Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
0a4db1243ddf5452468c0b75f2a4f4d6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a4db1243ddf5452468c0b75f2a4f4d6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0a4db1243ddf5452468c0b75f2a4f4d6_JaffaCakes118.html
-
Size
25KB
-
MD5
0a4db1243ddf5452468c0b75f2a4f4d6
-
SHA1
e71282e7657a05c1fb6739dd642e899be11efeb0
-
SHA256
72f640a8bee9486c08e89d7ceaa466ace8c65baeb22b5198cf16f9a4ad29b7c1
-
SHA512
36eebea7811a1bf881376bbb0aa808cc3c3ef9da699b90a078da8f93262945792a0a73ecf52d101d429387aed9b99caeb9e335daba27e7d0057a867b844e4657
-
SSDEEP
768:xXqDaKEfR0svV2CAIDAEKQRT91aRdRFR5mstBJCXCHCDC8OMLk+WpDLsRUSUgj5r:xXqDa/fR0svV2CAIDAEKQRT91aRdRFRg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c215882a9bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2AC21B1-071D-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420662828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000538bf5f0eced2303d30ba6cd922381613c8d6d236037c91d9d53f3ea67f619a7000000000e8000000002000020000000c1c79700ad348f28d845b911a5ec5391b83b5d86d12132e5d64c2c8c88d5abc820000000a5b3d8be23c18c1f9851feea4a2a4dd4ee29b4d14b3dc900d6a4c8e6e3919dc740000000cdfe610f115a712629af9df54e9d0bda9f61e36a6964525df26934f65695665d865b61e4e55faf4ed7faa0ff7aa8780963ed60296eeeac9e9202138f930f32d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2080 2868 iexplore.exe 28 PID 2868 wrote to memory of 2080 2868 iexplore.exe 28 PID 2868 wrote to memory of 2080 2868 iexplore.exe 28 PID 2868 wrote to memory of 2080 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a4db1243ddf5452468c0b75f2a4f4d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59127cadca1d9b8f428e4455d7bcf99be
SHA18bdb0eb47e50c6e68c997217e896bf1cb65a07c9
SHA256e7c3cb393fd00a7d8da4c35c1c17d6f86fda8adba530e2d54d16873998d13d37
SHA512617a2458c0d6bfddc100f5543dc11dfc03d4ee04d6b555f8afb4a92d1fb55d1c95cb9a80898a304e245921522e68d5f8a71ba07bb6bc0d9ef22455150644accf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f4467aa1630db89c99be3ac67bd7ab3
SHA197122c57e7958df34834d32f949f52923ac06f54
SHA2567274da2f1e6446c98f90a35b17d31c348b821c511e1d1a185d5f05bbd04eb0ac
SHA51241f323c1410c4c886d1f747e888299c06ae96764c8cca0fa7d0f324f1bce67de4d0355b988250746646e4969487c931ec0800211c6bc1aff4136fae5a4d78315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58f3bfb4302697b89a8136e7df7340d
SHA180202c32b603c813c30568efddef5899f2f72921
SHA2569ff64654b86e826146b28405dcc36e54d92c7c416bfa6d34cf8b98aa586862d4
SHA51272063de5506352d770a3a469fc81987d977f0701b4aeb075b5fbcbaedda82beefabf5af48fb61674775568e05e4a8aee3e53f049bb1523662579bcce3dc29304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82f79a213270cc34e1074182778d0c2
SHA132e3cd34de66c6fe3fa5524e13510a2905cc5c7f
SHA2568744110a9331bbc8e10cb5ce7f7178c3fae8a40a2c4731f39a66d75b7bb332dc
SHA512c5e1833b7dca8a0ebc6e7e8f3c158466306f2b9ba5a2beee0350bce69fae17316b9116795ae53f3e68479f4073a7bba6f9274b74006ee5d9c665c60eed88bbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e861c8f3929fa84b9f903e113ece8d79
SHA1657c4c06b5ead76644f3fecdf25e62009cddae41
SHA256be72c8b71a3f46ab3489e22d2fe9f04b3590d61691d9d73f648d8f43eadec858
SHA512f3a759bbcbba37cd8e73c593fc2fbf7ad58e10e14a7acccf9b4c6e5b752c0326a34e5d971a72a291afe07a01d459d28cb3e354b35dceccaa8cb08badd07e222c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556f3204be5321a755a345942f1b2773c
SHA17ed76f04da4aa8b1065ecbe7793c1f783d4ce031
SHA256a8e03add26f934df435ed9af6562340b18ca52789fd899e1de58bee0e810d264
SHA512c39d3a34e1e1dd79f417e8abd94dde6accd7e4cde7f59c53cbde4c0ef7d89c8f37156212d74363c7881feb61d7573a378623ddc6b4c29710ae3d0293beb423d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b62ebde9488620087e3ea37200257f0
SHA124f743c899a3999caf3436ca7fe853ee97fa4362
SHA2566184172b9d7c6c7590b2e7477cc41d56105c8a9ee729e6aa537eef10f42f00de
SHA512b24c13b34c65ada55b2c6d1b3955406a0f055f470530e0a3b4efc8a423a803f41c3d95584ed339b02c4aad89669400d1852984cb1d7604288ad2aeeeab4f239d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac1e4e0b101ba4de89f142c90a24fd9
SHA1ba89b1e312bbd3a922704c54439961b05e723815
SHA256b10785d27d56e7e0a16889ade86f474a9b8688cee9cc4c4963a587a77a6403d4
