Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
40afeeec3e29e288490a1219eb625602_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
40afeeec3e29e288490a1219eb625602_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40afeeec3e29e288490a1219eb625602_JaffaCakes118.html
-
Size
158KB
-
MD5
40afeeec3e29e288490a1219eb625602
-
SHA1
45bfe1ee73c05296f0051468c865e1f7ed6dd379
-
SHA256
e0373844916c99159937c822365d1c96a68cd638b23d92e82a87b6f02cfc4d18
-
SHA512
b9d26d6b50aaefa310a2d7091dcb0f0ba0ee4ab338c0479c5851b3ceb23c0810c7202d17c1e014c1ac160e4f5442a880fa4a6c72fbbd5d7d738821226c8e9035
-
SSDEEP
1536:tm3JsDs5BTkNGvlw5nUiSB6syiUC+zcOMEW+f1QQREDqqQpHljxH4PMBx+1TMJd4:i4s3UUl/MQ0tDvBX+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421833680" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCC2AD21-11C3-11EF-99B2-4A4123AE786E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b4cea1d0a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000880c4f3f3a1dfc15e778d2535422b912633a0f1a351fb45e63a412f832ea0a8b000000000e800000000200002000000012e8c4d7305dc7b9260733956e87b95c850c66bf0cb82f0cb2f6df5598818fc820000000ae7ff790f634d5ca88ae79be1d890aeba701164bf8d4f9dcbbf6f505aa91561a40000000082fd5bc40ef5d921c3865df0dd2b8a90b0eb06ef0b22e20fc98e60a78842d1900e7e652f6b5bf4fa8697e78d00abe29df90eb7ba3af9ab612bba2722e05113f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1276 2392 iexplore.exe 28 PID 2392 wrote to memory of 1276 2392 iexplore.exe 28 PID 2392 wrote to memory of 1276 2392 iexplore.exe 28 PID 2392 wrote to memory of 1276 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40afeeec3e29e288490a1219eb625602_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d64600c714cd369417dcd017c9457f
SHA1bff94abde2c7862994d180d9e2df22d2a3d2cc1f
SHA25694cbabed5056e11bffa9ab284e0f3a14f1564fec500234fbecbdd5bfa58aaa0b
SHA512d491ae753d2f9a2cf20e482542c5ad23aaa53badb213e5c01264ca271a32e260485d1a119f1225594f2ee122886af3b2b011fc093975aef4403390912b3161db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c930b23fe6f459384da5b49643a5afc
SHA1774e872e67a3d3e26ad950c9cc3354118f4f57dc
SHA256fbadb9e7c58c2ea112f42923c528348d9e2e165e1b39baf4d8a014a34ad23365
SHA512e867d2f16a9487a995c85e7cba561b18f4180b82fc6c1e17cefd1bb20310db7a0505e69af58e042b3af88e4d6c8e6bb4fd309fa2466a04c89517081dd9b14728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c850d9763568ff90ff0a5250b0be808
SHA19778cd93231ec337f609ad60e11b9fb92edf4db9
SHA2569e8d3e26644740928a476be6e3f9fc2b92581fa0d7325e6bdadecaad7bbdae47
SHA512250b95836a0a6f43b1a7a8fb6a0400b9f034b9d97f2cb0b556386d86e6906c80c81999d42613e1a7d44a23a8dd8c2a062b864bf30cf766582695afc908f5127f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9712a5eedc74825cf6045ca46a0531
SHA1800f5452693e8d243b58f310d4f47830434b0773
SHA25614738d3df4c55a76627939d37e0b1bcb897984b41e1356957100ccc4c418d975
