Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
61a693c95e8c50831b83f8450ee55e05_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61a693c95e8c50831b83f8450ee55e05_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
61a693c95e8c50831b83f8450ee55e05_JaffaCakes118.html
-
Size
132KB
-
MD5
61a693c95e8c50831b83f8450ee55e05
-
SHA1
11dfbc507fab7d14555c966356092fbb2c294679
-
SHA256
796d0990b10470dec6ff0070af345ba61ce0d9e16750738a364c97c8cf05241b
-
SHA512
256ae63851a2a50506e2190c547d9182da209f9ab58aaa75fc4d620d013b4276127351b8cfe85a238f29cb255481fa79de3fd147e3a11e1c5223e14cd2236d6c
-
SSDEEP
768:Sy83ktPv7ch5yOLITJwxkjKeOKiwYN72jxyP0:Sy80tPv7ch5yOMTVjKeOVNNCjxy8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d5aa9e20abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422417787" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7B397E1-1713-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000088a3710892731b540668c178feb18b5c56b7de7c7366d6f792ec0f36ad2395fb000000000e8000000002000020000000a941aea3eee02090dd1b602c582c2609709b5ca6d121cafe50d97a677ab88dff20000000eb3a5ed77f071a99351cb256bfedc28e1a451e1ca03b131b72940193c513ac94400000004c18f5098357cefb2c79621d8d5c8e0227ef7fec246b7135f880e75878623fd9d30e42c505ef71ea0840f97c61dec69096602c4ff94f8efb4746377814b8b48c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3052 2984 iexplore.exe 28 PID 2984 wrote to memory of 3052 2984 iexplore.exe 28 PID 2984 wrote to memory of 3052 2984 iexplore.exe 28 PID 2984 wrote to memory of 3052 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61a693c95e8c50831b83f8450ee55e05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5583ae7e9fa65029e68c68e7bd9e552d2
SHA17d5e2574ce58e3d369f24fd916ea919f568dbf28
SHA256c11dc209eb47b69143da5f320283b9a80fbca5ce824d7cc85252fb3cc6d5fd6e
SHA5120eaa591bbcb2c9de617b3dc377234f56b14feb69b2f63161f8d9427ce5fb0354b9deb6e7de135495aec7adca409b25f204b3cc1bc2251ec88975ec0227654ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9789a674c3992b6353766cf3cf21ac
SHA1d8b05fd3a60c49694811341c6c942bc34eec6f9f
SHA25658bc70a5578bf24b20f079c77819128dbb86a6e10d447927509a770cab1a1464
SHA5129baf2b776dd79d6e743460423286dc7f8010c592159343d89865eebb58542af4249a40288fc5356baff07287ca0dbf870f37f5f86a8a863bfe687002e15be3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588028346d48760e5f3ec434ac3e5cb62
SHA1dd50634b71c4fbe5d876da301823a549c5216eb3
SHA2561dab6c2c8cca526fba843f26b09e93d9f14612e393f54e3d644607cd09b3054d
SHA512e5d9efa029846a80c2bcf4f06f37a1086bdd8c70c1df1c838fe7e3afc23761ba221bfb729412642f363899a1ac7776d53b6d88d682e363605c66fb467b743d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef8c5e04e7836e0b1ec6e339fb70bfe
SHA121333aa992fbdb964b8f7f7cccdcf8f7c286809e
SHA256ecef79b35530c2311e1b3033d2f4cc7ec27029c34587bd87d9113b2657740350