SHA5127d91f99f7dc93b8b69e1b45f63742f97cbde317ab05bcb20f6e9c8d5dbb6536f2cea1b88d19e14428c067357f9f5a7b9ecd63f8f51c378fadc6575b3efd0dfaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962546c80c49fdfc797717d8f85daf50
SHA1f517c2672dd824a6647c082c5a21d26f23154096
SHA256b82193965f1e1c9a35c0de1f64824d66655064f67d46ef63f67d38e968798ff8
SHA51251a6030de0305c7392e78183bbebe08fb030652675096078bad420235548a33282f4b7aebb9b72199dbc25c519df7d12cd22234ff565739e220bca709451a409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d91c03972edc4a6c521769a050a1642
SHA1fb13bb60dbf777875079dcc4b98b8eb210ee4c83
SHA25692895c6b1dbe0cdd1f5cc382b6420327d8d7c870a00fa4552ce274ff5af454b1
SHA512fca5b4dc74220c8d7707ad37129fd951e6469d1a943693f7f6f088df0379386122cba7808bff068591e19a7ce26dd0a3a79b48f496003dd737638131f9198a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8451d8faea13f449efe705f5aa22ae8
SHA158c75ac9f8194b2004d53bf4a46f35915966ecec
SHA256359c1a45a77949ac17b6b406744013751eae9fead434945bde0313b89270821c
SHA51288449052d0e5193622d4e9cd8626a67b66c9af88cba2c650427cb21c9b2a31f36f6ca911078ce15b6ef1239544b88cb8924b908a0750609bd3d56403215ad282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba50ae9a673df5ef611dcaef85913001
SHA1dc653e986dba384ee1bca8494e852f5067c6d7cf
SHA256b9c240ac2b0c8d69c391dfc516c397d0ff820a6135dfc93fe27e3adabcc0eacc
SHA512eeff6750e87a86263b410b2a9fc7f6e787d072182a413a65ea4d0c83ad61041bf756bfaeb4549182844053e05c4b9fbaa234a177b0afa81c5da136aabd3c9e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53257449880e177db54109892c42a89
SHA167d678c50299a938afff36f2f62fbbd5d26a5722
SHA256700c1b9dd43fc3177764161a5c0437c8620d78ee7ab941387fd38b0ad8a6226b
SHA5123c940626e6ccaf59d2170c5f9f35227d8f1be4e0466261976f3de88a7a7dfd50fc6df16c1ef848965f18ed6d017215dc075baeb07f3bb00a358d86b5b68ad3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9efeeed5a250894ad7a3a7e22c6dc1
SHA1f47a0534abd90a2594f94b5846a551d0db33de18
SHA25606ff1be5b622d88e1cc6e56da01e97ceb4837eea64e0fe5ed675fdd072042c73
SHA51264917e3c39bff02ed44ec5cc7850a37d9ca288ca0f2aaec623c3a6f43edada556ca2a5bfa286a5d99a9a3e357fbbb405921cd2975d3e5a4d55eae5c1eeed9e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9901f92e5428497db56b17cec2268db
SHA13a925e2bc0dd7b2263adc1088effa4f8f53fe2a0
SHA256935d7145dfd7c32a3025b1daee98785514f37f3adf3b1e0f618853c2b406a862
SHA5127988d483f2daa697fbaa9fc13a9b9f84fbf38782a181612ca8cc05eb1d79620bcf0d2d6ba7befe8f7745ce88fc9ea634085acd533eae289c0510cb8cfedb25da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4714d5c356b28ce0c405ec9855a1b5a
SHA16b41f6eb0d9b2d0ea00ac08d377e2313945dd468
SHA25640d7cb6a23c685644cde940eba93c0e89f8cbb3806e20f0f6e19d67bc0729415
SHA5124593531a8477c52d0b9407d694bae01c33c39dd54bdc4a6034a7b85033ff4304b2b98d5e60713e8f8259ce0bb5c333494f26290eb2cf9705647a565e398b31c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64ae37bdb24f4962864be7c396db79b
SHA145647d066074b6a874be784246b72d5a68cb1081
SHA256e05d8f555bb0df6ec53afef8d04603c087d0e55e489c4b68439e5a1421fee008
SHA5123e9b66fbebfe2c9828edeee443d839441af859f1bba63212bbfd64bcdb7d9d4b63ff63cc3ba67a17c2358bf6ca6b910d6aceb0cdb525db81434dea317507681c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509843d1a2cbdf91743501e1696f5c630
SHA1e90a2cc2484481fffebd4b23b95cd16e6a972e54
SHA256e0f393f1e6673c613e6e727162fd4bf222cb16da901e53080de9fd8a190eb580
SHA5129accd3dfd3e9c21c083e19a5496dbc38ec13b8729d2b8b1b676f14cdab06df17746dcd38716ff0fba6b59f0f68b63015be0d0a7310ae6867c479627f72b6c317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51959147b0d71b16de2147933da196a83
SHA151baa6bc376ba88fc6f15b86663bbd3949237359
SHA256cfc3394e5209e1928f96fb5c1bfb0e4841b3e2cfb5bcede04464e49a7e260aad
SHA5126c186327078b85111d8ba143d035af4928ff65b7dc38ecb80f2a4fede91a89a78044d55971dfb3ed589b4b21ac6b5e88ef206e0be7624c2a3b337ae4e418464b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caa2ea8ecacdadae6e214da471cdbe21
SHA1adae1a86c92c70ddad756b966313dba5665cec55
SHA2568c2947d95e22e9d7734fceb1146fd9f81728722cbd6568395e486d612e9db3d4
SHA512fc3b275d855be2cf6773f847bd5f2522139e4e6bf33214464361e75ef54ea4ba96e784d00cda36b8489902feaddf4608ad5ff58b5060be0641d6da1780fdbef9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a