Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
75338e0402903aed7aec7ab51e910dcf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75338e0402903aed7aec7ab51e910dcf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
75338e0402903aed7aec7ab51e910dcf_JaffaCakes118.html
-
Size
94KB
-
MD5
75338e0402903aed7aec7ab51e910dcf
-
SHA1
fb02e7a91e64b1a4d16a69d965dc7e7c37c8589d
-
SHA256
8a39700410de80c83a9a00ab407db5c0933f6b644d5b5ac8a07791235f7f12ee
-
SHA512
cfaa6a12e4b04b6a57a7cdb22ab160042f32bb44c19b0635a72c140b894fc0ece04c3d7fabe425e2e9b225967bdf1e7ce0bd5cff5c3f9373db0f487f3ca94e78
-
SSDEEP
1536:WMLiNV7Lau//jRG9oZgpT0PDFLGwAfrfZ1onfyRBdkrY8mgHC+qpEyW:WAia4iBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c5079858afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422881630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFA97651-1B4B-11EF-9034-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b72dbc6983dd14eae521553795f701e00000000020000000000106600000001000020000000b23d81f58c9aae2f078f132c0891a332e3706dd20d09cb996549d60a397ade82000000000e8000000002000020000000b7ba7c5078aae56dffb6da2d978c00f3a75c9636d729f7981255612d7703da13200000003d030174a6f6b53739e5f877b0435a834670ecec528114df60e9fdf979d3b5f540000000256fc3e7e94dd2e0895e435aac13c36d21bb7f8e02f921eb9f67809ce89ac0a1dd5e84d071a9a4492fd9188200c77d46787c65ae4031a562ac861084cc78c432 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 912 iexplore.exe 912 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 912 wrote to memory of 1788 912 iexplore.exe 28 PID 912 wrote to memory of 1788 912 iexplore.exe 28 PID 912 wrote to memory of 1788 912 iexplore.exe 28 PID 912 wrote to memory of 1788 912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75338e0402903aed7aec7ab51e910dcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0a6e6c5261413574048a75c1dc13693
SHA17b846a78480b9cc32e7bd8ac8596189f799705c4
SHA25667252eb3672beec6ceb76a17003955f034d5893348200f6dca72e32d92b24bb8
SHA51211fd2f82c7e3a51789a774bddbecd88c5c79e9673b9f9859a6a60ed7e2b55fa44af45dd83deab6c85408eec1d6d40bd0b4fee825738015b25ff4e920f5f7c39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55299dc624270f7ff25f84ce6389a5bb6
SHA1259075b4ef610c1b164824462a472a9672f002ae
SHA256df3379513bb78b1a34381e459887f182d7c4e39b9bfc13f77458b77417ce7f5a
SHA512214d306e3fdc0c394fbae44651fee6bd2ea042331f32d0312f1d4a4f52eb3ceb53d6de80032c2000726f5ae7ec1de90a6556879cbbe25744581362a3e32391b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d4338220699a4ff3c8ece96c3a48b40
SHA185a77447a24dc86887e19ccaf6efc0f6faa2a498
SHA256381f6b020d67307cc9a810dcfd26379dacae54609c8f1b59f3d351744cea7891
SHA512789ad2f04ad1877c44cecfd2b48405636c13ea0216217359631e98d005f98d8eca1021ba1aa80f4b271e1ed904c71240ee6262e709eef2f6b8419ceef25cd1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580c02d2f1b7d8c00fb7fdf410d9f7a03
SHA19fc1d5795b1c98acb433eaf1e948411e59f05bf7
SHA2564d62c5ac54d610746cb990d27d088beda4035df4c22a404c918543fc4437e6bf
SHA51299708a2a6a57757165114b5d06166a42ad1e3cc1676ed6a2d798e17c500debd90f28c42d9ca2fe708787ed74cc4cd2d8613cc01a0398c241375bb13c59cea1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524e76706b59d41afda6b959377dffd7d
SHA1b5f82fb308be6405ad585f359538f3e71ee7854c
SHA256513107aa2d61f490b9e6eb0edac7559fb277ea5e5d866004e8ac89df2b9fc5f8
SHA512fd57044e1e20b5e55c6407a5dc1f13fc49b96ccff670d2d04e4950ec23fbde8ca5a5b45c712058b774c234ae79cd8a64c1206fd93f83ab3072876ce816cdb058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b2e73c1f3832753181b91256196b90a
SHA19cf295fcc63a0995f430b10c7f34ca4dc24b0f59
SHA256196e4aa8674726384ede90d02b710cf78902f2e17d9800b3ccae1e6130748bcb
SHA512701970a9cca4e62a35ceeaafba1f0a7a4bcab861190a1bda024aa46de9697637838f903ec54002136b37fa0f8cd7db95fc9e7445b158efa31f49b96084707535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5093cb20f08b8bff763ec78a179b6fbca
SHA189d3a38e6397a768deb77cfae3f7bb14efee31ce
SHA25645816fca2c25dcd7de73f7ad277994105d35b5be40adedd5a22b560970c73ae6
SHA512e10e4f716e736865c5a9dd2a2f29ba4f27ac20eaa81d68bf3c48ecd0f7c31599f0174a2da7531c4a505c60a8ac5e02e5bd9f57515056fc2da4d750dfe136160c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b4c87064c8b87b210a2a49cf65ab8c2
