Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
70f7de089663ff14d0b52b1399c3a473_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70f7de089663ff14d0b52b1399c3a473_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70f7de089663ff14d0b52b1399c3a473_JaffaCakes118.html
-
Size
50KB
-
MD5
70f7de089663ff14d0b52b1399c3a473
-
SHA1
d955272fd2f1dac2b463af79f5552d9aa1d030f3
-
SHA256
22f1a21ade8811747e64c776b51d68e1ee1a45c3750e0039c1b35ec19a4b1e4c
-
SHA512
60a0e93281c0753c60f6aee27515929f041c300557336fc52695a2f3122623a41b632132b0890fe98b453081d9b65caab743235710c5a77241a089d238748099
-
SSDEEP
768:o6+6ldZCoCoCmC+C9CJCXCRCaCdC7CFCoCpCTCcCdCaC8Zq1Fjk6vbF+KAx9yM0i:imFVjP4U+G7a4cJwszat+Ax9yGt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9015d2fd63aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6DFC341-1A56-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004c32c449da245e4c715048016731e9bbd479c1bc4a33bd1e5eedb34b560ec2e6000000000e800000000200002000000059d9764e9420df611e238aba531aa7f4880b3f025d08d24140c907ec3672235620000000fdc0f10c5a867d2e18277876d1d86912a904e849fb062031d01463f6f372d1eb400000006d86d6b2a658545db28cd6dbbc657159d962e5f2293e25c729a4c970758c6c0e9fe579a9e5f7dd18ce0a8e16712341d230c72081b8407798102fef2856ce27b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422776496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2928 2416 iexplore.exe 28 PID 2416 wrote to memory of 2928 2416 iexplore.exe 28 PID 2416 wrote to memory of 2928 2416 iexplore.exe 28 PID 2416 wrote to memory of 2928 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70f7de089663ff14d0b52b1399c3a473_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca8329900de31e0a2a20ec34a5d3c1c
SHA14865031498091eeed7d532d38a114be385e03c3d
SHA2566d658a901def33759b642ac5c4f88dee40ce45e8e2c9ed9f78e2417a92c2200f
SHA5125769093dd5aff38ec8528f5f8686ac5d335b81f160ed1f72e355ae36b31fae45d2c59c9b15d1219674270f135f2fd98b5ddad61c23f4eaf33caafae983d063b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902193affa61d796021b41a1eb1c3871
SHA1eb67db9ce9d39479ba42c104df98e2edfe366a32
SHA25603df0789b04f3c50f743f8d9c6f99eda6692e30d8cf073ef5fab1249acb39fc2
SHA512f8f3575dff21d695efffc2244180f4f6a6e4373470810401c6bb1cd983b889fa9e081250ef8c250dc76379350c6809e910658a37effc589e256c584533bb1b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501051338678fbf88bfaa9ba43b5a661e
SHA130b0e3c4d1e7e63f532c9a5bed26b476b3ae7251
SHA2568ce16681b78ba3e0749b1e0fed20a5840c6f2d1173adeb6c020189ae99ec03e9
SHA5126b4b4e862c278654421bb2fc1243902c59eb1aab203b1379485493be3bf75bfbf9582e4dd21c25a778fd371c1faddc5277ebb6cc3f356e30f23f593335370e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5266f46d98a39c1dcd526c2df6a640c26
SHA14dc279f8a8e3ebd30d53c320a7ed39ed28e6f9d4
SHA256407abdfbce22498b1341e0692c95722eeeca0f254bb8a68c8a5cada807bf0747
