Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
68d322bd6b8fdfdced3dc176a8e41a21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68d322bd6b8fdfdced3dc176a8e41a21_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68d322bd6b8fdfdced3dc176a8e41a21_JaffaCakes118.html
-
Size
16KB
-
MD5
68d322bd6b8fdfdced3dc176a8e41a21
-
SHA1
de0fad788c603b4ce847a0a8b321b850f19dd7f0
-
SHA256
5af52f0a6012633aa03eb5504de6583ce4c3dcbf1a14110af81309f07dede791
-
SHA512
a82be18308eddde85a774646f8900fa529fd0f2f605587f112c78db47dbe68eb24eca84687e17ae0aff40e34783ca8559993e3b492f8e6c23dac409a824c2441
-
SSDEEP
192:l1V/x/q+dCHhx17FvlrlUHdWqfltPgPRB85u4hXOEiUFAKx7tU97PyGJJsXK8CeF:jcpU3LIpK5lN/Fhxm9bKB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F09C8881-1888-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578057" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000364562d57618104e8a2b3fe4eccceccc00000000020000000000106600000001000020000000bbfd0ada924cb4fc95b26e0e9ff63e6f41cbf5badcb0be5ad0e5ebc99bbd17a7000000000e80000000020000200000004264ea40a9f2c885f9ca581bd30a816d59e949cf0f7828334c823d98abd70ae89000000032149b4be49ecaf2061ef49183ae1f3a94b5d97ae894da25d2d7c079f32e959f6409be4445fa16ee71ac25d24e3ce14a2c8bc555e3fd93c158be869e8e772944772a1f78a69030b3ecea20746a71e7134c9a5119340a1d24babe2f7e767d516eac636ec101695f99970f8619c0cd6851330bfb87293b333c4acbcdba751dd06a5c175a20bbc5ebb7f22669e77b138f9540000000014c6d2ba4260cab2f44bc4d44b612b8cdfdd44087888ff003807558a7d7433c63a6c7e148feecb9115c8346e983098f6918718904696d3b9cb38718aaccca58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000364562d57618104e8a2b3fe4eccceccc000000000200000000001066000000010000200000006be522d7a65de6e08aef009e394f0ae1aaffb2c56c26e22155a234ca7c66dc61000000000e800000000200002000000050b1bb4f57f33062e098a0673e7723143e9bf107c67a482791c039ae9f8e3e2220000000bdba0e6fd6d101444ffc471aeba44a69d50e5a1fbc2f7bfdced770b30ec2a096400000000c8196b10a17ecb8a3ca4c6726c52165d31fcbdadc4556f6123fa7b163ade3ebf627b8ef63344d392817cc2dec4b3da5e67c1a4468c024835f65846ac7d094ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b727c595acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2984 iexplore.exe 2984 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2984 wrote to memory of 2476 2984 iexplore.exe IEXPLORE.EXE PID 2984 wrote to memory of 2476 2984 iexplore.exe IEXPLORE.EXE PID 2984 wrote to memory of 2476 2984 iexplore.exe IEXPLORE.EXE PID 2984 wrote to memory of 2476 2984 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d322bd6b8fdfdced3dc176a8e41a21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51188647ae51e939ef007adc412dfc579
SHA1f96ed2ba67b8cb5896befbeda819930d63adf15f
SHA256dddc6a5818e116a69d445e13f31d341ea6edd9d4fa89aa1caeb79dd00552faab
SHA512b87705bce82d4d1454c33e50341e3a366333f2b2d05a71e7305691f0aa5f3bcb40ffeda18a091d033f670ac9287d7f341f47ab20e5fa6c5ce3c6e58d60baf5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5032e3f5ff78b9791ea740202f4911c9d
SHA198f90173b5d00d922f8ee66f868e382f7cea58e7