SHA5128b75997629a32d2090111363b2e267662a72ec67b2559934aa60d91c578ce49be9d59ae04f4368104e0737abea1785b1493be09d3a72cc8fbc32793ae8736b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5849de809e08bd7b85305b723fd270a65
SHA142bdc1b017de032c0e3d84ee2615adfd203b5f37
SHA256e681ab58516544c4b72f29dde1ff5846c74ccbb98a6faf3c927ade40259837e0
SHA512d1841c890f612b40c70ff008756e434fa5eb3106a1cc13aa6b375dfa9e59eb3407367417b1f29b9678a1da3dd9077979e620a298f00bf356f12cd7bcf680d346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019d7b96bee6f6f98f9adcb854420919
SHA19f83975b693639bf664af9bb8eb806ef3e10a245
SHA2563c3c72c66240179636fd6e8f6ff9613eb67593ea4e5625e740ef9ef0ad10c7c0
SHA51263aed19e2fd393a4335ac98c7b6917f75f8ebda79d15a5694dec9c82fe1d0710679ecae8ba7a461f50c09d178f3c880d73da4d6a7f0667220f28f7e0133d7288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf9bb8899ee2d4bc2a9a1706f8af024
SHA16a34ef9b221ac4283bc1d475f49aedf499f2ab97
SHA2567d94592599788d5eab3d6ed41ffe716ee474b3a1411e2095d2a216fe2ec8cc12
SHA51238d62f9500d8f53a62b507e160a4abe2a9160368690cbf06d805777e285d91a8ca162dc95a66a2edaf3c9e01891e43ca46c7be6904bb9a40268c354abcdfff14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a5ac736504d39341cd85688085b8cb1
SHA11ec1e76dca7b44f7d3cd350d5b7eb5911afd07c2
SHA2569dd605658b069af426ad2ade5a878b6f29bd796cfb4bb9c8e5d55c6fd9424707
SHA512f2800dee180f7b736c5bb0241d1d0ab957b08d6394c7fa99b29c6c7c8d243199391cd9163fc3231d9798faa6178fde92aaee0c1bd4e1e7e0b3c3de49da273f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f9b24f250cc12a8eaa7c2f95feecb1c
SHA1646deb9cc16a9109363c6582f6dc743796306cdf
SHA256e93a534d21247c4568c0c2f058684501eadeab8c3d84e9ea489d7739b5795900
SHA5125bbbd5a9afa97d435d5c5f4b442f841aa7db3bd99627f04dcff48a94e863f429dc42a2a0b4ac899b781731b17201127198a20607f76f2558faa6fe39f467fd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f2b7ce83a616381d775e975c6be7bb7
SHA18c00b1dfd548f50b046f9701e55e681f98248b23
SHA25678206ccc389d77b48415623bea8575a6c9c9ca3e353631f47a2fe2e128afab0e
SHA512fa0c0145045e2a99b2cd3f54444f12d4a0742b93713a2231b33b45ea889a01444de64042437d2cef66378655561c66eabd123701a29d3e095a5778623d602d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cb4e5629983ae5de06bf81434e14e16
SHA192a3e13244b55ef17b92d40be4af40ca81d39c49
SHA2562dc6451a46cf2eeada5284b8c792be716e181907743a0db7514682a920d2d1df
SHA51269de7a911b3b1420d391826e374da3b602e4ed8f64266de2043e278da79181f66825bbfb35d783dac4eb9b6d4560887c14e6b9c4e486af6871be0b2365f86133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ff910a6f0dfa6f5c726ba0d4058e66
SHA1425d12a24b77851cc53c6290da8887cc67d70374
SHA25618fdcac724d9a36c2a4f8a874c789d84807aa592444eb414ce3dd68075a7b458
SHA512c218d48a0989b76bf52eeaec22b9c65d40367cf3de9cb8c70bd86460bcdf72dafba0f5bff60167b19d85f9b4aba25868c43575474bf20f4a1a1ced883050ee91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52f0469d2e0592bd284145f381de633
SHA10fe14e6d69c25be60a1f256ded94c7ef4c1e4d6c
SHA256a1cfcf10f90201cd3612cc83f99f4dc687d0c06a4e57113ff821c0e1e42e20e0
