Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
657cef2c7b73ddd6c3174cba97f053ee_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
657cef2c7b73ddd6c3174cba97f053ee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
657cef2c7b73ddd6c3174cba97f053ee_JaffaCakes118.html
-
Size
27KB
-
MD5
657cef2c7b73ddd6c3174cba97f053ee
-
SHA1
d3a95f11e1b02e91f1caeb883362d9f3b0bbbace
-
SHA256
e98ed4384f30023162284581c4c164cf54b7275998c9e23985f174f58691149e
-
SHA512
7f738824a7fde1104cde0a46d9eacceae1e4fd3a248067579a9645c2bbdd48cf50adacc6e30ca1de49030763c1495473414d48483c82ba9d9aea0838b4dbda01
-
SSDEEP
192:uwIemLmIb5n1+nQjxn5Q/wnQielBNnupnQOkEntM+nQTbnBnQ9e7Tm6u8vzMkwqe:kQ/gi1q96SlG2
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f6dbafda9c3d755dab82bf53a773a20289e98da100f9dd2ea9e78132b60f95bb000000000e800000000200002000000028ce61210cd5c016069992cbc6e7830db52e1462ef1d15123c1140801cbab70790000000d7370e220cecad042d5fd3df8baa7fd02b13c3bfb04098bfbd7bf4c0fbd8db0c4ee3d4f9c8c8696547d62709257e7a88ddbeba33a25e37f83871d8f74419ce3015a72060c001fc51ce348bbeca62e7cea32d60d88b803f583d96adaf609e7e55546cc53c2b765ed579989e5e5e192008569b422e482f1fb38712d7a3131ec13841687216ac0dfab13c576becccdc1a89400000007103c8a43e9fa0f345119192c79036b3a895856c49cbfb1ddc21dd79d5ffe5cc24c0b9e4f6ae7705ac012cad7d4a0bce99f56f8bdc696a1a83e6ad4ebb04fe7d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAE2E5C1-17D8-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000076b6bbfdc6fa7d5116a325f1c5d42ea4c2e59f43e730bd8654da3cea2ad8caa7000000000e80000000020000200000002f503c56116f678b02672771072950856db17b06492642eddaeeb397d0c1686920000000d60c36c32611baffd370e479a84392d863814c5ef69b320d88bfd032364ed7414000000096b11cac2e32b09a75c1acda38ae77a0f3f9b6571c10eaa23abb9a74fc72bb7325a1d2cda8ef773fa77523238757bfa5e6f151bed5468b946ceb209c49f30d9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d78cbfe5abda01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2372 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1232 iexplore.exe 1232 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\657cef2c7b73ddd6c3174cba97f053ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aee9d0d5af3c34b7877cc0e581d72e1
SHA115b8c336478438df05858f9f16123588f7bddc7d
SHA256e39f70a12becc564e8b5adaf3e85074fb1dd54c41067c13cec7ac24e14f7bd48
SHA512c01f25c5ab117bc88e48048691e82673f2850b0721002d28a356d6812ef0827e88d8672bcb87d0061035bceb8ad17890c5fcba7e1d928dad415e00a81864aa29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3dd13a8f516ed4ba6fe1cad4ffb0c31
SHA14f57643afa7703729f15c2ee3181f1058389ae2a
SHA256ac34f364ce69d5ea4b276bade9fff4fed0f4c997e14088efad3c8b798855f091
SHA51223917957bef19d617e8276e4be0093e8c5252888c7c4779fd4f2cd153a7bac96dc9660def6398cbffc1a78cce893ba0c2a32b3c7989f386e904fa2fb3623c859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8d3c7e9a033f7b4a21e5b952085ea42
SHA1238e02a92f2387e6042104a7cd52db87f42cf986
SHA2566b7bdd9578ed05ff9280475c6047140566269b36cd83003571924980b88cb710
SHA51242e69c9205d1c2fa1ed40b1fff2370593dfaab80800d587c4bd0771f77ce8ef5aaed0f57be9c32d082dbf2dfba56953a9124675a48f7dc3c8ccb15a6c4bb7e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50688d3a487ce820e6091f19a1a0dc610
SHA107277ba1de3b08a43a0ccb3f3ec8e1cea463456e
SHA256c71c2d3784753535e5658191f45bd6eac863318570355b5920a4e43bcf551f0b
SHA512c3df68898d1e6a9c5325c6d21f88ad577cdfcd248a6fc52931d63165fc6e59b5069fe9063a5577d30fce433bcd8749d53d25c954b429bd12a685153c2b28e7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5757a1cdcf673456cabdd654badfb433c
SHA194b78a2c1f34718d337b09b4fcdc006929aa2829
SHA256c9554341cfea723569bb4bf4759cfb920fc2ba1ae8e7679cb69c61651609a815
SHA5129a339d2622bbe53993769eda05f8eb5b4401e8f2c79de34a2811bb7ab356252edcae4440e35bd77e2b2771fab4e6d9f3635a4ae86482cf6534bdb73cf570e27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242b550a91f675a4f0facddffee5b666
SHA1a3dcbacafd9f031029773e188ef40554a5c24361
