Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
176423371ba1f191b97da064d8cac8b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
176423371ba1f191b97da064d8cac8b9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
176423371ba1f191b97da064d8cac8b9_JaffaCakes118.html
-
Size
2KB
-
MD5
176423371ba1f191b97da064d8cac8b9
-
SHA1
42e079d93f276e3ad613d61d8741f2fc5e57fb49
-
SHA256
c9d6266e83d5b0c501e8d76ea1717cd53fa03503d6b3b98c04bd21db32d20c48
-
SHA512
7b36315c345c74274d49895bf3f4816725f067abe10a5ca446e3de1e5705cd4eab92b209a2ba53ab2591b511565cb3f9366f22f77ea092b02de34fb1e9f84272
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D497B1D1-0ACF-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421069190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000d762770501ed571577b9d074f3f482fbb425f01e45675d2979f3a4e00c0452de000000000e80000000020000200000002a89f9ba89442c0abd96d9ec057db0f83d876b60fdb0fe3c87ee1db6f4519e7590000000b6e1993659cf7ae679208d96e4e4c5267775f6bc88979e7f8caf0ba0f8bbe871069fbd39a6591d65d710a62bd4b23cde7538ddeab6b9565d765e582220da3c4dcb4d5337b0d6271b156bc01607066ab2731fcbf397995d14a95e8eee8693e09f41b4368a740011ae0117937de1780610b102e08d44d3ed7c9b5dfb624982ef0c5ad79004dbd982bf906509988a5ab6a340000000a518af5654ef5d4a160630a55939494a7d4160951c054d4f9b4c6d9da83c4144134890b4cf0fade866e6247f8cacdc466439b2c68e1fa80a0212d413f5bd519c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000070e5033cd30735789058bd0e458837e1eff770e93ccad35a8449be3529d8ae96000000000e80000000020000200000002084a5ae4aabf7c323b248118f312f3427b2522650007eda775165d746d84ace2000000010241af19e71fbea95e4acfdd9a45adbf4ab24b2adea14fb3f230ee4cc2173a140000000c02bb4204ce24b8503d2d0709ddb481de721a286db95173bf1703457c44418754034dc88af20acdff551e1a4411d025eb2c7d60f25e558b887abe6f821f0cd5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f11aa9dc9eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2540 1312 iexplore.exe 28 PID 1312 wrote to memory of 2540 1312 iexplore.exe 28 PID 1312 wrote to memory of 2540 1312 iexplore.exe 28 PID 1312 wrote to memory of 2540 1312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\176423371ba1f191b97da064d8cac8b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5142c2f536ed4b52c4522350f00ff809e
SHA1851740e53045bd52f9a5eb55c62045ffa38a13cb
SHA256e2c908e2a6abfb47fe0c199f51434aa6f9993014eae5c9f64bd8d3e08871e434
SHA512415fe1b27ba1980011687f6de0ac3733560f3483891b21f70f23eb29e17c36e9872cea145fe8337a9cca36ac7d9e406deca15e77a3243e058f6bc79e3a77360e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d1ad91a55b65240ec8dd415cddffc17
SHA1ef7beff49fbcee457cde3549bb326be0cc9cc285
SHA256287d7f359316214750601c48df915a36bd55c03e103a0eed3fcdcc5205342e35
SHA512a31a01db668e6ea01c3b1daeb7c0d269f8bc3a04d8483c8f073bb8433c9d385e7f30af5363772ce08024724aa97c981db9c361b03902436f92131082c3b1c5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b55d66d8e18baa41b2b7f86dcef53bba
SHA191ae355724ff64e988ce3daa24d6e42fbf8ca452
SHA25650f99820d64313a8c907bb6c645b15ccdeccd3460e592a7e5785e62cc462b60c
SHA51211f18ff4d30ecebed6f951d7e814bd64fc9c15d4b01218c913f9f7ccc3398999f034417de0dee67a3b39dfbb17b4e15f390f666c8062afb81ee6831d6debbc15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d11a20db06650c7c889e785ef89e90c
SHA18fb382c099e60ce0541b2de8e28b2bb79170ad10
SHA256db383412a1eb689e4de87c94d9ae29ec587f98fc95bb924a1db5355dc49201a1
SHA51219cd3f4d341e0bf982a3739d96415a379bd3c29be5c8d85fcd5aedc01991a705169c0e17abb5b53fe89ba9cef2e0e92f62c8fd519bb8073204d8f899dd7f9e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c7f7edad99c0a76868488d26bd2f92
SHA147a5a3756c8b30216235f1020367106ec69c2dde
SHA256fe483a8c2616a6d5be4feaa91c0dc656d4a21031dec42d0b52d8115d79be895a
SHA512171b4e1a3df389e105713d1a62a2791b38126c655f88c87d5002718ee39d2f49dd76d5385b96797e8dd79974cbf0a406e393c5da0abe41845d6886e5040369a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d09996a0ca9401696fe61e828781a8
SHA1f3db0dc6ad491d48bbe757c33d52522e9924b2ba
SHA256275f55e638f24f4ea8ebcae617690c97378a70b2c1ac6290008cc1576ceb75fe
SHA51210b2ff74a262386d6499c20bd122e24ac0652241fd71139e2557561dc77d3f49b9ccc509180953a6573748780139cf2392e5e132fa0aef0058112d5285cddbae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d7e52e35a36230d9ea99dbfe582bf6
SHA1f2f6d8105d5192d61fb4fa9c14485c796b2a0afb
