Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
2ba333f4db01c910ee082a59939427c3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ba333f4db01c910ee082a59939427c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ba333f4db01c910ee082a59939427c3_JaffaCakes118.html
-
Size
4KB
-
MD5
2ba333f4db01c910ee082a59939427c3
-
SHA1
e06029ccac4cda37a0cc3d693330338b16151cc2
-
SHA256
7caa8bdd5a8779db3d808f99ec18e03c9b0ee28b477db5b6a0fc2b7ac1ece9f8
-
SHA512
52067c154243fdbfcdccbf2d7009f61c4f0b21c94cd15c0bf41a276d0608bd450cedd1783f2837b7b32738dfe28b588f9e82b90cc64422fd2e60b4bf9ee6aa8f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oYYlE1dk:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6FDC9CA1-0E45-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421449554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000af6b9f8d882eb93378552a440a8083c32a4ea32b9201278df18e1a08b4fd7115000000000e8000000002000020000000a1aac7cd77b2fd22178ed1c22a042da18e0326e37764e6b770aa6a9de22414b620000000fee0c03544c4efbcd60ce5ba6c1f9001a62b63ef835f3219f9b5eed2ed3f4b8e400000008044b330dd94f2d3133027ed0fece13c2d49ab7f2c5e83535a1816b205544f6993fa512ddaebf397441440ba0bdcb5c407e38d9b76e1a4cc4c340c611ae8e75b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0617a4452a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ba333f4db01c910ee082a59939427c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bd98edab5dbe1551cf06ce90d379e1d
SHA116b6388c414caf15d4029caffab85a02c27d3bd5
SHA2568dad16f7442ab1eafd09590c556310037cc5ee61c644043be3cbf712028a2527
SHA512045389efb39acc4f36a452425d77e4c82914e8f57b0616659dd439bc547ec981a820965c7022ed1d4d439d71b55dcf20b4118fae44b8b0a53111c593e68a3147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54562aa166bc8dcb6eef7bb50efa5bf23
SHA1800d46fc6ba193a5b01299c2fbe4fedfe60b9557
SHA256e4f728d9f035cafd8684800c582352987eefda47bcc42431a0f0ff82a11abeb1
SHA512bde39db13506ba7454e7457c2df64f55f10bab50ac4289313000b0f73e2f05c9076569f436dc3fcd424eac963fc3c56e3bd119c4c57eb3e6b172d7bce5f6c24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5cfc833f8cca5a18021a231d25bf4a
SHA1f3e5a50b1f21b3794b4277acc52951b05fe5a54d
SHA2562417eb6d06e79275b8efa54c50911682fbd238af063860df57e9a03653d4c60f
SHA512d3390901d874343467a5bc7188301324d2082c5fcac0a819e2eb2f734f72d99236018f7ef22b59280a16d57939862db066f730db5a5863a0c7b0550eb6e8dcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e1df8a589e2bf455e0e19cb568ebbe
SHA1920aecae0cdbe22f8e20e3a805f5bbf8d32a3721
SHA256406c8472862996a7e302f0c7ddc6f5f0a09150c45ce0148ae235a61d9967f3ae
SHA512c51694f0e4675573d355cf1f07cf79d93fc89f6228d08221e9fcfb15d41bcba4b4f9f86c8b38340a820e7e034d5784abcf069fd0c346a99bacf0cab86277c2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517b81ebe3ffd5c96c7cc2197def75ae0
SHA1f0f2c5cddf2f59f6f3c9341aa1b784eafe2bcbb2
SHA256fb0926f6370903ec341adf85e07e5b3713d5804de4bcbfcb47cd6bd5177df7ea
SHA51218245bfc1dfcf3a47a088b7074e9c8f14d97b412bef1becf9bfdbb72ac141db7ceac307b4870f44dcaabdcccebfb2020baff1d4b53905a90ad4564b45d04b5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5318eb7a950feba2342a0dcd9bfc0a9
SHA16d56c4193dd08da946ec81820df387f5e0d2abc9
SHA2562d60acf84f202ab8e7a027bff84b7c7c2fbe37cc5a1b0db6d8b07f3a5cf04a3b
SHA512bcfd0e002b248f15f7c1036b497f7511cd28961ec6f1fa64d153475f9cbdbbe7e31c939fa716fbb5610c1d4f5a4eda27b6a89a5bb0a660e634acb3fd29763a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531130f623e8c30686fadf419ad1a2acb
SHA1493b34c699b3d88512140e93dbaac98c119b7131
SHA25645d8578e002acebca54189f60922fdd5f2be411a767245a1b76422ed55e64f1f
SHA5122dc0a7882ee641fb63bca099bd87e86959a6df52652c674613ed9d89c6ca9d928f63993eb2cabd51bbea5755ca956d22cb9c2596ae37372024f6597d1c63f638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589d16164cb097c3b44e1b41866deddb
SHA1fa14a9aabfcd171469d0085e6465c065319607e6
SHA2567a0c89d6963af029f6c71b29e28f53cd4ca8ba98722a105119fc6ae4ef35144c
SHA51203ddc4384fb9f259931230c8ce43d5e5cebbf3231e4513d9fbfd2e067d25d56976446e036ea92c8f17fa32e9965e6b13e8fa39ec0f118b5a93159ceb282139c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5bd9775ada47ccc23d568c646277f3
