Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
2f952565215750e3e899e92d71b25141_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2f952565215750e3e899e92d71b25141_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2f952565215750e3e899e92d71b25141_JaffaCakes118.html
-
Size
68KB
-
MD5
2f952565215750e3e899e92d71b25141
-
SHA1
ef396850e510e58e067233230387644dcc4ae38e
-
SHA256
7292ced613ac449de21b02c981d1dc35796a2622c9a9cb906faaca84324b5606
-
SHA512
fa3a746b52f1e19f873efc1cfc882d8954c82257adee2b3a9bd2ceb8f91408d4edff7c39a9941f14c7544f272c175e5131ad8357e68e4170d5761088604bed98
-
SSDEEP
768:JiPgcMiR3sI2PDDnX0g6FmHBMDoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:JjFBMcTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2F401F1-0ED9-11EF-9BF1-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001d114560f97fdbffca2abb7e06add3a663ec3ebf65ea0579abaf22dc5d93838f000000000e800000000200002000000082d574fe1722f39189de56fbcbf542a7f1ad521902364ce2c8b6889b115ed24320000000ff57f578b5588c89e41fa6356ffe374eca390b86854855d6b2e7579b1229b7dd400000000660e461dc74a8070ceb7f140f305222da3caa7ff2c11ecec3f8ed6cc395a06457cdd44a9d7cfc8cd9b271320da2e317be1d6bfe886b08fd1c3caffcd7b9983b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06eae97e6a2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421513259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 492 iexplore.exe 492 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 492 wrote to memory of 2140 492 iexplore.exe 29 PID 492 wrote to memory of 2140 492 iexplore.exe 29 PID 492 wrote to memory of 2140 492 iexplore.exe 29 PID 492 wrote to memory of 2140 492 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f952565215750e3e899e92d71b25141_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56928fc97238d8841bbefb69e5b9a7aac
SHA165437b09209784867e0a12f7599c70030352ce89
SHA256b5496aa5001d748e6bb06f2e84a091461f66aa92a4f030f22323b4e9e7ef2761
SHA512450d4f0a0a5b4290c265c5cdd5744cccbe882b9a59213f5cb6a863ddf0b071924b52f81beaeb5f8724d029bf0aee99751451bcc3fb697608a414473681364c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e502169b7b691333ddbeb9d55f663054
SHA11959a8e3b8aa820c833291ff56bb481eefbd4720
SHA256835f938b1d3790174d88802e1168f22b3fdc716538d03d4ff2b91ddb9fdd6d73
SHA5122c05529c2f635725d4dca28c1e756c7fb69a1336285377d8e055e59b6f68016899773f4ea68fdd16d3f3fbbe3c723eb8b6cfd50dc04ce2c22d8be2023d69ade6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd013aaf23e8e552e3683b3b2e2f2a56
SHA136185c659859c9805634e8d8bf2aa4cea7304965
SHA256e7428fec930afdfe74d32c862f33f4400387405acf6bb41ea699e8f0795258f5
SHA5126872026b6484bf74cb8157804ed4ff38258be316e052a83d3c2cd30465512468c48d9111e1d70607cb0574820c41ef57aa9c6470d63108dc8709697cb552c4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52170b169fd0d7ea9c892850041b3fcc6
SHA15b3f2ba56d7fd180eb90a53a9a4a435b5ee4a30c
SHA256b2c6fae2f936fe0041532d0c1007885ac758ea19b505b3189814f08f67ac1904