SHA51207d5f8098ad0932c241ec1871a6bf42ae7469880e220073ea589cbf449a070577275daf0c405a1eb998e440035c492c96f474a5ca729b04ab4f955d90f285b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d058b2277ed4013156e0fc0320b76cf5
SHA188ad072ddd5e92e2129b465d171072ff8a577e26
SHA256eb4cbda731237b89207700c5d805d86af1dc322eb32cfb9242eb322587bf45ba
SHA512e51ef560d8ea421f2185c2c7aef6b6daed1a760dd9094beb34347cb0d9c5b9974d2a036758ad089aeecc1f0bd6ec6cc9bc75dc82427e26159e6a6325b154e6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d1d21d35c3af2dd2c52417e1e6f88dc
SHA1bca5cc5ccad53e34a629dda32ee4a15923bf0aea
SHA256ae69e359d6f89e5c060f594ba27ca855f9474a57c3f107112b5a773e8b9898b4
SHA5120520608501fa25ae0325c24c7fc2ad31a03cf353673928ddbeb2c0fd459eb39c8bc55ad27c96257779fb3fb2effdd1c936b0aa780330d0a09f43f34cf3c40399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325afc10eb980e08315cf26429de97d4
SHA1f9c164d45f9cfb1448c431957670fa75a637a836
SHA2564cf2009d9df0ba442974371519151883d1eb2c08cb20f538a593e4774487d167
SHA51290b2d2bf466199256c84f8c85286c2ff832735746cf107351fa413a85b9772db6618d651737a06fa8db0b96d2af02233790b245a8cb4862a196c88821dfc5205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b3f36da9834fd6a15f5fc5a2071e8e3
SHA1b21cf33fc84de6c62580ade24126301778f6b219
SHA2561a0a0b85c3a88863b209c696ad763f6becd1d31fc2250cb769b88a59f9a4df10
SHA5129525fbd90961c830c24ec614fb6266be832ad69cbab868db236059dee18b4e21aa541cb0dd78851c3b900bd1f83904b817c6390e40d3cdb9a0788b4192a7a48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a254e30744ad70ccbc7d5cb770b89e46
SHA160c69b1a3a1c9df4ab20bc05fb4f90d3f469dfcf
SHA2565562dde6a2641fa7de5f3d2ab5cce47aae696637146fade0769e862b8bdda66c
SHA512d3d4e7d784196e2edfd0ac3adf95d6f56067f011963d7388ddd0bc5ac86d15bafa321e783995a3a257b0bc82cd9870b45b08c18769e2afcdaad1d27c421d631d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bd061671dd2c569f686602f549d24b4
SHA17beaa9f08b42b8e17af877f37dbac6f65212637a
SHA25670808cbd249bde5176798ee60cae3456d96dde38e59680f22d35c5ea7aee20aa
SHA5127a8267e6d95cee5d4927811a4d2a5cd1d90634cb1df862e002b44fc2bc0767f0ed5d00ace03a0f759028540d0ec20471f89604133dd13da1535e62fd1aaeac0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885dfea1b9980b9556b065242cd7ea2f
SHA1d46aecd2dfd2b14759b20bbb07588aba5ea79fdd
SHA2567cacbf44ea49652d9827ff0f04f8be372247a659d67398394e9a90419eae6a55
SHA512217ce4c2e5d152414862b875e46a8202b5dda47d2a7512a8616a69c49fc03853cb97ec58c4e153adf4ba253d0685e4e0ae2855b1c0318d9046b58e140da436cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ebdbe439c603c8f47703cb5ad6e5cd
SHA1dfa16bde4d4e6e1d9862152c3b5e26c41b88226a
SHA2569f8e7f118540a084a0a46d51be44ecd1445b4c2f758c18da3f11a22d7f66224d
SHA512674e7fdf13caf73ce58bc78f4596b47e024115697ac11e0843e10275b23404af2173616fae162228d63d9d026183424e7a3d95f916bd5c2f4de9ee591b7a62b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b153a8b3de6799c2df5711c390cd6f20
SHA1cb78fbf7ad7ed40f9091db6b43caacf1a685d63b