SHA1f723a19d62283ce0ee4f43f0c11282c2b09fa9e2
SHA256ffa694dd87b8029e42e120d43cab28ad1af9f401f8930c5c60dc8e7d5f1fe5a2
SHA512acfe51687a7e20de7e779929fb8ea08a065eb448ccf1cfd7f615ebaa95181b304aea187946c94ca759ac69bf45a092a7c220042850bc868c4238821b2ea08ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e687ba081d0fba45e5736846964bc250
SHA161fa067608d017e2b6bedc28804c11572801a094
SHA2567209830fcc53cb712bb1c6e46d409aa5030da35a4f25f01e9750bbeec331cee2
SHA5129d6ecedbfe7eeafb97541a4335c1aed9c3d95cf6167b3c5f8e8182ad4a17410b90813f261b0c1adf22c881cbd31256fbda8afceb8b1c50246391280c0fb48b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec784bcb6d4eaf71852eefb3e68ecbc
SHA184964115f864939555652685364a06fc734fd249
SHA256d83d383ff3550903bf6dd2fd301c5c8ada1b5e395e8bcad89dcabeca8a49731a
SHA512324bedcd4358e961fc8ddc0b9f8237edd3a6a05a2b9f24f54afdf0c953ea3ee11b04bddb0d00d14d7108ecca9fee2a75d48a5fc22c97fd8a2e60930e1e8dfb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eb1c828b78048680b85cb293c45cb3b
SHA18f7a013b530fb3c2b2d0e68960809fb6df767855
SHA256434b07325fff062f6547fb3466139b1b9a31944ce9cefc522c762ab5408d4ab7
SHA51213bcdca130cb9e07e6c29af798d11496e5772058cfb413b03a2a4f7e731c4bed97d5503579e2170ba7a570d278947dd7c2b6d487575e81cc552611ea075465ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580de7af2bfa718ac84b709b27cc2d62f
SHA166ba63f686744ced633db6c18837684b299aa62d
SHA256367982012a54708197360687fe221279271ad901728116c546f3c32ab0a83812
SHA5122ef796f89b949078afdf1f20ce1578d789f617f8939395ed08148c17ac212146974717a22a1598e4ef116d78fd906789634e4ca4563b95774ef0b4077da3194e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b19b9b8ca0c589911515328e975f58
SHA12e97a50fecc6b66a4173bce37e9ef8d36fed617a
SHA2565c9eb19c12db7d681fa2220069fe2b77a075c52e64d97d2916fd48220fad40ce
SHA5123351df386146433c063fb3bd80ce5a4a300850fe326a7909bf9b42f9b1182253a88e7e09ef4a055426cee30aa1cbb278e672b616c60a4fd8f8ce4f3897b57761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9cc80d7d78c7fbd66906e4bc02e1468
SHA15569daf567ff2bc94b429d0af95ff275d5f8111c
SHA256298d8d76a5fe3da01c9fb62f2dcbd8f036f1b937333cf45dfdf61cefa806d135
SHA5126b94604d70ee151ad60b2e3ae67c8f0b5a87e3ad6c64f6c974b5d326f197c7e2cb8b1222fb3abfbcba928627aa57680d148502ff265a1184d21c280b24ae992c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af2804215cece101effb21f4420e7c8
SHA11015415f5324574c33e2116fff82e9a18b5bf056
SHA2568e8ffb9c4ff6887f2ef212f179eddce563ca6578ff109c230f171478f5b1a351
SHA512e5bff3ee8410aca3d451973441520329f2affb6e25bc23b490461cde2d2ea1ee77294bd69e71b715c6b97ff696cf58b2fd2c4640d6af21b344eeeb6ba50adcdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522f79e385c9468cdf077ad5f0712eb2e
SHA12888274f99f3ddc9049171f4732becb5f0853813
SHA2560751a4cb1e85d00b39d96803433144ab40ddb244cce14c051dac6d9d4dda984c
SHA512c02c3b382aa73998bef566db537c72e92e548df0c4809b18dfcd3e52b682017b560fdc633214b2a334b1b5538f87ebbd0910837a2d4130ed29e21facede38f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ec0c52a0651de0d21e75f186a2c2e30
SHA1b07b17408b62f4d5ff24d43b0e11754364a238e6
SHA25669c83154763aa5a8375479aba829da6d08da1d58ea62dfe99241a5de01cf7087
SHA51267ea20b2c1e0d6b4a908598de6618d90cfba321d177d5cbc91ee882fad64974833af937b1cfa14527e64b3243adee701d76eba224954e819083d32c5fcb7df72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f652d08ece6a27ae7bf0997499a0736f
SHA1b1c71f6dd1c1d1596bbed137a19a3b85efaaf408
SHA256b7ccd1ab821d1739c8c214d0c36373fb3658dba22397b80888832577dc67ed5f
SHA51210feb5b75936cddc24232c91aa6425e7cbd194b62229537e243f4e5ea41f82873c29b395da695ee27980d0db185faa6afdea37a9116c8e5398aa13d5e1248171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55339188b60bdc7f3d2868ffbaca14939
SHA1b0f18f9200b12fbc5019c5fc5ff00cff7fabcde7
SHA2568953cacc07210b468e8b93cd29eb146935d4251c1972fddf2b077c3d9b9344f0
SHA51254070bb5962843cb47d0b99ba15ab876226890508fe05f203268def18671e1803d1b59bb4e797915d6f43e170189fee0c83b82058386e432d8cec92ef2f5f000
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a