a78ce3b40c3816b3c351f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535804a09caf8ae6486224a7cb5161dc3
SHA13193c876c3548d4c53d8d76d27ba1b36323b9e94
SHA256b6c8608198973022d6fe82cb1487d66aeb2f03e5ecf31a90fec4420ae7f9de2e
SHA51217e70146a58b65426a51585c34aa54d85151c31d5618a701fca7f6f543165aa6a953062ecfa31704e879b47cc64d4668252aa88f6e6648ddd2ae90ed5c39cc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a7c18aad6f330530df5f5522abe138
SHA17f9e8dbb9456d7624ca7f08b686a94b0965ef388
SHA256ee0ea2c867a122c2d3891a917b74035e630de6f5f510c0564f2e2d64a48d5c96
SHA512760c0101c2302e459e999684e1f9b87c3180c91940d8c222042980b01a6701fe3a7f5c79148a856a22f4f9706c9bb97a7265f2dcdf38c4545cf593a916ca50e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da6662297c01d4c9cbc4166c3a1ae0ec
SHA1e39b34a248498ff08dbc715a3ccc8ed9b2ab3917
SHA2568f6cf8b00326657f66fd2613a3724317f8a669d1a060fb14115817909e79126d
SHA5127fedcead5bcf28228558ccce64854d48a4956ca707853b2bb13b1e01b6e97f482b3aa15ba1d9f7575e8af8e9fc868c1f02722bb68ecf991f0300cc5d5da1ef39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b59dd745bd25316bd4316eddd217ddc4
SHA12711cbf2d2f2a1e766617c9a294b93ebcbc257a5
SHA25622c09385b22052759295d706bfe958f5053c594265954edb6a4ef8143820124e
SHA512ca6bdd8ba06c08d2ffcf6a9e3096baab73f24e2b3176026719194993856aa96406c33da666cd74428db0fe43548a75189920913bcabd0d193e01adf483892090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbcaf62b33fdf919753ec808bb130b0f
SHA15c74b77e505efd7ca00bcbd03189057ddb6a8f70
SHA2566ec24b683df1617bc1bd11dbeebdfe26572d16826f763670a35f8805f5c7de58
SHA51237ce13fdee623ddfb3963b65fbc7d17c80b9c8eb10a9466dddeb4519c0034d3c55466f7f432260d0764b626d6ef5c3bd4b34b6d59ed10ac8d58dd3d3885ecb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad15544bde63fe1a4c8bc35282dd6183
SHA167afe188fa037b7deb4156a390058a5f17ea031c
SHA256a890ecf33c1e561cd24375ad86ecce96f583e6b9e93c3fdbc8c0c9dc6a2bf87d
SHA51294da8cf3bcd3d68c6fd84d0e8b9418450fcbf932f116f33fbaa61d7fb12dd374b935a13290b36dcfc4ad0a4661bb5425f66a26e3f47b6dc8feddcab329b877db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ceb0c7704e569a3de521f017ed97052
SHA1ea9dc6dab99bce9eca189433675221797f0a1430
SHA256ec2a09c02eb86b0e442567ea1d953bb920a02f1b1217d597147a79332288aaaa
SHA5122f90649a3b59988b673ed4cd348264fb4595f995257b838a88351a534cc9b1ac137ef9100adc3a49966f633691c3a88f36aec46ddc53dcc6df0494f854648621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c89e1536714fdbca9adc1057682932b
SHA196fd4b82759a153f3a7b7bc6e7d3f06230d299cf
SHA25654d825bd665d3bdc750b0e8e5b5c1280e883572507be9f4792f4efc6471f2182
SHA512979483eb5b5f0f284cec19449ac69f289da7615a7a2d2d9838dd8a2ae4bae64308af75a276827d31883293f4f592a4ed61014a1553038d6e0bc234c04b6df2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96b99cdd05f57997e52fb97d9a3e359
SHA1ef9ac8a5ec88be4e30bf99cfd5d5d20d54954ade
SHA25651557348778e5271ed3a9c0865f12b847a93b1707ebde3be82e1991a82b8ebdf
SHA512b1849c316ccda8df595018eb94bfbc49094b2a326307bc3ef21e374206c857f06e71a131e3cb797e772fe960cf2c867aa10ff3c6592813a3dafae9e5eb138986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf7515e7a140d149501392e64ed298ec
