Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
320f73abb0a0ffcd3a901a90130aa832_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
320f73abb0a0ffcd3a901a90130aa832_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
320f73abb0a0ffcd3a901a90130aa832_JaffaCakes118.html
-
Size
69KB
-
MD5
320f73abb0a0ffcd3a901a90130aa832
-
SHA1
8b5c24925b01786cb01096a5b8eea264456d525e
-
SHA256
0d5b9a282dd1042547be8322048c7e7e1aa3fc3dc8a51e703bd39793069adf5c
-
SHA512
39739e9d61541e797b71bd6ddc1fdd05b1806ad3613a2985e0d62d77efb432b99c0caee53fa7a24fa6bbba61257c0a0f0026d5499d506730b3708dcc46fa2862
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sn65y3za3TfoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J3R+UTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3075b69543a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C108E921-0F36-11EF-A4C2-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421553198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000009451b71b75258f264076486d67ac5030a77855fab237e41f7d3a94a6078d9f93000000000e8000000002000020000000e875d0abf2fd3dd1447be0952db088d2053543aeaaacc3ada817f775a7962d70200000009261ec18375d951801a4b957338963b0cd813640d4ca8f13d75aa435ed74fbfd40000000d1f1bcee633eb087dd08d6e339289dece5fd399e33ad1f92751f0a2e22b0c8b1470023fad8d9693a31ce9b5cffcba8066e2026588d3925c5ac5efc370f6a8b93 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2896 1704 iexplore.exe 28 PID 1704 wrote to memory of 2896 1704 iexplore.exe 28 PID 1704 wrote to memory of 2896 1704 iexplore.exe 28 PID 1704 wrote to memory of 2896 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\320f73abb0a0ffcd3a901a90130aa832_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc12c9b788966ca056af07bb9d5f4c4
SHA1998e443ffd7196c7964e3a8611281a60937c4ed7
SHA25607e5ea95b5745b41452acd298ba17ec15b98e55964e8d89b00c8be5f1d41d9c1
SHA512fb6c5c02fd248e388beac3f8e1b701666075edd714dc19284593d2cfd2bb2d24c39631ac905159b189b990bff0c705585a395060c06e2a02def4ca67615f5839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4a19b34e5558e3b7e4f7e0d9eff4ed8
SHA16279cd9b8dc0164ad1d87963d363f99a24d57d9b
SHA256d0fb5fa188ddcd2a85d7529dadb345ba4054e04b25f7e592f0038c5d46ff5451
SHA512fa9279496914481b7a70240260a1df9fb546ca3e9eb05af83be9a3f93679a4af228ec95039b3e943fbb8a25e07bacb3b4ea05fa2c14456b4dfd455807680c7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3ad8a56b4d2f6deb94f49ba239e20ab
SHA1bd68a4f3510bca6886b756aa607a299a2dcf2814
SHA25690ba4bff420d5cde3f90ea54203c52114c80e31f0a228c0a0fc43341f599e51a
SHA512a03c61aba920e2106c05a6939f39720c1ccb0402e7abfee1ca11c4a8305a1c6605793e48f3eb0f0b7433728bba3be56a87dcbfc9076de7f0d47079690f878e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c0ec9e94ec4c717b921453c19c724cb
SHA1128ec2041e2532fc2420838302503abd3c310477
SHA256397823928977dc2dc54f0ada717b77f7bbd16debde989edb7686483093d307b5
SHA5123b27ca5d32be08fa18d8a8b8b4febb11403aec1aa5af2a50eb623466796dab3b8e83bd1b0b1751d05f4e41c7e120306021ce35c766df87a0fb19c74e454a1705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baae3a39663fb1d035cb3412b39244e9
SHA11be140435e8ff419b1170b0dba68b04af42f046c
SHA25686045eb2854c8dd219e2bc83f94959ea4abb4edc4891c398983fe067ae80dbcb
SHA5121fb6615b9aea2cdc8ebeb9e119bac339d0238cc4145bcdf4d2c4b013c5ed76131983b63350fa9028d34e8f8dae8f605b1b51208d52eadc896553b4a1d9f3aac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552755bba740b1657c1b9c90940231f7e
SHA1bb7b831abe621d6950de02e6c308981eabc47c81
SHA25695aeb7b78be3ca2d61d65fdb9079599ac516cf4843f87f0d5dfebcc0b2bae72b
SHA51288be11cc121b25ee071290e2c4b65a7171b8bb4f2d0b616a5f6a8ed7769e10269040ed65c651666412a2599d2c1da1bf21071aac2a000734b88eb1008f8bd4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5135d9b1bcc5eda8aa8a83dea5c8a1784
SHA1d8546b0c29df12f188f866f4f7f189359ce639a6
SHA25696c7386352e77704b7f5db4bbc12e1e21d4e93d1ec2680295026b57977f8598f
SHA512bd0c0be1cd0b84413cf5a607e1c3da4f2651e16f264f62d0f3b0696f74e434046a4d78624dda059e925a7dd35538189b472d95a18b0c3368b0068e17324fe91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea13ab2262d8306aa9e09d4348f6ef69
SHA1df1ea92d1f22829723563c1cee65e5a7602107ad
SHA256db92b4ebee540dce9ed19f05b54e368030a79681c2a943341973de1a74827a6d
SHA512ba4251b88f26bfdebe348b48861691ce2dc01608f53c3b845c1a64a4eb952d4c2e9b36f5c131540db28f87113a5ce50a64366185bb7ba1b8617d3ed1b559ad61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caee498d30d68a0db3565d8f6827ff6c