SHA256992c12a0a92e9ebd14d8ec6692b61c6a73b7c06addb3ae93522592de9f032f7e
SHA512c6f42d69ac819a7b863cd2a0c0c185cd8ab9e27f70fefcb173004f19542197c80035521b19aecf0dea2ae710b8ff0086c96a78c175dc5cb84e019d82b8eeb764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8741e402c181fce2494e394eea8b535
SHA116d5ca4cc6d4275897f3d77bf5d00151c72d211e
SHA256159addabad77a769d3cce95312de0d78f8f2bd25f771f4658890b344821d2cdd
SHA51291a34e13a56248d70fbc3fc5f3d04cfd50307e1994cc5ce444f218bc25cbf356337cbe08fef96dfc617533d3475fce835b6cd1f83941e0fcc0838f2063027a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57216a3c3a3f04fc378c555c63c20baac
SHA173d46d9984bea15ead4c096147be5d1dc124c697
SHA2563284621044e6f195161bf1b7bf4f1c65caa6f91f11558c2afbe834c2e85a3be1
SHA512dffdc2c5f71a5468433439cb53261c41848ce019c3a83a56f2b7b80ba62fad7fd881d8bec17e1c5f0ea1ab60b7b0efa65aef75c5707a74ae04140d7f09c4b823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e60bdb098726e5de3f1fbcfc47a805
SHA1e1e814b491a7a10b8369052c0a8c516232a8f178
SHA2564a799221ac20221e2f66b58511fe1eca14f4ba23f92e421744fbab6b3fe9bde3
SHA512dbed55420fd646ee838431e880cdfd193a4aabe05c3f40be72dcf71119d894dae1b3240d4d9ef0d96b7961fb1cfee058ea8a9e3980f53208709199c2d744bd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c4c49ef071ae7caeb5423136e7c239
SHA16c05485d5844b3354101a35776a18566601e8b5e
SHA2560b66825076a518377d61f74f941274f880bbd3ba73170421ddd24695422cccaf
SHA5125ddcb4b64c5e820ad43e210a9669c9bb37c71d65482292af5963da3111a90e4df6ec29acb9a99a9ba72e6dfed3c93a5eb6eef95c60502f9c42a2c96f754ba380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3730886734e46b62bc6adbe3e7ca610
SHA1647d0d6da8e6f4d8b5e767ac441d885543271407
SHA25695aec4c483588f8f2d1ac4b697691ee08f9b7e93d9cd5108337488a6ec4c9f4c
SHA51278f022fa3984694628e53cb11d0d91462030adadf12dc988adaaff2bdf26e4280896c22d084308f3e27e7abb82a63891c2c37fff907ae143c481825a85f2ff16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b92bfdeb7a9eec5b946300d364fccac
SHA1de73065ce24f0c87b3bcf81aacfcb3add420263c
SHA25691557beb2e30c74f3a071f4ce7c62608990e956c03f728119258c2fcc6ef0ef3
SHA512b12993262dcf184a1e156f93905b1b4d3ccb0b7741f7a5baf4229538be25304282488b40addc1cdcb3af9a34da30c481c41f531f009b8b45c2d180f66bcc9c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db634d15fce17d2643e1ffb7fd625a2e
SHA16f4fc7dc5d86ec7c4ac77f4b76d5b13c89effc6c
SHA25628504e1009076d660f0b7e722a22b67f369cc5239ef12ba352e8fbd17d55f380
SHA512ad2cf610eddd0a914beccddf6fd413301ae72bc4077c006e297e30b43862617b88bd1dfa02d0f4891bbafe332282cd1ec38812329e72de1d83dfda2d2ce06b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514b4e6e60b4bfb496f6360676643f234
SHA1e9d76705cf14b5ed3fcd3c6fe16c19ab3ea3c69d
SHA256f89dbd817745e17fb92e0b16242d819964f1d9e4e63d22884a997e0883f18df8
SHA512ce16672b8ec3083da643a1a7a72c8d91629067defcb1199c75913e08b6598e04b610941df3c188a0170999e9db2f4aa58ef2f9cd1a5af3d8a341ef74f31b8761
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a