SHA1a791f76a69d08a00ce17c8fec8d04bf37cec13d2
SHA256783b32737fc03bc1af202abb5e931dd2818daf8ee024eb90083ab781ebe02084
SHA512b3011e4839b47ff8c3af07b43d3e96b3109e90c278667874c060d304b4441465bf27358a0b358c65c92a69f6b077d1ef2ba426115e6aef2dac92cff5e0d485f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54914e05ee4fda532a30ae55cf2731ebe
SHA105c270d63363e210d14e8b259234b4d49d648d02
SHA2563946c88893e0fb22a48f5638361005551202f083bedbddc376f825fce4679bb9
SHA512fee25efa7c12f3488c8c2e1890c1111beb30fb57353b775e20fb5b18a53c5f30c159ed09b7588aafb72c828c0f5c633be0ff3bbec83db8f29da9e7bb08663e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee61164787523d52ba86b048aa5531d
SHA149e0ce5d87eaf6e4021f947eb858d9b9bdf384ce
SHA256793bdd1c9ece47561fd0a0cb0347a16c6b2b449f17b0b6f4054e51160530d352
SHA5123db52b4a350a6054d8c2e5a2e46e84bff5d8b3ed28f0713d54a806a624a339ea368f6257cb83f5d51624ab4fba6d418ce1ecd79a6286930bea47198f63a303e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56adddddffe954f92ac1530afe081e487
SHA1c4b302467fd66ebfc80540513ef59b88c668f3e2
SHA2563d061474cda7a67410db2c7ddff9ad811666a9227239709281c4b22ca90ebeca
SHA512b2e5e68a5bc26a4c8834dad0dff770c3c94f5e60f1b81492b17acc0b353c8134f884512d6ef8fa625f04b1d47f84b167c7fce5b073ca64df344af7572213ed13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c6e7c08fdad63e743a2f1360b886ef
SHA1624d0da0c821b3b6c585bf60b09d54af124f89f5
SHA256245559356d8c91ff11ae0563fa9a5aa5729525374e8e862a63a8e423c92bcbd9
SHA512b6e25186abaa2a7a11d5011b3f14bae534c933a65314310c2c7ad9d5e0b27eecbdae791ac473978f266d9877bbbb989573595330c597a397cd76e17a9a0fcd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c7004cf55bb15aac2355a800e92130
SHA14699a71feb776c1fcbb7774f58fbb57c61db29bc
SHA256ded8f806073774fcfe6ca33b3cbc6dfb36487776b9cb4cddec2043dc44fe74f0
SHA512da451fe6b080561108352fa5e3a8bd56ddbdd8f7a7fb9b2e0872befd2dc252b575bc6a7b79e819c208b937809c187d5e0f75edc209a700757f9f350ec3c533da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c12809e0ea8b61be6acf8188fd65699b
SHA15f0b8f3c3c8877f74b419d3b75f086db3d2aadd5
SHA2565ecb461a9bdc6ca99d8254e7aeae7548be67892e55e67cd4e3321a1e709f2b14
SHA512239464752bfb18f49ae6caec58be6112580ea53894d09677ea62945b0efd6a1212b63a7c1d4695969f3ce558b778aa30d3bb11e02cefd458de1a24e346526136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702d3faeef49292225801eb5090d5441
SHA169565b301e2b8f1cd96bd8a374d6acf85c4432f3
SHA25614096b34a70a87059a17a2cedb7982991e7cc1c63aab42ba3f0f6df19e8eaebc
SHA5128ae4ea43c14a976276851ba5ec2b31969e48850346e90f5682eb6084181d9c5a91c74717870ed37436e00dfe9e506d6e6e06917217eecd782078f999e5568f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512cd3c9bed6087966eaba1c4d35af98f
SHA12c3f6cd9da57364f1b84da7ca6c4465412d95098
SHA256da649c7940101e7afe9c7ddfeb30f2d4d9aac32a5f95d8a92d88aac7150ce3a3
SHA512c70167793ae00262ad89e0199f5dcd6c679b869f5133c09449199376d52bab25b185b2338e75f368d890e3bceda5fc829a60b437ff062d31723049f841364c7a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a