SHA1296d13fd5fc19c23bcf688d3472f52ca153eed7e
SHA256ead8e2459c789573db0a5cca265f030dddcea3a5cf5dc3d07be29195764e3952
SHA5126b8658d6264638b947c984e6d9e634725931b9d4e23a964f47a3c63b482cc28e60f661fd1de06d6d796e9ef4845aae1aaafda1f4f253e8fa26c4b84f57d7ac1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5421135472497d566c8bcd647df82f2b5
SHA1704bb0e90c52c238df52f9af35bb54dfe95f85ac
SHA256624c5bb87b2440bc7137ef2613738f0b7f52896c677f6def837bac5764028547
SHA51268839cc2c44fc5a16fcc25a3b77ff418cd2ba856984f3a98039b1cb9ca7fdf09bf028f17f841df2ec8e1a7210845755f0ad1963e941db2d858eff08f299a47cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ed91d339e74da9eb0bdbf88915107c
SHA1e969ce98cb833150dbb4e5227f99c3580a172645
SHA2562c9addc2456223e8fffe7fd1de0c2b0d31ecf838913a8409baf7b41189845355
SHA51289fab4a269d17571ba5899f4e250bc482e355a37c05893f6cff6478b2bc9432624b57cd524416f122aabe16a5e3c87d5fbbf4c6638f3c15611ffa54ae8b43f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e384770d3438b07490186156ebc48e
SHA16e61cd8be8caf474ca370bed18a2f0b495795f89
SHA256f49613f42725c073e1189db662b76daaab435fdf46a9085be06e06ceccbd2c55
SHA512ad1690e80c5afa6672ed668e37c381520f0e37dff823ad15a1a960d8584681bafbad4d09341916c7faae0c145c967cb91cf88b0675b9223b171a4177a4c11adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e526e8356c9e6ce6554ffeb6fe1c492b
SHA1f1ea2bb95f51c6a6a373c013be7a033a5b7acd59
SHA256c7f9563cecdf10b6aebb8f7a7cba7ef9265f49fe1fec27190ce08a011a970e96
SHA51216bbc97d947c38f966016a19579070d6ad35b94cba3ca3cba5f83371d7c4cc13550f221c8545318df1a91c8e2c2ba72a057d429e3410cc4baa7fb5506b31142d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde1be087f44ee8d61ba244c22999588
SHA1ecc1a5e56189ca506da9c4bb992342734027301d
SHA256f044c78291821f044df9bef8891eee05b419d4d76384d7f7c47239b82ec4d73a
SHA512200e4a1b1fc36b3914568cc5d358c45a2751c4961db28e817468d4fc15ee4d4413d4cb732b98c49bdbcb5f48baf87b60cb4ac713d6f3c6f4847796927c044549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59006bf46b79ff5858bc6b7a407d92d0e
SHA1af339fb6baaa704d8303ac0e742ebb9e1ea5145c
SHA256fb92247a363b220f94185f44fd46c3a39dad32eda26d2add26cd8448145009c4
SHA512a8c9cdba181cb7f5774be1263c31575dc71f47452718f530600f2c5a0f9bb33298eb13492c604c8f90d503d59eefedcb37d7228a6429944e8b54f929d38b6459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67480b88ab34133ba68675365179973
SHA1ca42e6e272aea9d4e649fb744db6f5d72d5d63fe
SHA256cb1c590ea3428a39b5c94df4518629329a228cd52948f923251a25454bb900c3
SHA5121b4f699544511a90a6c0d36fd869d821d5d2b1c2f55763c61fc6bf098fead21ca4fe36c4292519fcf9a886639cc0416d0e9588db29df0fc3a98cde739812cbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2451d4f156e030a2e6fb20d258b9c6c
SHA11192fffb07f467a203dcd90550e5c946af2e2dfa
SHA256b95353c8a303ce429aa6719320168ff40d98ab04c2cf64b8e00cbc42318615db
SHA512ec7bd200ef848fdf8cb5cf7d79977c5ef745a037b7b8871fd1064576c93d9f4b5383edf453142125e55e39e362e43e56755d083b438e60a50b45e0de0851e58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55684458bb2c2fc6fd47c06238aaca98a
SHA12480c5c59372cc0ad0a4c8feb259919d67649a30
SHA256fc5f57546e105f452f847ebae745411cb1157d99a9819b96f98b234e39af5108
SHA51290e553b4df73d2e6f01c350b4bbfb699e11640d1f72ae8939bcefafc0763f8e0742a59902d3e724b8cd0b0ada26794130adf68bf349b7e8d11ad6a29e31d7242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4f8588c75841401570381ae79874d9f
SHA15febac1f508f9e398757197f2b07019753733f42
SHA256235e7aafa3093a5da64832b3e4bfac3ce42a623a3b963ce3e72b486bbc964744
SHA51262660fea3858eeeffed97797817e2938f3460781a34216aef94afe5449e142be6340e9d40861d7e57811317ba485562d63f8ee89507216a30b5d9762809680bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115d271d235f50163b80441ebc257a9e
SHA14300da1d073cb74be20e5dfcd0475e9b37f3c122
SHA2567659c2e9f40481a2ca4056a118a4eacacffd2301d0a0cbd9211fe14715a048e4
SHA5124d26f4b349710fa47fa90c26e1adcc2ebba6d8a54e9cacbad8d71ee2d1f9c3abaacdade26084c61b7de8c8cb2768318e8281001ec4e754f9a5d1e80e60b723f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fef1a1a72d215bc31271e3da213c6f99
SHA1301186a5f8cad68a34d59336b613e985dab228a4
SHA256bb8e3ebffba595d59c856094eaca9c6e1b6c04fba636db2311183e4a4d1c3613
SHA512cf6c5e0b6360b3a28db8f0655399a261f9521a06e08dbfa6bb15a2452ea7d9f0857d0a27c016d7c6b8354b8351611f13b6d5cefcefc7673acf5fe5360720002e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a