SHA5123782dbd6f28d5d238a1a845e1a4af12e4baccc72840a72d9ea84eef16384ea543a2081964c0cbac5779f4fb4c374190b1032c4bea2a5c55d113343dc21eab073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5daf9a1d2f7bb3403796804027e9a0
SHA128dd38df8634edc0a87d29e19d1cf5b74fedc409
SHA2560274e56e8e65b958dc395bb21c8634e85fa861106a63153841222e5095b101ef
SHA512c3f3d4ae570b88222e278025dee1c5c58dd3aebe2d0f7d043b8d2fc61596d12d3caf5c0aa76319cd3e6720eeafe4727803c9c42b61d088d1cbf3dd8c2d2f205d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50675343680d8f680ef5b2b70ba1ef865
SHA1dee3c408e65e07ea816233cc3aacb65b2663cc4d
SHA25617bfe36dde0b1d71a114dccdaa3ba83b53ab3ec9ca860c202ef0c3d95bc49718
SHA512d89cffec7307c90ffb9b1fd4057fef47d6f26887faf985714ce4aa3b3ab5ebfbaf62c7825af414d707e6f534ede30f04ddb9d999cdbaeab7b9b858f34e51cc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe03029ab1cec8fc218367a94e9ddc81
SHA1ad8ef90facd6a4c631f9d916f0d08dfbc00e3d15
SHA2561e6cb8ea19c15e7be3cd0aa5bf74f665cc208f66096a3753d7dc1de3eb510463
SHA51225e0de16b5dce18d7c01c2473d3307d3a2806c5ad95a28ee9c8205362248da75fe3ba28482f13d5922de0bc94fa01a73e8ed4edd0d765b1d5459c508573f95df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51333b33ed3a676afd5473d7d908a0007
SHA103c84179e6fe3244f3af6bc9283a580e3a40ce80
SHA256cfc55c1417316f79c74cbf6ccff15e1204ec1f17fb509322d81cc0d13f51ed54
SHA51290f710ab699dead95d7ad6437c7aabb11c9c13a0b46a50ff959cfd9091d95cec328863accd38282513d0ef210abb3ce0c537b5eee97b2adbc07ec069bdad626f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f012f6d1da0f00c3db22b80917926892
SHA1b1c69b59c54a125dc5ba043915de8f18de1baf8c
SHA256b4f8b7a4cf1a2fe62d7e4b4bc846fdcd9d4e2e52e61d8f1d4495f601e939a32f
SHA512f54631348d3002a622fa9e20b10604ae78a8b8e45d22b5f33fa6c681b03861c2f611aaccee0661cdf47388a459235732af99709d6530a995f7b55360edb7a8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d037fd0651a26d3d272c118e774304c
SHA1f1c86d298cab1f6c5768099c193357ded38bbad4
SHA2567b8089aaaad8e2bf95b17eb4169a4165e6f87632b821d799fb4b9926708b6e24
SHA51278b89c19ac8e5578edb58eaac2b0f1d307a3aa089815949f5c214949a2663788e1d3f6079c6d29c2e21423431cfadd694025a3beb034d586cf1676fb5248c35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5649b4adb9b44d14d5fd9522f268d7e3d
SHA15108e6f993d0771164613d1d169bc35c094975c9
SHA256da047467dc279614a19060b9b4329e3afd305a0ea3dcd309d4c5761ed82b4103
SHA512a3e0ea918868b0b92521bbcff308b042e43376c57d001bc872fef0b62bbb5bda34740688fe86178399dc037e223a962855b07425a2a5ddf8e1938368c0ac4a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8c1c989a09ed918d9c31d071008a558
SHA1c805a4185c4331cde2b856cb9333bcd68e48cc3c
SHA2562bbeb314a9c97db2acc6cb33820dff0b07ca8c7df05b986f650405ecacb04b0f
SHA5125a2bb1b11f77028e322c0e5e52a0fda175a1fd818345fb80b2611757bd02a83b34ad3230a9d1d0146f159bc90c8378f05ef63b378de6538c9bf4a3233e6b4c82
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a