SHA512f6a0f452765da3a051e991b9d54829f7164b3f201aaa9fa761da52b175fc52648ca4630ca8a99be0a8867ee9ec88d7ca43ae51773844a61c3ad8a781a4175fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd1a1acaf2a825dc144064088912ecf1
SHA12087e2a9f4a7adab581183fb1fac6540f1215951
SHA256899499e947644e3ae038717caff68e60c5732c5eeeb8ecefc5c2ef1902e9f2d1
SHA5123b85ec462cb3c12ecd97f85ceda798062745cbd072caafd26bf5ebea24524c9fe77fd6b4be6611fc80304f9cdb7ef0e02a215f9aeddf25113d3363abfee6c50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a24d24d3bea8caf7ec8a3b86f6d84fc
SHA1adf18601ffb4b9c956ae359b83f1720ea40f1815
SHA256d7df6e453fa2cd8ef9d5b028e82709a960254329b0ff38d343f5d107a168fcd8
SHA512b6140797a8ed9cb473e326d07650cafc107b7feaada54c0cc546fd5a17c10432d8a8234ed7b9ed4647f4069f8e8dce5a156beb11c8353bf37ab14effacb8c9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f5e2aff455d15ac04801fb61ae1cc8c
SHA189627b2960483801bd8da0a2e015852def1ea2d0
SHA256c2eb8fb51392dc8e6d23f302461901760cde83f31983faa2db9798f08d1e9781
SHA512b6e6479f0786f276f0a357bfd1f80b76cc3c2a6975c543bea33709abb500a50b232683e9d2c5234c7794eaca64d275c629a4aba6ef7e183cc83986dc6bdee13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42e7455fc965a92f5698e30cb0043b4
SHA1264c63b0c54ae5d1798f50ece2a273bff5e6efc4
SHA2566da975cbf80b19f29b29c909f56b5785e9fddbcb99d7bf4cde2ae07be0541c2e
SHA51277e10db4257acd326ce4e023ecdeeb43ca5f14392b2a2dc9d0a1a9ce82114d2b1ada7b7852a4155c6dedb36e8ed05aa6fde344a1b3043cfc0d4aaa11e9ec3395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fd674086f6b31d841585cc1ff0316fe
SHA1c176f6808d348573f2a61904e43ebc8838217af0
SHA256638f64850f3b01688e96f1c127d442d3bca730387a49317d121cf84030195fd1
SHA512dbbb96edf43fb4b6d3d8dcf8356715cc1430984755ad7c7ce9db2b905b29681c3252c5e1f2e9c8da0f6724b7ab63eae63de2a9d3011fd34939db09246bcc997b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb1ed771377c41c4dac6ff46ce442ca
SHA16df886103b6dce1847b605e086230d4587d99eab
SHA256ded28dbda47100dfb47d3bf478fa0cdde2c37914fce31233a83d03f79e7336d7
SHA5127b2b9e9fc475722a6ab3ef1e9439f009b045f4bde56d044f620bf0e34b63bea6062cffec0eff7d651ccc9577f8786d647fcb0e24b8e2a747dc68ffb27ea93c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584ef4f37fa3af632f68aaf0b41df2dba
SHA136564c61a50022ff88a387aaddbd2678a7eb0e6d
SHA2561deb8941d692b3b4316565737e156b569d6ced6fa7b989f9b6d58bd9ce38cb1d
SHA5122dc6d0a3a986a4d20b2094ccea6e83537b44ce6ec78f50affa1a7606eda4a1d64c05a6eeff2a09ce5894238388b0e1ce0ee64fdd6fc52aee9ae2d41c8b09104b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d0c76b528aaa1c9da60d7356be5604
SHA1d6fa482827f23ce73e125995d7fc043d9583ac68
SHA2563fc623681c0dadfd451708e9cf1a08642cb95d6148f82ec28bf680f292d88cb4
SHA512db6274450307aacfd5c9843762e4b201b56e7cbaf2fbacb0be5b72fc49f6f4adbcfae8b5b0b6dc3774b7185181e04b7c870c519cad6094690e26c55662604dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d13161e031288751215383e6871a308
SHA1bb9067e5cd9019be8a63f42ad8e6ce69bfa31204
