Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
63487b0afe9180ee79c034cfa3ff4d03_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63487b0afe9180ee79c034cfa3ff4d03_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63487b0afe9180ee79c034cfa3ff4d03_JaffaCakes118.html
-
Size
34KB
-
MD5
63487b0afe9180ee79c034cfa3ff4d03
-
SHA1
2818e3d26c1c8d3a8160c1f072ad2d0f40cbb20f
-
SHA256
abbdb4a6e84427755a7e40ba3044fcec485676a92610b4b3db24f1329f935230
-
SHA512
a55909658a52a4b5d3ad6e91523bf22661399ef74394b450743ea3332e32672cabd94488d8833f37fe7c0900167dcbab4c2105330722bbcc4e7bcefa335e4b2e
-
SSDEEP
768:bMx2WSDuqfz7UQBylgmb36xCN3o8M7ljtsIjvNF:4x2rRz74JbTNo7ljn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422456189" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{319EC6D1-176D-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000e38d498d038af169747d6b7a9bc5c85d0639a3c3a5235f0bddb2ff1f327ecc3000000000e80000000020000200000001d61d49da996e04e45cf3f7394dcb9469fee05886815368e12465cea60ad6cf120000000aceee698596a049becfb9e79f3002438335d76aabaa3a22f32f7a393e3859cc840000000b7163fd59309c4956e31612eb26f5cbdd72fb0f1a49b54d48b75f1c0e3a0abc2e412916decc35968e5920cd9b516fa8a331961a953ab6040175508d4f3b77c57 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c6c4067aabda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1704 1916 iexplore.exe 28 PID 1916 wrote to memory of 1704 1916 iexplore.exe 28 PID 1916 wrote to memory of 1704 1916 iexplore.exe 28 PID 1916 wrote to memory of 1704 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63487b0afe9180ee79c034cfa3ff4d03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591609665379e6248c76280ca4b53b3a8
SHA16a105096d9c8b6a329b561830d388749a445aa35
SHA256977b40ee866a32560fddd08dcc6c83395f11849408317e918dc227aca47c67e0
SHA51253244ef83e1bcbdae527cc463575cc05c49281ba8d9f81558d2c1d9b151411088cf9251bc1b4029fb824faaab6d7e2e6d1135996c8ae059649a2dbeed5c966eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cda39aec0942e5203a8b946bd3e4dbc
SHA13123fbe53d3bb1183f87d08ea06b7d14e4f609a8
SHA256716af8a4f5bacbb989805cf279b29fc5d5959564731cfc54521974dcff5b8fb6
SHA5125e9715bd33390041773731ff85b8680a200e29741a7fb768f14a8ef71183ff61c9c23e106ab1a26230b91480c2b89ddfee87b7b63685813a6bbca5de79733c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526c5e8b28b8bbd203d7a406ff38f50cb
SHA1742d53971fc0ace27b3d48129021a1ceccc2d291
SHA2567f0d2a6236f139e22f34f1893e316cd2eb69e96995df87fadf7bc9be5c919c7f
SHA5126f84b40cba3e5a78b07329a8fc10e3ab78479fc33fa21067aa00d4b2ce4e55add881e3056494014cddbe0bb0b00a8dffcaaa3c5c85a877f047d6e35d078ee648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffa0b261ea3b41295f89189f3567a99
SHA10f8fb2a55ba5bf9a42dba003826ad44ec1419a25
SHA256bfb70215619d3b321a6801f888568b30e6018ce10924bb179fdb5f08cea6c8a3
SHA51287ee43a32781612c9a11a056657a01855f46f1d59cd3439f5acc662d960d27dc96600678dceda1ed96f241c98ae7c7225521926aa206052eee4e77d1e6639ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae8910433e687b05816df812a764b65f
SHA109f64bf68e1016d993383ded32e1d7991d13e7b8
SHA256d51fac0709942bcd9fb179d84bde3da6b87d90131b2c900a6dd6d86b56d4a475
SHA5126ae2cd7df39d5b303a7a0edb1ee6eb54844ae18aa72338cd3d6bf6cdc4660b8ff3112dfad8e0ebdb125df90399c6258d13f1ab802665278615a311bb3b18567f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e2dd400c5d9bde3f1c66c45de8b020
SHA116605b58dadeda52e855d6576b81c3ce6b92469e
SHA256a7d4ad15f44ba8a21abee8612dcf874919b62512846f306b7992238212cdfb74
SHA512dc803f7997fcde971ee64c88a008bcfaa4d06ac0022fd48e7e0187126b8ccb84906bd3bb836f0089db0826632c6c6fa49ca38bc3bc94883a99ddf400dded037a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f36c413e22bb1ae30f842fb3c5404ab
SHA116d0709263bb91bfd4292fedeaee92eec63e1f0e
SHA2563157bcaa2e1ca9c072a83a9a30803b08b53b4b851a1f7380ad5a54b5f3e5c3a9
SHA512c0d5532d087afbd32d681111b2ab2ddc063126e576b75353989988314ecc6b61cf73cd2ffb6aeba2a53662e0e1c7ae929deaa077d5e5de71d153f7c536b4168f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a040ad1780fe2fd5706cabda145cc3c9
SHA14050b0bb05c654a41013ff2d0a7b2cacb5bb27c0
SHA256c0acbf6ec7c941e88a1ace7a31f27133eee0aa951a27dc96393bda349bd92491