SHA256cf65f5d5f36d70b7c20b935c654789aec471a8a0057c0aff98bebed89e4ea88b
SHA512f41260942bd54468e39af597136f9ecb4a53f0c9cfec78cd48ca5ad374cbe2156e626ae0b5cb9d1c43f67136cbbe75f964ab985afa3353808a530d9f53d7c7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a3e1c2f532022139562fc830c173cb4
SHA170a1d5d275841ce72f2b01f90fc87ccc0f1334be
SHA256de05c4bcd7aa10e68020ccb2933ff802b10a852b70e97a7327330ed78b92db76
SHA512915f9721488731aaf4c8a60885eacc68e93ed2e823fd07014dfe11cd2dfb26cc1122aed5267a6c67b057f9931833e79dc4fc0db02c6ebde21bd9ae3393b0b916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d12df67aaffe9d50fc07863a35d08ada
SHA1425ed45d414b00d41d9c82f985073f5328a5cd3d
SHA2561d7d75d8b77d1781a6e508623b9e8de87b95135d80423d7321ce49bdaf951e4f
SHA512a11727abd881d0d21d4c2faf664ef8c76a7c3d80e201e6b267fe7b654e4e86fc5faa3088431adb818f6006c04b69f7f5a8960d6c8185300b38b8856960854065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972dfd4fef2abd377d90ce97bb939ad3
SHA1e228df67e92a72c7900fac2e66407c8770cb13c6
SHA256e12774f7959272b3f5ccc243613ea987921cf3654bd2fae5eef73ea2dfb5bd5f
SHA5123bfb024a5cc20e1bcebb8b835255ba563f72aabc518a8f56593ba8f0d3dbdf33f54885fb7f02b2ef3dd88f8b9426b0c4c460b076be72af07fb527de02b69a23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46c29bb82b9958343ac6522278d4c09
SHA17c5bccc36b9bae56fc1c015e21697960e118c0a9
SHA2567862705806566730ab1bc731737e30eb44db620c60cfd405d43f1c41c8efbec5
SHA512908a33fbf5cadfd370f21bf5596e2c9efdb0867a4e5f088b253b5c2f55258afb1e3bd3f4048b79efd1667af0f956f9a7ad5317a3410b0942c8fab7f10b2f27f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa3509dad3bdd8031b2ccbd5db7746f
SHA1d1a563ebeb1e473e594ed1bd56ab3abafa15a5df
SHA256fd60082e843dd5e7df05963d846c3cf12f135bffc238d8ddfc0b16ea99bed523
SHA51213aba1f61e4d9ac915b2ca76910f6d03881c4b9e0ada349c0624edd1b704a0e89d985ede3ceec7477ecfb815204ef7e8386213c6d0953fc57d938c63e1e55184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7971b574b9e575128b2ec81dd6db46
SHA1ea1c61397f99f9be567f00c9a9566da5d6c7bf3d
SHA256b398d1d47799e2e07bdedaac6620c6d05fa9c0c4acfcab6c0f5ff8c23ce13e56
SHA5121b5bd1a270a3721be9e0b88d4b5f2d387d8701824b4f8b8663fb9b832ac92a5cd32fedb76dde8b9cbfd40efa178a761fac7a5730e74a72ed8e439740ac4a735d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b9e246652291055110996b014d1f22
SHA18f40ea10b4236c838c89706740af44bc2c9969af
SHA256342af653071e8e0adbcf9debea71146b8f700b4079ef120510a5001c4247656b
SHA512ca3a508d399da8ad4cb05bf3390c6009ff0b83b9c67652096488c2f477dc48945bb984eed26ce0068be8b25f15d5741e91186c37c2a8edcce17c79fcc30f6187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5dd0dcc718310a687f3463845dbb784
SHA17c56e65d7d65036d514cbf7af684dab24cfcd737
SHA256e7fddb10b5d17134978c651bb5e18e44a3daedf73aca764c18cdeb12592f0bbe
SHA512547dd0c32c6d714eae4e3388c8d8dfc56a0e36ea0e8493733d03a671e000869e3b9567135253e31174c7f64e926a9e7288bdb73a69024000a4916ebe637214ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7701a8f9bb965f840f97ec51dc8121e
SHA1722bd0bbe99a8809d2b5903107be05798f9c87ee
SHA256a0de829f6f5f6de8379a75d045b2c1bbd1c7dcf3a1e5462777df2e9b5617053d
SHA512c4e12c7c93f4919957821bd45a3f09ffc80c958b8d010d82289cc0b5e729863706d6df15b5bf3618ed8f0c2c298e13a302f8026c5ba23683bf31d86164c379da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533a671c83074ad685fe397d56ad52ab7
SHA14c18276380edfbc82629fa682e14da0aed6bffe2
SHA25653d5d35673f1ec8843c746e52495a6b54104eaa3e957369fedbaaac06bee56a6
SHA512eec640dae63e2e1f8cb0f6d8d46d7cdf4b64f7a169799bec5c6954c3857fa3e543bd01e69c0513a0fb53d4a74c106fd0575ecd44686c7d171877f1773835dd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052f3a4101ef7169c0051bed83cff24f
SHA1d611758809a6622d78469a2119b132fea63b6e6e
SHA256c56d1b6233576fb8dc2fafcac4a92285aff31bdd8c6102ba67887f0e753c48ed
SHA51296efa548dee54a759b0c11806458f72f6ff857cec9bdd88b3f7032b530ac151e2a47d7b09d9fe4895213876851e92a5b99b90bd83fd7f936ed646185cabe1da9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a