Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
60db3beab45608405a7353725bf1752e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60db3beab45608405a7353725bf1752e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60db3beab45608405a7353725bf1752e_JaffaCakes118.html
-
Size
134KB
-
MD5
60db3beab45608405a7353725bf1752e
-
SHA1
84eb73cedb9c7d097c311a8fb2d4f5739e2d2ff1
-
SHA256
cbc7c7e87d29bb495cbf1f0d1ba2880b914886d4e46cb2d81143620efc144049
-
SHA512
1784bf097a1467c872b1455c890553173b9faab176c57894bb231cb77adb235e60665ac5851027349ada851df780ddf3b2fc043b12bbe79803fc5db056404238
-
SSDEEP
3072:STdIH8Kq4kaSPGrKLJDadI/NCktyfkMY+BES09JXAnyrZalI+YQ:S34sMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AC87F31-16E7-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000056f5ab640b622edc96357c6b7d7608cb9dc54a640bf4fcd57c82514c64842daf000000000e80000000020000200000002cdeeef1b7cdd3672ecfad56c6dc9e229ee13ea8e200dee602d8a3ca1c1cb8fe20000000485d8383d46642e25c8d73582d2c7544b516aa6d834703cf5478e8b38fcaefcf40000000e8094ad4fe5cf29061946e74b78c1c921c9e527da8097489267721865a1c785b88dbddaed6d9fccfece3f023e564cb725f08cfe7debeb01ac1470fffe6c00261 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422398625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906c9718f4aada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 624 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 624 1368 iexplore.exe 28 PID 1368 wrote to memory of 624 1368 iexplore.exe 28 PID 1368 wrote to memory of 624 1368 iexplore.exe 28 PID 1368 wrote to memory of 624 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60db3beab45608405a7353725bf1752e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5780784b8d530f52f2384a2a2dafd8bae
SHA1debbfce7fe39c624d2721e029ab6ee2017b56869
SHA25654944cdde22b5aa6adbc0f289546724285547a4ff0eb6fdd90a924336dc680c7
SHA5120fb3af08ee16fce852e3480c6b8b927216bee11b40cd539181965b0f55605d1a2ce313a2392defb9e039d5b415f8388667038303b66592d019a5a2dc470a0cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b1c780ae9fa5623863557e6f568588
SHA1d1c466843ed5b47799dc47cc205967d78a7777a1
SHA25699a6c5bf32b51236706c5763401302c0125dd8fef02b42adc5f5757a80709e85
SHA51281828d4e21a7b2a4ef6fdc1e40eb9f873f33ec291036da9d314fa67b7e42310adc3576e4a398ba85997f3f3d90cb98b482fececc7c14d728aca6b618d6a9f95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f9d3cdc5972da8e191b866e139d64a0
SHA13409635531796df1c6d96fe764019e14c6417cc4
SHA25664f7b27054ef5c9b217ad4f668e289024ce258ef246f7fa6d73b14b753200702
SHA51293e91c14a2b7eba8cda8d27d652db2ab52ec89cf50d2c60465fc8ee2d891fdde1b94ea6ee954a11e3c59fc10b096249ad2369cf33f3f2cfd310432ab05a6f904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552b92d48e244ec8eecf38a8086b4376c
SHA1261fea6a00b6f1f3b4b7732f52de0a9b6f45f566
SHA2565496ec0a4244c507bd6b33182f93e299547bebf53b726e47f3da584932a3c3d6
