Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
63b833b53bd93d339dfdec6b148dc88f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63b833b53bd93d339dfdec6b148dc88f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63b833b53bd93d339dfdec6b148dc88f_JaffaCakes118.html
-
Size
718B
-
MD5
63b833b53bd93d339dfdec6b148dc88f
-
SHA1
8d97ebb4b60fbbc4fe606f50405df292ce0c8305
-
SHA256
b1c1e6f79929abd6234335123b02210344c6238997e75db7abc882213a711195
-
SHA512
059f5fadc6538f6bac6220570bc06e9b2a0ee49b05e79aa2a56713042db5c804c46ec10b892b73a716d64b8f269a3fb597aaad8996bad2d2b260a814e277309f
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009761454bfa89a649b0839c3f3b982c4200000000020000000000106600000001000020000000fef03108a49b9a861574072188f79fbb3703c94bc667f56d966bc53d8bb4d8ab000000000e80000000020000200000003546533b19f3db9629f3462496965d424a85e2d02be8f72a2d81c5e9bb0a141420000000b08961e2c15e9fc4ff8659c751b1af1fe5c21411714e0683039e8852d2e484b5400000007b40de380ee950ae641ab792755461ad88d5d238f1d1a90bd6e948189f563832ff16afe2f69c3db4c910f8603ff0c4471f01032b40ff9636fca199f7e13069dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61EEFE71-1783-11EF-9CE2-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422465720" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3064562590abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2492 iexplore.exe 2492 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2492 wrote to memory of 2516 2492 iexplore.exe IEXPLORE.EXE PID 2492 wrote to memory of 2516 2492 iexplore.exe IEXPLORE.EXE PID 2492 wrote to memory of 2516 2492 iexplore.exe IEXPLORE.EXE PID 2492 wrote to memory of 2516 2492 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63b833b53bd93d339dfdec6b148dc88f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbd1dad61591444f51058a67e399167
SHA1ecca6d6bea17e1d2fa75f18f76e859cb32b0618c
SHA256e849fef59ab5e03f9694c0e8980d73f2f7a33f6dfaa136fe0ecb953445c87bbf
SHA51215ddf99b7e0bee724e00dfb9c94aa9fe846b7d13d4b7e5cadc1ed5ca1c23cbb968c2af816a5de48a19780b3a98cbb16b52ec8c4e6e555bac1a9864028c3c8fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5910c064d90ae7a346d48cca31d1aeed6
SHA16d55f3c859614b0fd606f4269c20c02e2426105e
SHA256e29ce5786404aa3576b691ee5b2460ceb65839de423e1f033f611f46d4b8bcde
SHA512266eb748ebe280502b2a62699818a568d875659d6492814dd2bf9a33f9dc0103ae255dbf4527d1ea82865bdaee4ab90b0e4c395bf50cce850801a54b7b03ac44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a539536605630ffdfff116e3120c85
SHA1a8409385842b09f3228cf0768e5b02aaae17dc0f
SHA256c6967fe36b7b841101f093a4d2bb2483543c97fddab0824d4f5647f74ce2617c
SHA512f214eabf902ecf196ccfa59b73547ef049d81ad6a9f048f3f304894d9de630c9dd3cf26f31302c024e6bd55efc0ff61d5cf5c195fad0d0d32adfb22b4d85c541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e54dd7abe311f885dbf97e026ad955b3
SHA1596cb3b348bbb5601b719d0cbbefc6f4820c6dd0
SHA2569a87947781cdad340d2748bd0ff53df8e64a8a6e6cb2984f0677cc4b7f2c896b
SHA512b478c6f8a872bf0c82832def82d3281dc4f2f420464b47bdd3e500d5534ecae5653b94d1a3ac2de45a86e10c037de0ba9f9ea3bc4337985f649a092acad7403f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7722bb4886847bba884b3b9d613d16
SHA1b0bbc1fdb00b4c637dc3523daceb1e068c02f22d
SHA25612826723541dd4de1fa511fd4b0eb935c9dc403fffe5e9b48e3bdc9356ed5288
SHA512d8b680508e462083f622d68654493805f0a8777c098ffe1ad11989efc7b63d7007438a4aff00632318e4e02907bd008506e2f2a5550d0613fe897fe1aefcbcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d92ceb51d9ea0ec4cad738955c82e606
SHA124751f3ce9dff7e0ea277608f0569450e2601a71
SHA256eee20fcd3d22b64da3252737a16c170a5526e241f5d32d985370edd3076c1228
SHA51246672874fba36b8fac92dd5c2e2e703514c464ec8edd38cd4bcadbe9420e4dce2cf279b0b868178a3b1d5714f108c124eca178380e00882cf216376e1c1f1b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f520fe0206558b979aed3aea5e80d104
SHA1cd0bcf088461f041cb510184dafad6ad55da2054
SHA256df9875844b75140b33d1c5c687e10101fe1f89a519c5078ce764fb34c63cf861
SHA51221ba6ea993f13c9d1123a574b3546ab027c5634ce838a0e3484f35c5e757ce3276b60a983638e466102d6a83b5ac857b2b7d5cc6a1b5d66c663bb4f8534e0e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f7c5766451b3115f2c9341dacbbf92
SHA1eb52a4349d5ad6db11ac6410e2bcf3dc604887d4
SHA256b41a38fd71eb18b49f0ce98528bd29907781ade5d8faafecdbabaea4f09f5704
