Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
6528993f28f30164572027b36c191659_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6528993f28f30164572027b36c191659_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6528993f28f30164572027b36c191659_JaffaCakes118.html
-
Size
4KB
-
MD5
6528993f28f30164572027b36c191659
-
SHA1
2643e2b9351a93c41d6dd9501ef21280473a1d90
-
SHA256
2ba8c371628085969825145f81a7dfbf37151dc6b46035d3ca90bf73ff3fda93
-
SHA512
42fbd081fed622875bee37077c20167ae038c468325a2473c1e44c3170b7482345cfdc579bf2548af767fedb27d5ec81208e98dcd90d1af5ad0362c849fdfdb7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ocQB7d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0A33E41-17C8-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003422190813df0c47a40c334ba71b5db0000000000200000000001066000000010000200000005b97743d761013fd05bea720789ae9f2b43e11a80dd277ff807a60850bbbd1a3000000000e80000000020000200000003d9ea80fc532dfbe70986d60d304523ed5541dada733f3dbc46354139c044333900000009951de3764b0c7422b977333db18107cf3bbbf51dfbdb37ca28b11bf81e16ef7d42f557fd625b0b8019b1a018b7690413e1ee6afb818cf8e2cff3bedd0291e602183f9e5c180e1b8a7493217266fc27671ec810c513d796bc462487438d842960af229a47c13527e7e8cb259dbc0b379b652f2474cfac493623f12b8a2dfa632b1b8bf1fcd5db53035c9a82687c2e12d400000006ad096d514317e8ca7bf01bd189e53c7040f1ec2324b75cf09373f7ba982938b45df1b64e265492d0cf85a837985630deda1b662bde1e9ac92610c79013583f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01209a5d5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422495541" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003422190813df0c47a40c334ba71b5db000000000020000000000106600000001000020000000899c51870c5de7c7f31b1eec8bde02b34bd55773cf63e4c7d75c27cfe0972e9f000000000e8000000002000020000000a37e4f3134228cd8058aa1245a7039e641f7b584943ea92a4fa1bd048ca72996200000007a5fc16191fe1324877e5e078ba5abd03eb64cbe061914970131428b1adce2fb40000000632fde84b3a053da14f51f09828f9cbedc069b21a51426175ba997909bf7314d5005ad68b6c84c883d901397bfb37b07742813151925855ba8b1802ee40156d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2988 3036 iexplore.exe 28 PID 3036 wrote to memory of 2988 3036 iexplore.exe 28 PID 3036 wrote to memory of 2988 3036 iexplore.exe 28 PID 3036 wrote to memory of 2988 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6528993f28f30164572027b36c191659_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a6504a7e3cac1bff7ec5f0b5e67a85
SHA1dbb48394c422290a672e7b2dd7f1499ee25117b4
SHA256332180e1143e17d8025604f0d88934b9326df64dc8969b81f04d9e2765c6b330
SHA512b5cfae1ef1747554b252feb70d9a6a826cc53ee1a684015062367621fa8bbdb193982ac8ce7d9cde14fb5a46b56e603cc659607666c82f37dc306b2d1eefd1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1bec6d5cce6b8876591fe93cfce786
SHA1480b17d21f84816b62f98b7ef4f08e774ae98855
SHA2567cd3a08c5a94848bfdc83ef771c2d7126271e138fded22448fb23b4b3ec1ec37
SHA512c8e58da8ae52b4b5c6806d31988fe52f52c787cdd906b91e404e2a7bd5eef3ec3b41f240101a7f562165ea888462193d4ce099290b545e6fd99dfc106c0b0bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0d4ff30554e70db12cd1ab4620f200
SHA1872abf3963cb0389f34ab1039a4f3c0e2b9664a4
SHA2563504f53e6079777364a7700d843cff5cade301379a24287ea96f625619db988f
SHA5127061528bc8a82db9b7a6c68148018376f4599a6d9a523a540926399a40ecfc8167b656a1529749f9ec2ab20102ecb8a711a42717dbab113697434860d5e79778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c42d89e03dc5201c512c9401a209b8e
SHA1bf1e5d719bd5e6ca5ed4a56370e6b718be43624b
SHA25690a5fcc4e989d0a3a416ea168316bd5f322872560207d61c88c70bffcaa9d6ff
SHA512c914546f89698a607dc917ad8e0de494923154ec10a6af9b75e5bb13821cc5921e81a5d9beb8075e0f9c50b4e82e319bef75719cdbb4a24086fa3c7114c1db33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a8349dff1f223a9d14c930ae066ce7
SHA1ec59360d425a7b9a537ba48189625cb80f8d0bb1
SHA256b443c092f0e3069ac3ae0a3ecba3e8779e3aa7d250decc8ac8401e913c472419
SHA512f18fedd0e96c4ff88918d5f8d3fa624a4063b4f913081b38841283a34d082087dde186349e82f58c131b19427c04f7b7389427bfbec74def42e10fe26cd09e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a673508f2c83342b240a578ab08350
SHA17dc9f5a4e1d84f479074e2bb9a362130d7193660
SHA256c0634aa473cb9d95bd6149430cb214e1f1ca9faaa2982fbcaa956b76705c5593
SHA5125587f8ff6b4c629719c771f469ccda22a0f89bdae965b7a5c4658ec1d46da05127f6f1d2b692f166b17a52f9ea406e57657b980e7d3cf763481707c52c1ddb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b748839ce14335a02a05dbfb702e693