SHA131510a121036a9c405cb3667f1a7cec59f00f88a
SHA2560755e1ff547401513193d28a442a2eaa30a2a9a8453e0ca20f6b88cb4f5de4f6
SHA512ee7f17dc93ded8fe8fee80cc7a33333ace7abf8aef7bf61f1b5a7439f4e3e42cdb9001cdf33938decd09a972e4f22c80f018e6fc581152105feb23518e0748ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af593357bc8dd72f8bc8cec3efa8151c
SHA12258dd850fb1c054e595a218909a19651dda2fb4
SHA256de36f80538b15b6cf46f06c7709ec2605e897d324f82991105b3510b4c293d35
SHA512c02e1c2c2087eaf37d857701119f3d42ad00e0db4dcc7f0e736c976cf42c5d172ce038dc895c101c8b663f85776b31fcebe10cf8173d7a00794b82e7eac9fd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e7b86d1a30991a837300259f49ee3b5
SHA1976febc6fd43a2d19d917906f3d6581a0a0cb012
SHA2563cc9592751a7eccc7f3491c0b3deb51384b4b3f691f6c0aa17d0f650404b7440
SHA51268041e200f487472be893709902b7ba6b9b3ec0e251b15c69b809daddd262451426fe159af68cd4b0036a89cc669412494fed7a4b05d2bc951ba77123624de7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b98e42c3f66054250985f3c0fefd93e
SHA19ca33d08466e97581cc4b72d1b39f8486a96fc6b
SHA256f1cd6bc9429f4c31d93b1845c3bb0d23237e93fc09413a0e3c327c93807d6be4
SHA512db8e5af89f99e4a9c1c026f66cbe4f993cf70e7632affc8b8dd77f8dc47ad95d828693ec1a7f36b981c451306e9348cdb3707914422f9d72207c960af6e6fa79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5893dd91222ff12dcb17ea8e1ac0ad1d8
SHA18cceb13754e0eac44a38887a0c6ac60084bcf33d
SHA256bd4e37a5708d398d2229dde3e9cb896c99c9ab0bb5e1fade52416531830b2600
SHA51201746fb593166fec209f5b0eb265feaa611d5f40cd9f1a0d5925f4cd48fe24b95a27a8d23ebb8d09405253dad39c722d56e44fb3309f2b646c84450ce0c0aec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d46488c8212c71b2da2eb815227d69d
SHA11082ef28a766cb8850b4a7ed65ef0e0f24925cf4
SHA256594d9cf63f595d5892398392cf2a67ce90851cebc56989ee877d62068d121f9e
SHA512ff7918e170d86effd2915c9fb44058dab84f3d364bcd1c3ee9102c8a72cf208ca1f0bbb2395fe0c6062c5411e95c3523ca04ca5888c241a2ce3c916122939699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ebee4a6e513d0e34114b482e1afedefa
SHA1a7fa60a96acae6f9caa71d9be964f153dfa8fbfd
SHA2560a1df78751fa24d935ce4081fc440673f584133d5b7a78dbf23fe8d2fe3e437b
SHA51268c54445fe39ace22e6854cfdd172e8c4540f70fa2ed85781143b42ea8c3cb7be0ca381c76af7a97589486031f496b9d07cec8b83a6d7e961d94aeaa6ab8fc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551b45b351b5fc4a3072d1d98c5080834
SHA1adb163ee047e58c298df5a99e2605de990317331
SHA256548e2fc4f51c73f8135f1409c06c66839aaa826b80334abe79412e7fbd005e41
SHA512d1e89dc0c1dc5f277f517c02b487d01a33970a238ddf6414f614e4564cdb41a8d1d7b1bdce27712464e03468d0572293d518b07d20de226abebb7a9b286a8285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df6cdae3ef6fef6e622e6df62f84ed5e
SHA1987ab8b7b4e85e6afafca5be49df6ca0901e42d0
SHA2569e190f3d8c689f1947bfd05a773226e52828da7dec0acfc083667cf4e4e7d8d6
SHA512183aed8bd58c46e2c837e8225a9441c0ed9ef66aed29f89070f44b8ec778d05b7d92962a045797a720e48858c7a5b9cb1565c0498463aae6c8e95141d41a727e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb6450bfc603210b4dae3e8ec9a4e8be
SHA1d865f41884644167dcd6417d110d0194a909efbc
SHA2565ee4c229f1082e342843fa5e70710cf80dd094e8a4ad7834e08826e2137fb5bf
SHA512160d57d5f0ab9ad0dcae50f2c20f7abe7580fa6bd9537deea2488eb6e13994062fe01062543f36bb676e094c3dc8aeacabb6da50617362d6455f04f40e32d86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e213d52781b71002cf5bef64e54f94ad
SHA11c174fcfe564728a0b7e6fb86af180bed4de85d4
SHA256e2f2ab7f914aa2df79d3e0d3bc24f38c2a2260b180684d952801e5c6caa3c51c
SHA512a886dc6fa04b69c66c5af7e9081c387224005c44f43cec91aa4ef215367e9a51ad2d414004716510fcd6c256e6480dd3a79e38bdbf484317e374d7e15a66ad33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab47e40dab8e45bec46af3def1131e55
SHA18b01b0140b079b253e9ef7e7c768f9dabe255a21
SHA256a051ccd1f0b764c55dc1a3d773c025be01d4cf099256a0fb39c3b2c7ff061f03
SHA512a1433de24b8da153c18ef14d71579bdfab3118f530787abd3f106dab442998aca609a2976e3206bfc819094a5c36a608aa6a72db6895f697c0420ddd70c3ce11
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\content-slider[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a