SHA256d96b236a73488846dc725ecad6c29f2e9041c4d2d510954b635dd17a6e929b79
SHA512ad5099ba222f2bf2227a39ea01ade9ab75c32d9d2c1a68d7e882cd82588305426c334909323bbc08e82e937d049fef6b4e581735a9ff9c8aecac06772125aad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4eccc4564d9cdac0d94c13edee01f6e
SHA195889eae91edad11f8ee64c5ed7a2810fb3ec051
SHA256c759dd22ca15efd45c32b0f54a40d1aebd7613122560acb0273d0f700642a819
SHA512cf60366f4e1db9dafd4c2065ab0219b5af2684910db15e2ec5754885ac519d6b324b51ac7817cd414640af707049712f8e26226e29c4f5ac94aaa11868e074ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548304b74f1eba1473a9fb2141724636d
SHA17637e8f78b626ea6e17449f926cd8a533edfbdd3
SHA256af3e84e8bdc99ea594f7f57706b6a72bef093901772367c87836e603d2337a1e
SHA51219e29cdb91b5fee91d133fba761f356d924216c5ee0677e12deda342dd6c9e60ec4210d96dd0ec3d1b0dd51ce3ca12c9517ce10247c7e5e359fc3b8e1e84b5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8bff7220ce4debf69fcbc54ba31fbe
SHA1c313ac779b8bf3725a1bbdc10d65d804f3b3aa31
SHA256f3e86c27b49aee1ab4ab0aa672bc267df41e52da47f5004b4ce65d90e3f8d983
SHA51280c909f3fc296fffe66119dc72ff4f4338486f85e1757600476b3d3c6daf90904d68ecdd050a665afd9ef470773f81f2bfef3a2400582c9d0dc41f6a5d854a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584d73d34caf238fbd9b5fca269974941
SHA1c8c6b34da2aeb305c670a7e638f1bb7878212cde
SHA2566c31d0ba2e8d11f01736850eb6dcd7ea432b4b1fbd00aecafd9aabbd6b27a611
SHA5127a8ee8f9f9c0d0d28610257f5846cdf02ec89d218e3d23914ae9cea28aead5d038b7189af4a04e65446e8e9d0437b567222bdc3637233a62283125a630e36789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ecb1b4dd643b03e2283fb8cf3daf36
SHA1c588737bc24f5fab372b776175abb491a2abcd08
SHA2566a291725c211c66473f7d8e5b20ddfcad7d93f694aced5241571434a409efe9c
SHA5128537fc2fd3dbc9f8a15b95dd552ca03d50982d206cd71f5f1b090bc94ed70a86a8910ebef90869706fda0ce575a4d659f99cf5732066ea8c0a4238877680fbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59378886b2db9e72286cd65623826330e
SHA15e0da21ed2fcb04836cdb6d325e9625a5221ec6e
SHA256b8c06d483b8531d7abcd0a774fdea50236b311716b6738f6b8b13ad6a5204b1b
SHA51251bc9a88196da44188bb484b27c3a45fdbe30196ef1314e159a05e04e0be4803a4af061c29afd9290c415fcf47cfae76b5cb3eda958518a53f79228e287a47ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d066156f50d546cbcb36ffb758d29ab
SHA1483fd461325e4be05ffd90f708aa595f39782a55
SHA256a3ced2d69f87d700e93c80a6d16cd938e8e560a1a63957ec2ad29adb7f9f51c3
SHA512a9731428dfed38e7e5f1a6efba9813f9addc3fbac0b564b2f65d354360c2129f991cc179987fcefc71b8f0cadaa25e0b44cc61966c19364522d50dae4a2344fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59370b89e7d7e71890713532a9c828511
SHA117dd573b9109486ea0206f84855ed32b25e359dc
SHA256255a97aa6dc856bbabf6364bfb3e678d05f41ce7ae8b99aae30e2106b70837af
SHA512782f1c69f60804732a26db8bc8f00b670e789a8a565bb41f397ac46146b6d8ca8949abd5e7e6be3727037db3a7b2c24cad8eee9a93f2bf3a6cf602917e065536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a345267dfecb99612963baec96da549