SHA25604b0162e0035e2c7ed81e74d706b6f45b9e7ef4ea8df3b77daa841822f5588a6
SHA512ad06c22b15629b115368afe2ea382b413da9b0ade7bd3d632c64ffa1251503ed471e8b5e25992739dcd3ec78d5a97c037a2b12c2321f9de7ff2c297a194b0223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5456d5e86791844c5840fa27cf296aed5
SHA1b323dc733bfdb57cebe2f548440f9f32fcdb4b14
SHA25619c923fd7b0b44900666812475953c73f033faa175659b5583e5530fc094a537
SHA51217b319e4dc97e648b732bf839b75e5aad5c0d38de987d42028552377f650564b9c54753a268cb0c300379efa422a3e8e175971e969582f9e55c7ea9e13d5f9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b527de9df660d6d63b1c54c6da0fe55
SHA17c82cb997eeb7fcfdff6102c82cca1770c058767
SHA256b2a3ef92af49aee53348d18cf162ce148c91d58871488fe7347794459af4d944
SHA512b180d676b464a66118a28309469f9bb2cc31d7541bcdaacafeb1900d932390a59030194c5811562aa7f814feaea17d0da2a5c7f268213f896b7938587fa674e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d7c44ede56ba146091546a2716ff67
SHA1d8411113a2499c2b2a3c6154ea1b9deebe153b88
SHA2564bdba3db2cb71f9d074d4459e968e2b6f766900ddb37d1e5b66aa8bfa8255ec0
SHA51225371d4f5aae51ff63020c9f2aad7fe58c34964b4c4c12ec8c69b158c559f6f06758bb50a4c39e7c4fb5131fd014b36f1e38994179c62e10884f073a37227d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cf2bbd7f5794e8ebc3f341032a5ce62
SHA170c4f3d0f32031598135a320c091c7d6feef493a
SHA256e0aac1a2a07a643c1724f8c4796bfac2308c772179a29d42d2fad9afc06c6ff1
SHA512ab2a8f2304b80a6755b633d189f781c7e8a10ed630cf69316cdf974d43f4169c878df5a01a0a596d2814e4fc819b6af107061e685c7a26a7d489e532f8269047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24ec5a3e89fe55b04d13523cc899d6b
SHA1671466688320739e4c3cba14f407fe3c5fa49a26
SHA256cb829f533d5fa21934b54e13871c3dd0f97b88c84f685f678a7cd672b77c2e63
SHA5124d28ec6caefefa0534b420abf95762f54f3d3ea6eeb02de25297bc22b6a341e4b50477fc77706b2c6531c60107e0f5f706fbf6ee0b92c1ac99e20a40b760ba0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574cf17431fd05742d28a1327273c98f4
SHA1859f019b9b393ab2b585b6fe45c801a760e0b0a8
SHA25613c8855e6cb638b953d3ef36cb6d206bff2d4f8ee14a474b48af91c93eb090ee
SHA512f71f99b7c3815f8c351d6b0c504b9c33a2b9ffd9b2b148c8f76cacbdea43e437310b4524054bfc7348a5e0b5361fceed527a470edb22523bd11e824d6982441a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c0b646ad3b4219793438c5666af67d
SHA1ae570bb02c9b4bf4a73c9cc7d9305ed87f9d03ed
SHA2564e8448ed2862a8bb25210d7990de073dd9bf0f6d35822daa9ab1d75297ece1a8
SHA51243cd407fa30ef2c027d63fc46c9b5a2e00b848b5c05b47a813cad6c35dced3fa80917ed5890785e876cd31abd9aa69cc41b2d1cbd4ebbecf6fc8839ae7e3b746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5747bb6c953982bbcd3b2b9424c011ef0
SHA11e3e40ad9588386b3870ac802e37edd82c433827
SHA256eb07723e0c06e874070ca0391260d52e999d73cbeccd76c784a5d7eef30e72cf
SHA5121a1786880d6512351918bd106b1d025548a01b75dab48b866925314aeebee4f4adeeefbf837a4abab9cdf2976ee910ea49892a4b6898804a604e6a79c7f772c2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a