SHA51231147bcfedd89dd184ef5893896556737c315fb18e6f89053cc528d8000b240edecdd95121425cfe363968095732a38721c68d3a42c2253f2cd0c79e9930188b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aaea32d9cef2aba56fe4a63cb7693e4
SHA1938cfb8052038b4743a9471b45940ecf10c5c148
SHA256e00728bc26b77c0ddc2e48c95ea5aca41ea17d1f06755af268437c5987767a47
SHA512ad046296bcbeaf2c2a26230c3ac6a83d29b877636c5f6cf9f1e220c7ec7a94b6429cc271ce40bee346e62752b30c56a4635802d22abb92924344ee369b0e03be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53846579e9d9c60262218fb0fe5e74421
SHA1fbc8c38c79c129514354e0249afa1fb5473efd1f
SHA2569b904c063798baf1ffc66c4516ce89c6979e153c91f8513c01377cf5a6b7824d
SHA5129f9bcf2d2f0c2251397bdc0a6e351cb03c49f3b8e216414508ee947328b93654e34cc7cd0fd8d7747acf9979805fbcc025ce9ae71f59db68e38460c03be08054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c168d19e88156a5ca20fe73d88762d9e
SHA17b0f55dd5beebcfc0c9ec93b326966f642c96fae
SHA256c8dedb14fa973fd32f9242acbbd0c28221d88980e633d3df931b15070560625f
SHA5125039782feefbeb8c0076bafcead678462fd2a30aa58f47cfc0629715013e34f769c1aac42d03a0aa22add194080fa9e6ab0cd106069eda6bd36a2331d75691ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db75a2992599e8e0a7a54c8bb8992b03
SHA112540852e28493ad188af5b5dd7607ce2f7d66a0
SHA256ad14a6fcb4c82bd872b450d5adc785b50064907136e5b6239273d44eeb846335
SHA512370f9704f6b99907c53defef5e4590960a1c70993359dacc9070fd351692b5ec9aea9af7ffd5b38596bf0bf86c50dedfa1eea89b4fe8d0207e0da98afabf36e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704e0dac1b66233380262f6d43565e46
SHA1aa97eb1f72e1cb83032bafc6059378236a14efda
SHA256cb143ea7df810f987544bbc97f51e26794f614ddcad668b626c34f1c0937c815
SHA512da58fa22d9a59b9ca75b9f6b09a13ec47153df4ccd148c38f37212833394723c602c525d2612b7d5b810fd76b80b44ce7173e780ccfb2e7a5d635be369e954f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6bb16035259ea0479c3669d83b1e89
SHA10cb65f8f0718c68bb56da5eb4b2a85969822e6a3
SHA256f79000b8782a31acdf4d44a0dc851dbcef6989c71f8af17242e6e08b40252230
SHA512c4d29cdd869eae107ff0d276a11cdb664cf9ce9ac2f2e7eb0c28fe5042acb12a8f47c33e90ef43f801cac9a63923416dae861264a6729ab6e739be9c276d0b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07705c9eb59289fe5921ef52ca8ef81
SHA10768d50e857850fe845fc04c4dc2758a60278566
SHA2565755b906720a3f5275cde698ec16ac972aaab392b4315708da0856bdeb997180
SHA512bc5cf2dcfd7dbffb4eed8e80c10ed313dfe0bdfece1961e2a4666ff8483015dd4d3e06a9d76b99261f871e8012cff0032efdf3d772a98d60dd85847319de364e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2c6e426876d4d2aacd621aa22a6dc28
SHA1043b393d1fff5aada5df0dbd02f89762558db653
SHA25688fdceeb28d6b3cf59eb14c0fa6632ef72971acdddbcfac554994d79cd04366a
SHA512329b394d91912e19f60b2ef229c40980d32debb6e7d433cec9064d4d2224e211f79f173283dbd200c7ef950f0c08c8c3d3f2735d6b0ab089771ed69b92f6512a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d10fac52f846149d5c62ba66812e8d6
SHA13850bef66f9c29c699c3576fc1e7f68b2b814888
SHA2569b1635995354f95eafb57e196ca179ab1d8a4198c71e5245ca2fcd1a20b3084b
SHA5124dcf8c300b69fa3df740cd5891df9175bdbb1be61971b2c1c60cebac2333df9788fb71ac22bf6f82dae4f6c2aaf414c1e0e5ee9f1731b2973c8c058cbcbb8142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511dee0bdbba6566502e3614e7cc3c80d
SHA16af81f606921f0adaca3d35086b29a0ad2734ba9
SHA25638db541b2202a038755ae56bdd1916ae5261005faf5a771d861e502aec5179fb
SHA512ff7243d85365c6c2d25d2d6af0df32e47abe5f20523e57356da5a138b6bae2e0ffd5f07acf8da7268c52ab7252ffebb32867e9e1fcb047404de08c311a1b62ac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\prophoto3[1].htm
Filesize120B
MD5021371280f12e0cf1d7ffe8a8424cff8
SHA1ee5112ac2ccc4fa654cad9e9faf2f39e387edc60
SHA2561c83e1f95bb77f7b9843f046f9914c2734d52761d0215c268498eccb5f0b2d6c
SHA51209139191ed6e892de599b279aafc62bd2e9bfdeba00a7af8c0ca45847b2640f28a1c72a0306eaa128a4addc8f08319d998da2b178a1bcefb62ae48828244916e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\wp-emoji-release.min[1].htm
Filesize124B
MD53053eb852638db396230de9be3c27cef
SHA170aa9a86011eb2ee8e73020396da96e737195e8b
SHA2562243c2d051550a286d3967d95bd902bad89f306193227d3e3251dd16fdf86fca
SHA512486a3def8cb338118cda2d2d13b51057a8341d5d75ef4c3f8fff4a078070a424e331ad4ff60f8cddea83fdeb98cce9ae13ca88a22352217ba8a69c1a603177f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\02[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a