SHA1ce25f803fd1d0978d5f36e43058d4adbc925f023
SHA25628ec02a8c61280b5f931c564a92186f3523007f63bbaaa0b2286ad54808851c6
SHA5127d18974c4e9f088d0dc3dbde182c9edb4f99dc01667fd94847abfa6804662611c925a747680b5d55c6127f1c78d6809b7a7d222548ae227c132144b2f569b16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9c76548c6418999322b29051cb21ae
SHA1007ecd2a5b0675660ad608953839d769fe0546f8
SHA2566906780f11f8e97390796ca5ef8506f5fdd4442f874e23d2c66c4edd1259a990
SHA5124d79b8a21fb6486cc8e5e6b2690db945d950a5a4c14384619bc921bd2a32c9e331348a4d707787f91c89e244f418e9ef7891a9f796b201f8ead090a5548ed1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c0dbe8f52033c2406b8794976aa5434
SHA199ccddaa38ad2c3db9b1a058d25b2f7a3968e3ad
SHA256de1445797f061ad81a80b520946eca45fdef658cab287a523a785317252b20eb
SHA5124fe9481cd69e4fe2bf810231bfb55177bb03472ec3bc58f1f2ac2a28c039106487c941f1f6e38558db0bd7ac8c88468c378f046d45d8e0cb300a546332d08291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5084f0f986d6fe4bb34a4f278fc24aaf5
SHA1e7c036bcbb2e5b8b5666c73d6de706b4a162642d
SHA256c4e814db42743aee39a39638299ff172ddbdddc3d707af38b5048b245d03e738
SHA51288d5dfc785240ab0d15fe1776aacf0c128430be1bb5ebb9353d0705bae02951cad76d95bf35bbce53b49d4f5cb486d7a8a0c2f53bf876d4e0f77bc5fbbcab59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588fc12be962a94c868000fe71ae20ea4
SHA129322a97da543119181b9a1f270a19b9e3742e9a
SHA256eb714fd5660a7893e89bd5734d236b1d299b4d750b8a61861808837ddce780cf
SHA5120b476ce895ce9421234959e843ff13a300d6571abbbdaf0789a4fbafdf5300286d9b70740476d700f00e10a5fe4356cdc82e7309702fa96603f9e8511d0e7230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cc9a86b83bcf2cf448dac1d74bd7214
SHA1ffc2fd64dd706d9ddd99aadaaefe9903c62f7b77
SHA256a6df196039e11a73c9baa3a6480a03dcd659a545066e178001bdd8d0d28e5f1b
SHA51204df659a633a178b8c8cae5f312e00b4a136b30a1c97c264918572650815817a569cc3e6ae69d2b85e92581559e11348ab00198107b1288ca2bef9aa93cd3497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787c42ee9512c399981049d753acd9e0
SHA175a4bfef19f4dd0114388902cf2c06657345447f
SHA2564818fcdca18acf8f58d1914c57c378309297bb904eb092c7a629695ba66bef3b
SHA5124c19be77a2e6495ec215e1fa9f318c4cb9739382bedf9156aed81b00c04bc992d7c5543efb7d7931d090eae0bb1b327aa252da2bfeb0b6525afe260f3a388c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a087e265120837d5057ee20056bb468
SHA1ebc69d50b86fc9698fb64445faa9c75f72a9c240
SHA25670992fa4ba01d745909283711b668bd756227e35bd28e761bc7cc3c71d74f62a
SHA512de6e56fbeaeec646763ab23eb6896dc8b4cecaa9f917cd02db2701bdb4b694e2b0a44570efe8dbecc61b605d54ddf1bcf48fbdccff2947562b7879ca497d6b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cddb753254dd5f2651bf496f1719d56a
SHA124884d25e717a12302433283ee5f0eff0f8452e9
SHA2562c589c6aa8170da6d1e494559fe28ae2970cee5619dc6aa102ddc74c57d52f8b
SHA512dbda3cb4466c41c97fe3e50a553eb2e6ab01b69c8524ead14923621770bdfee659e2275d737d9addff0497a3e3181f286ed4468df1c14b72b9d3ccc06039de3c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a