SHA51265d668753b0862e893fa382af3a5e55a3632c0246611c828687ff73b60b40ab855ff01153a4966b139e9e4f2e4d47fba34fcc782cd6f7d32b0784b706cbf703e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5734f0fe1423b4bad6ac6c76993378741
SHA163d97c0c8b62260b8fedac90e2845668184f2dff
SHA256ab5cf5caea9547e1a7f91c5a3f307800c52d638a790665462a7382473870f8c2
SHA51261eb51bab1212bd810551c152ff10ee8b3cfa7a51543ebd9a999fa40135debab9470f22a5c74ca3e12f46620f9c39d5c17ccb2dc1970196f30c521b9aae0c2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acbecdffb7ebc4efd93f17edcdb07a13
SHA185a3fb5a010debbf0bdecfeb9a9d2dec370c5326
SHA256edff5ed902251aabbb044a36f23479ecf7714c0e128ccf282a0319ceedd2f841
SHA51228d2cba8a0c1fe0ddcb3657d50111a8f90751d092a83f819d106e2f996572789f21d5473c330b4ee71de01e1fca9a98432cb24171b3dead091223d54c84ea34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f50c20730a85d85543f1ed9311f2b90
SHA1c2a85c298af9a9c3b4d844fc446dac537818ebca
SHA256ec3cd27f312e0cbe1738da3e504bd51105044db9badaea4b08edd867d7958ea4
SHA512ad816db6a417f4ba272c4766e70118fc054d56a536cd8e215378afae17d9a7ebd2ebd20e87bc32a97990231f8d8e2ab08041c60c10770c60fe6e50fbf0de7d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f3e9969d7044a2524e13ffb16bdf47
SHA1e9175eb83b0e01c6b703c352114d18e69a7168d3
SHA2560c6d65d8ab4dc6386b0e4212cbbcb0c9d83503ce818049fb17a29b137f7a2a35
SHA512bd3b65bacc41b82a1c2a4394ecf5ef22db574f0240c2940f4e96b42d54d83571e15ad6531662656bf6be438574fc5da88ff28e40f2d42b3458828a09c27d22c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d9062a2f6d9b224b8edf7df9e6a48a
SHA1b576e84ee394062f556ffd21d97441f4fa679a81
SHA2565044a97e13dafb4eaa8a2a0fbdb692d8af96f69f4f8bcd9f9f2bda3a6c03940e
SHA51263a44a7827b9d6d56062c3709019944687a57185a6f00dffef506d122c3673bd0e3706074cf57877b563c15099f2d8b2b9725a9639bed8d629cf98e8ff042f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5fa05a8cefe9ad013acfbe61647f2c
SHA1d189aeac6648fb9791fa5b4edd585ca6ee0158a6
SHA2560324598c2f060a7dd62b36088a3b484eac4ca9e06df58bd49a1541a7de257c6d
SHA5128c456bfd5497bb7ac2570a1b25d2d91366236c903b422e42fb83eef06f9cc33f7e890a743c87d78fd72e263c6a6ce1e6d61adbf65c260199ca8255aac7f109c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586da7220425f7f4b171f3fa62c827501
SHA1f6e113e8022dc3eb4a30db825586a29a7c509d48
SHA256d9bbbe033541e25d841d25c43410a059312dc40c906a5802ee0edeecb78bcdde
SHA5124a1ce087928ac1baa888942f69151d3b6d11f6e91f7a812bb9ffbcfa15917a2d5593faba31a81871827760e3789534af750b2110dff9ea4b1f4e580a9102d11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7fd760410d1cf4ef2a5958590bbcf39
SHA1743788eeed7f59f3e1e224336cc5067df7cc7b61
SHA25611118bbb4629b99d144440ad1135e3bb61fe2de5f154a597cdde9b6991afb906
SHA5122e73a501a833e6ea6f419d48dc3849c2a049668061f301114d5a8ba00dc596404849863e99874a766b75c1b8768c29ec1ca4ab837edf685c009b1e4ff6afaa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c91bcb0a17b314d105be91508f90987
SHA17aeb011c1b79f8c0308851e4dbe421beaf485568
SHA25699cdaefbd2725f69820521e696d485f92cbb018508f02d725723ecabfb302572