SHA5129a627f7767271c2593b2abc4a3c7e4bce737b02af69a69a08880be4a25ba89f2fe58eea5f09a0cceba1f91da7876636eb22f7915a28ec55ae88763b7bc2ae193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5895d1275c7e3bf696f6378ac5beb032f
SHA1cc8f8d97a7f01bc31b109058013986f209d9b958
SHA2565c54c678768a03af212861846979fb3403010e19192d01120aa1c47f594bd5ed
SHA5129eac37f8e0587d748c4a76a93c1752e94db281de9b04449911321dc0bc8cd58cb83f8b14d0c8ec2521a9b53dd053a50047d8b2a6d66e7f95d125e53fe744a304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50742b48d343130a42e0af69b545d811e
SHA19af22f59275dcae2972a3b5873f9795b8dcda798
SHA25609f80f299f56d1dd9ffcff84d2bd72b2784969dbc6d7436184c9555769ec4ef4
SHA51293aff171a30dd69e5b442b2a1a6db6bdda8525bf377cc3e590569585755b35ea2d548ad2adf4c82a09224059f2d490956e325c7075ffa9e6bfb1d40eda693a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0cf0d6d647916c5e7882e22890550e
SHA1c330a87080baabebb715b3ccf54b5aecf3b00b8e
SHA25691f7b400a35f3d5960143bbc10da7f230454c8ad207de7c58157d4f6b34d141e
SHA5124a16a882bfcabcfac4aeaa90cf291c3904e416b58719f5d427be03bb7979fd630640a2043fa6a04799123e48c07c68a7302ba7018d17d5a454512d2687099b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ce4d400053a288bbcc52d824e76d3d
SHA1467fa8ed58f5c6bd240a9b27df73ced5a158815a
SHA256d3e2bce406c56cd15d128eb16d13b5a1f06d683b2d83a7ce35061735a0d1e501
SHA512a08353218e9501ab14bc3b53fb1f316e2b4734f49bb7d1f49de3e399b8f955881291dc1cf3c1fc43ade8f565a69044e60bdd806b7ae30f150663e4649540941c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd14478baad03aa12f0d480bfdbada3b
SHA1e0c13db91fdbf4a7f9894ccebdcbaca1bea12c13
SHA2569a979bf52c6ede4de454fcc182ca1c1e5e5bf07fd5d5e33190c039e06f4df62e
SHA512a9a736ea4bf56fb5fa7b9398ad869865b20e1b0fe6e8dca21fefbda3ac2515c54deacd78428450b8054a671b52bf3df790b258cca13fb60fc110c30e04bc44f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533654e4af84e2765197c455bfe8312ae
SHA1da0aa30f46d8dc00c72e6216f250dcc0b23cb01e
SHA2561bc1685eb5fcb8995ab4efe0ef0f2f776d76144645317c6a44353b5569397569
SHA5122195438e4b157c7d890c4c185352ec6542450edbb21f14ba3c407c083b53953e1387b357b05d7081eb6c3c928cd14e4cb26bf8dae0be910291d0969def1f5bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eb89fe3e2cf56f6c54d0d5fd3af7348
SHA14cbfbeca6cacbd65df7bea6fe5f858f390017279
SHA2566396189ac3e5aa71dcda8247c8102de4155b492b3e102367ae09b6b4397c904e
SHA512c74082b65c2d6678c6722b3095c2fd49d4289804c24df5cfa2a6a942d1eba8e4efeb92338762b7a635abac89c048ac2e0ca85419434a074ea0848d3ac503c84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbdb62ff7d6ae26fd2ba28561ef6de86
SHA17df1e28c2f49551c13d6ab28ed4d5a4b28772808
SHA256a04d9aa55a86ecc31b15bcba3dea57edfc68b684d02a862c3e6c902763aea5aa
SHA512609430c5e68a71933e149fda0317b5204a381bf5bea2634123293e95d5b3aebc36012373248e0c9f2c678e10f956e288a6062c5d15b838fecc9f5882db00a85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fdfd06fd4d3211744a2ec9ea10b29a6
SHA174410a4fbaf2f685bed5b386121d3971fef6114d
SHA2569ca4ca94ff9bc36b29863459ad0442ba067e7518de314ca7d36db9029c5345b2
SHA512522a244bc2b21a49d22fd1d9a9475a31481be5747aa412375545f39823406054f04302c67470b43e1e0fa246fbf79f89ee5e1fea43686ee64b5683f0b98504a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be98dbf94d37da453e9e7b1a0751516
SHA1e18f6720b8045e25e0a6e085d2b7096a3598f4c3
SHA25652ee9d0ec8ccdbbfd1b38c434273b93ae476eecbea9f7e1d280984cc931ff13d
SHA5121cdabb2d327e6abd4bbfc134aac1373dcfceacec7412dac6151e8a6ea6f4162e16dc3f44ce7ba868fb2360d0521b62dc6bd8965bbd65883b24d575a891e8797b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536548bd0201667268ee23c61f4b45740
SHA1452f97b0ddc58f0f0220c97319b9fd300debe7e6
SHA256d919f822ab082b599a7b188588da8244e6675b567594499cf6bdcdd0b1de9372
SHA512243828611b440ee038aeb453d88696e380b268ab8a58f45cee4712f9e0f94dc0ad051d4641e59591c35fbc087ed9e1c6919490dbeafa4cbb567a57abeee1a8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b955f5c00f383ad781bc7f4c16c6589c
SHA10a8470715060a6c786013173645c4bd1aafdd709
SHA2560d07dca5fe4f34716d24b6b8483d830a0200d5e19e9358e1df81898d8bf2d141
SHA512902b54f9dfe0edc456f3404efb68369a140b6a00635f64b94f9176dd466b19feaf781ddc5832562b37f826a0fbe60d86811c9f3e24f87aa96666bb998c4cf47c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a