SHA11870671853eba13748ce8295bfd6162d39ff4c47
SHA2565ce4473f6c5423143a4759835fbe98331744277613c304b083b63652bb5036da
SHA512e876bb6490b4ae475feec8147a8ae70088e4723c0bad51e62776115f5937f642bc9b01ec5c65ebf6a7b1ee6e2daeef88f123d23dc29508ff81f7a1768872af0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533a90f26bd185c146278d944b4d6c056
SHA1c2b275d1f0a5b15021e1fda157e998c63680b27a
SHA256460d55cad4d06c93712c1a549b04c5f4e6d7a654b3b56def72ca11db02a58984
SHA512d5da6a5c7ca1887bdabf9e5bda5c2c58bf727c60d9cc5fb2f099e10c7178fb8f83b70263cfa97721f74e59abf74cca98badf0943367b0c8a7a17d74c1be4574d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae4707f725556d3d0f437530fc9eafc
SHA1a855239e48578921749ee16b2f63ac47290e7532
SHA2567deedd7c18e678b9977b7515fbf5b40840da5c2f61c22bc5bec4b511b156839b
SHA5121e70e6aa3c9110572d9e9ea309e36ce50d314e2130cf928d2f0576688ba96c46511c7b171e99052a5b84708a9c95504818e9fbe5f8d94bd0e3f9eb694b488a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535efa23fb8df5533823ff0c5fdda4b5b
SHA1cc12bda8da61c196f36e6bb7189b23a78e49a522
SHA256b3a321d2908d07020c8922493ab75a14b8b46a286f38dffb5d6dd7932ef3a980
SHA512a921f59512aba1967d54ac64a08cb9d7349494b6f7ec162abc4f1a73fdd4390a6f470abc209158cbcb5bdc6da15c0ac4970abf016a41af706c5299b42eae7b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f84f595df817e698e8be42e3480d6a4a
SHA14a1aec3cb054cef2ec20a8b8e9aa932ae869d6a7
SHA256831e6dd23f949d07762375ef7120908fd5fa5f21e0c7c28ae5f6983e66cd75f5
SHA51284b896ea654a0def2171389023d124c81f194468e6b0688eed94d6b347278cdfdf164ad09a72bc714cd22d229646381191578aa30cb4a672948d712d6566502a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543994f07cf93c8561632ac2efbeb8dd1
SHA1f4442d6a1dd1aad92b61645d5bcbf2e5ac5d194c
SHA256f4de0cbd1ceeb842edd70e4b900a6adcdd366fe9bba351dc5e9c3118d2c46b87
SHA512822f83567c7272d7af99c0c7e5023d825aed7bce37ab25724ab7988301fe9d130a7c69f1cffcd41fee5083b7eb5193b924f299f23df76742ffa6aa00d359d87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5346069fda0ea4ea19b0b3225f8634a2c
SHA1411a64967825e12572fe54ef793e93e0a0e9bd0a
SHA256df4b480ad49cb9af51dc44f9097b76ad88bd273385e4f70bbfee3a9fabe593d5
SHA5122713b061642be05292950a73d37c829973c0d14b90b561e4094ef7de1b3d18184d50d938d73f6ef966487c900d911869d34aa79630f1f9ca8e76eceff770b7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56441ecb55bd2a61874878afb31f27de3
SHA114643fdeda79c92d9d08726bdd660e85033399e4
SHA2565abf927b208dae8234238195d24a25a4e0beff808b473211e7f6091c30eda75d
SHA5122b411f49b5caf7551dee44db189db0114f72cd98afef04aeb436a7c841f2f0fd37c65eabd36cd8c236fe86f5b7439994fecb8427526980b29f3f380672d398dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa2437d6a7fd0c4d3fc8ad4a09e2c18
SHA145911973d9cf77b169b8360229d8f712f7953938
SHA2561a754fd013b86072603bcead86879d059f57dc0726b6f3eb0ef56297a8495a90
SHA512e31c83225896c844b0f5cec57a938f09748418975a9b3fdb69414b27ea9302d2b75510263b940781f4ba95e120d169db4bb5a3e214d588b42d358d41f048411a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534347e5777dcb491b8ab2f39ef93d614
SHA14bbeb499efb0f09726db2f691f11fe4170cc9004
SHA2567be4294978e3b772bc05b3dd5371236a13012b791f7dd9ecc0c2c33b6577a2dc
SHA512946de31ec11f767f33532895d8e3e1169e203c9df3500a4eb97935f7df7f19ab465fde00a712a836d038651302a4ae668d518a9dfabfd20db551807d8cadefcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e56d376b8120b06a4eec2ef408df97d1
SHA1597c8507277346fa00f3a3e1116d07e7dc323367
SHA256842d46a53570ff4e74f3520f72697bfa4101eaf07ad0ff57c3309d78507f88cf
SHA51298c6fa94732221be7135fd15add03074e31a753918c28abab65b734f43fdb0f684c5392a88d944549a167498ec2468dfc97b77cd8fb0afedd812d3cdf242d4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c2a452778eee0291a9c7bd363ca4a2
SHA13672b48a3bdcd7588c3f07b079087b9ec1ce608c
SHA2562e5cd0b3640aff32f140897e5b11ddbbf5bb6dbf485022d2bf2c26191ac1199d
SHA512271ca191c798a80cb1b6bff7f0397bf99df348a3ca675277cffda467061deb148a9dc14c77852a02aa1b3ee547209cbee7d302b39db95ba3f3c9f12cc6f3f6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b1197c24fef65101a36c40e31856226
SHA1fb78011832887720945f409513aededa0ae01f33
SHA256106a60ce93fdc9739f2ff66adb124039dcd801ec20ff7a0f8841b512ab284636
SHA512b7cc3fe23ef660e4d84362e712bab40ef82f83bc055bb44eecf76d2c895a06b7a1c8064c70781fcdc37718f13d923ee1f03968ed2f0261cdf9e0858469682438
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a