SHA51212bfc73f33aae5b5527c9d471e26b2ecd0b1367c3f46b14f03a82067980614a3092f68071f413a9499fe4cc3058b790ec744fbb2671d81f105e3946328b89881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae37ce4935bdf6b0b5e245232c96f3df
SHA169e215b189f9511aef64c79af13416726711e2c3
SHA256e9718bc1e5f209ab18753744f580bb69177f2f0f73e3f7cf61b2dfcd9cc1f133
SHA51236548e63df2d7bac06dbc3dc351fa9d343072f6caf03eba157c7e16eee95efbc3abac559bc13057c85988536e60f180a1ccd0997be515a3c36a873f5f9b907f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9166ceae2cb1c63ae56ed79f0ec40d1
SHA1bf1301959a9dfb44fcc1f18273c0c62bdfa5608c
SHA256b05d2f2f77ffb5b21ecdf29d28227ebd202ca466358a7a6136bfcea2404aed22
SHA512bc0481a45cff63e9b6cf724f00a2f363884706d4caaaa7f5d1691e6a36c6155aadbc1a5c1b92498e18855b3033f95973fcc9f2497efce4e5659ea9d59015a7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c955ac077fc72115171f2faf2f401f1
SHA175aaecc95d4a519ee5cf76d1cf2adc06848636d0
SHA2565e7abdaf3b9c9021d3429756f3aa0f472c3c89e9e798a0c0fd6ee287601a7286
SHA5123ebd0fae805540cd30c27081a3edd7b56ceab97549d7009c339ab34ed3eccd70986b6be7e1b6a06f9e0fea12c3aa4ef6395c00b362257bd00e39a5d93f35dae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e641f269dc6e8b1f59a0703ebdd37a
SHA1db873f0855ccc502b96b87581560445c77d554af
SHA25668cb30cdadbf7a48be625f714a04595813cd6d15b63432fe6fa9c4db9aa6e0a1
SHA51237a036f4bd6cc532dac76969f4673c349ab49dc56fc7910d13b3fdae550011894ba626fea27fee3de47f7c804317fa5cf8b3e17dd90be571b0bd7c4226f4ff0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5012d68f2c60ea3ed3fd407acecbe9fbd
SHA1cc8c2a97211f875d790fecd22e1dc640fad11599
SHA256f3a7d2273898ffba55e4ec050b8e3a434efbd9a4d405c410bee8288eab838a1e
SHA51266252baaabf50d05d9a6460d89eebb84f4d84a4d8313fa31494b2ab51b2254f7acc5823a5f8ec4fbbd9c6b98dbc041ca2834795053b8fb8a9c861f837d27b577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e544c28b6ef48d036a8e63bc45bb98
SHA198627546c5a31fa14e38b3218b5c00a1f74f1746
SHA2565414316fe804dac834cae91529f239da81b762fe0b8556a422b98196a78c7397
SHA5126979024feb2837afef9513a0e92658101f15e02d0c3c46468987ab976aeedee67513ecf73b037c2a44aace176256f4abbddf197ac42a9acdd9a265eea91a5db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596cfd20c17399641783fc8474c550fb2
SHA140acb91d5d1026e8e4b1b790fa4775220ffe46ff
SHA2566f4fdeb5c92327bc91243f3251afa4a51a95866c6cea59ced7af30ec91c8bc2c
SHA512a6b5dfe170826a2357d93fe70f8467b23481fcbed7fff944a1c4a70e988191b977bcab441b397984dcc931533d634ba13ff0436e99f0770271a8f3903d8b3886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59a02c0202a508233fe6b16be4eb525
SHA15fb0419ddb16f3576469346a837c45cb794b4c8c
SHA256ae63c0879ea6040a3793654f22ce5bb136ba9ad76a49ba953c820c5a85c9b022
SHA5127fc910ed26de13935e3c74b203725f60258d968f828fe9f7cbc08ebfb1a480bb190c834c6e8abfc3a0d25106a634601bda5b51a068db11d269ae3705757b492d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a