SHA512cb6e8bb049b3792763f866f219995755604b311346da83070ce58356b9f8ca524dc30fa453b23803cf554d1bbbe9f4a10979821b1c84b7cf471fdcfef7c6f64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53caac47550b4c9dd2e9cd1ad69987705
SHA19fab7d8122c3b3faa75453fc384967daaf36ac78
SHA25603d1fa6d7386cd871bab82a216f0c7460000c0c22daea69a97c0c681c875949b
SHA512e068f74a042b05d5a2ae77b987f5137d16ae591f2ba1ad8b5833b1e3a539e694c59e4463b7e12eb81c0675e90dbfaef869a8a3ce33205c33bee3a0072c701409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578dca54eccc25416b15760522ae3b2df
SHA19e9bf8f6e815d9861e89e4b46bbcf29100a0b43e
SHA2560aaaddc20467aea3fcbc1fa76592be27a997870c40af79a527101bc43f02c28a
SHA512ea0cf8a223bdd8d05ce7926ef00073f95a89496512dcf915b92e6196ef0aee3b48a91afaa339ac3f68f017535da056cef76fb39c86b02cf7f03ae47bf48bb3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5018e8a2c75cda4ce90f95c32f23b9caf
SHA134369c1e72d7cbbe4e7dcebdcbcf02295f2935fc
SHA256a6638b5e3f2cd7b892e6b0370a4acb801be273c5bcbd57c08ba226c08f849571
SHA512d07178ebf08077945a4bd00d4a4b3a6aa5844de7e3f837ac4e59117fba414f995b30d4bc79a54c1154baa13d8d448aa5205ce90d9c04c6028629818186f524fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb38a1d64d8fb92be9fac1d1020da3ff
SHA19f24604b2cdcd0e1b850a837f5a30272546a3896
SHA2565b5ddc16c9d0fa1edc742170bec56111a0632c745e68603f29be65c4d6119b0f
SHA5129cd0a05501cc0a078e4d4eb3702a98cd89b20b691e2163e29050f29e799d155d3c46062b6a29690380c0cf7f8e88e70fa0aa3dc3df3e435f1b60a1da8436a548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ef6f53cc2a37c7856c6917710ce3b9
SHA185b9019f3463aa8fea8d215940319d4933bc7362
SHA25602f4ef46905b495e18f934062bbfd83556163754ac1063422cf34cd545e3e989
SHA512dfb6728e3782cffe2f9edca2882df9a5bc839ef393be738d855dfed822b314914033ab46b3f8402873e82ac2330d38544bd00ac9923828febb92bcc52d05e451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a250fe3075246d68f6aad70db04d9a93
SHA12865531fd97f1abb6b9089300ad628be3374fbcf
SHA256463c0d99b722981192283a5b9936d60c3fe571189931a4485d3d0ffd4b77b7d1
SHA5121d56dc4f430fd8bf532b20690ce046a03cc38b57efc5e66c1a7011d57caaac0a0b02bc09341e00027618e86b1c902884603a34299624f6c010928b5208820019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3fc64620b96eb9128e4f8dba1b140c
SHA19fb75979216f41a472791f074dd0c3ef5ff4bcb8
SHA256e86d279302d781f7d32291d970ec454895181b5306dfc177deb0c91fb727408e
SHA512c64fa8c2606f3c6d7057a2611fccf59651d5f883920d3d5bda53a7f27cfa3bb77b652f279945baa0aa287352ee305b8a6929c65ee69bcd9dff4646942b6299e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c23cca5a03254ee13b1b0c8604c9c74c
SHA1a3c4ec1a09a1fe9c04888324bc745df0618af2fc
SHA256552d374e5e72498b1683177916c854257ecd85f9a75b8b9b1e5dda2b0f52e1e5
SHA5127cb6c9e59d81d81b0a0bcb5ac66c749e0bc2c185ba2908ddff7b24364674750bbb5fbf1eab30f7fa55c7db43543fa72c4d520fbbccc681f0e55f6d61c8edb0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2d1b2ce4d4e6d307756968581a6927
SHA1e973f89bc70cba312b8f854d526b74310fa58ebc