SHA256507ebd5f628c330f6695780b456d5f906d51c1e28b04cd4cafbf7b14fb40b15f
SHA51245e45f3f130dc66d3ee9e5851c94587804823590f829674475874d5d46d91207bb5c07001d15cdf60be3917a8fdac55586cc33746dd667e2ccfae5a93d27d955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb95e22cf03f7586ac8baec8c8472b8
SHA1687dc383546ffc5828db3ed6c379b3a4d5f20d3d
SHA256a9c9c3ebb8eb02045f371b19c1f516362d369b3c6206dcef55a87ad63897bbd8
SHA51246a6b3fac64a3c3638ae9df7e0a3d92dfc2627ea2a45d96c7d179cea69a74ae10d25efe0257c797f184879a2cc86c9d76860dc4ebdb69d7228a86d1f82dd2a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eec8cd3c2eef729b992eec69311baa8
SHA126a6e53f1332bb7c2af516b00f831ebbddc0d6f3
SHA256feb06c02c76e33f5a3712f896abe2a7fb4d12624fc6ace1ff13394af974c1874
SHA512f9c89dcfa5d8e7f7920082528909daeff8a32651a3e65aed8e5efe31e7e7ed60766237c210027f0a877160205626945a40eddbc1eb924e071b536610a6802aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5957330e54149a74795274a14ca1d4fb3
SHA1de0ef9be79cf0e30b9be3ea9133ca4ff37f639c5
SHA2563569497f93973a71db4d7443327fb6d3911cdb5467a06a4d30e4922ece00b341
SHA512967dc2ff0d3e89bfc095932148097ede2b6d9e6919beeb232eb9b803b61d9d0ad59b11868f905bbbab57551b392d53878b9f10a2f8f334b3efee485723cc8aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c660fa17498078811ddaecd55de5dd8
SHA17feb761e98a4691632a788cdc65510ea97d7623c
SHA2569108b3db9b56e0696b77a521692242f0420bd625e68daca9fc6a82eed851eb3b
SHA512cfaabc545e17717fc29eacd3d0ca3af626ef82aba891259049e0119be5c79391a6dee0fdb31059d9408de85be258466d7ae2a14127af884fb5da3f4a7b54a4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598652842760d7c72ad9b4dd6cfb65dd4
SHA1a3e3d5d6da33870de6cb23de20f0dc5604c5aa3f
SHA2560672dfadb2319262ae112215b0bae7728c77b2f8fcc65226edbfa350125d0db3
SHA512135e5b88d710dd522e3d4963e3099d9e7be9b4ac669d0fc5b01fb3c05fc79baac2d5f3991628cb9cddb1b6bef7596bbf2f30370988510f8d348689032c4f489e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d698c8f83f66ee2642e4f8d85e90e5
SHA19e55eaebee9cc9aaa6b8f0a97464991aeaa657c2
SHA256e7586c11c99b4275e509e84001d898ea96000f3aab119978a2c14382935a7535
SHA5127f3cd23e2e12f01924a2297f30a78f7796ca3b891ba0d140915abf7227e5b2cfc4ef806ef49c5d094871788e412b649b1239c27af4849ea7812428ea8350f8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ec94f41f534a3700ec8d96fc07d90a
SHA16da626e4639cd9df3eec98cb476b8ff1d83f73a7
SHA2561739d5db2b98babb6f20badf0ebb9bcce0ead816c3e7b1517b45903bc4d4bc73
SHA512f937f7f1d7c719a471036552aa353a8673a3925481a5bb001056d8ccb4d7e1140f5f1dc1018e0dad11ef1588c7a3c24a4d02f0391df16eec25ec7c930262e2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f25f4ab3c47e344a373705cedd0cb017
SHA1de982f43e64583217314bf895894817ff9506f83
SHA2569e389f61cea4bbb8008f981b9c996c8cfcd839543ab9be44eccff9aba73a3d8e
SHA5126bcb24a14701ef2765d22e2be1314ab14655e6c908e6f026aae229aa80dd4e9b92e323852c849c8f2f06f7c7cf0ec8ddd3cbf5ffe47c97c2e97e010088265a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e835cbc6301cb41ab498fe0b03f129
SHA1bca4cefe68f97a9e75da799d78a2db58d8401feb
SHA2564fd62fdc4c9e8c15f66a5d677a68b6846622197d8bbfba31cf7feccff27fc35c
SHA5125f3d685a0196265763675f58fdad2a7d7649c16e45ccff930a3f78cbeb55cd0c9757421494eda2731816f6eb2e4c229ff565f829b83c86496172bd067c213027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b8c1dc2a5772df0d19908690f9cd7a
SHA18037c36387f5d208217623a2654df8b9de19f6aa
SHA256cd7eb0b00eb19709feefcf22c60c4052c49628373ac92e3d576a3baeef222964
SHA512c01fd69d1bcd6d23b9ff484e0435b32768c6515e660f2c909b92620c1f694c3b64094119a0d170e31d9ff6662972f84f22526ed62299f801cad273960a01bc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b06c327694e1e1d5fd2af31290680d1
SHA126102f351de7efc1277e190bedcc3148a47d1e55
SHA2565498c96c05ace6f451af5f656e47ded4f30bb7b49b3f559aeb7e1a500c871fc7
SHA51296d4e389831acdac8a0be017d438bde7f406adf81ec753226a9e27311555327eae8d508167504c1e34f408ae1b537120e87d6b79c2b2f6b2f0c53e4d534030fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dacbb8407555897557beace4c6878fa
SHA15ce22ca19da744bc7ebdd278a941e3af0e07603e
SHA256dac1d6f40faa567c4de6acc12e22d3826f1d04f20cc30322c104d4cf24823b3b
SHA51217bd6255fae9991ec982bb41f9028c8ceb28f6a089a8301383b5741aa51d2aa617a46efe760f387110252fb557ec64751779a7a94a271aea7ad090cbc99885c3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a