SHA25674a7e05cc962e7a20740220ad48932e692fde499125023c404ea11bcc0a4d46a
SHA51293855016c199f9c420c6368386dc3d7a478cd20fc83140297ead4dd2f7b82ebfb0712fa1045a8d976195b0b0e0aaa320f1704cd26935b9e69a44919b92867b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509941780add020d5485505e1fa07b1dc
SHA1f7e47df530c31ce10adb77c7c9ceb73493cb9033
SHA256b80120933e00d8af9265243f46bd7c6ce61706d1972f52671f3be0f8e78a5182
SHA5123e50ff2fdda976e008168db5dd465c52e385475a31846c21b8e5652074fd8f68e89fe32bb14eb26f344355f602ea816870a2ec7bae4ff6c40154bb5f0b55541b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea59954deeb17d67b25336a004c3e22
SHA1400127d2349a8491ff7c4a2d1b8ca3240975d877
SHA25673271b709a9bf4dbdb82e8e8c970def7f20f076758878229225159e3a91b27d1
SHA5129364da96e40d27dacf57ff0b20837004ab1433adf9c6378d93ee1ad7c9e10aa8ca1268fdaae2b09579b8a29d6dd1042985a15b110e63b330d7c94a14ae6db7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5dca14ab67f72d664df773c99c680f
SHA113879a4b2a7cab49aabc3d97b000048a7742b5ae
SHA256512aac1285f87a1ebafe06514e6002908d40ab22d1abb99a63d1bebdf9a153b3
SHA5125b2eae7eacb4511d2db710d48ff222d1174555cc16656b7c929ca0ef968fec98056ca1ceb50fc75badfada5777c9dd3cf84a920f7f8ee602ce807f903475470d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3d01cb8fa03ae6519b8e57aac6b53e
SHA1f2124ab5ba295925c5422164c8e92c590d89a0c7
SHA2565b4159fa21acb9a0c7d144db925be0d07d72b3c50ad0d82859fcb502bda797d8
SHA5121fa5d78e5b6f08d284c45e4be6ed1c9704a04d0939cbfa2dd18eef6fc3909986d54f186fd10eea681927668a70a885d4c4effdc8c301ff7840606d455c10d05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5914c22f931561062927a5e52d2606b46
SHA1dbfeb95152bbfac828d9279173cc3414ae355dbe
SHA256cc0c1ffddd52855d60e59b96949a5e37ad26f6d3542576c1318ff0392b147aee
SHA5120458e0bbb2f0af749e033474d5b6799a248916dafbd4868375d20354ac2e7e409e212b156fe027f658072fe68486291de9ae64b40987d327b155585e7c635e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e954d7b6d9d717cd9bb5c312ce0d638
SHA1c3a7ef7769c172d6d0e5061141be4e2075b5ed5b
SHA2560e54a39906eefc28f99d6647495db1204644cbca3e71146a7f993ab368eea6ff
SHA51204d0d3f0175ecf3a3f0f037a4db81c662ba63f166ac7572ffff631554e546ca4051f6f9b8188ae1f0a990141bb6e6ead6f1a20788d17f0aaffe68a0ece5b488c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed85b7e1ff0b1a7bb236f0fe58175b6
SHA18732f2ce0a3d5287930fbe2063481680ac2a524d
SHA256fdba0bac225e55d37ffec673186076a5de2b7d86d489017d657d88897854b28f
SHA5126aa02fda665610f329106301f4d995ddb68a8a5db6e804efaccdc7cc23d1eed1471891778c772ef6d14c4f8f5dc42dd9eb8c482a950cb3e19ea0f7d78dcadc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6b3f8f238b9fb0eb930deb4722b992
SHA18b060550be22a1f18ad5e7e18cc643511dc95e5c
SHA2567a476f571e8026775f70f2316cda256b3b8dda00ae21284631c7493b4c9e71d2
SHA512893b490f6558621fd86f476972bbe09da9d3fbdd506c9b6ee80b3f16751fc6dd0abbf66f3b3ffa729bcc6f2b7bf7315859bd6b151fd84e23f6b81941f2eb7dcb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a