Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
6231178fe31cf487a740088a46f4562f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6231178fe31cf487a740088a46f4562f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6231178fe31cf487a740088a46f4562f_JaffaCakes118.html
-
Size
3KB
-
MD5
6231178fe31cf487a740088a46f4562f
-
SHA1
30998aa3022276db319a0047f59e97007ce4b63a
-
SHA256
b5195663ef875dae8b6f24cb85facc2fa227a0107bdc6ea4a74948f4eb43a3f1
-
SHA512
44e0d9e101bd3856e3792b5b52447a84aa885d305556c487ec635c77fd052e76999e002fd60b6f6ee7aa68ac6ebc85d80418cc68aa8c10302e7a3f9eaf2c296b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e0f64151abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dd25afd55a0cff4b9f9acb0733df367500000000020000000000106600000001000020000000c00a8eb250d2dab6810c4fba269e01b10a8bd5429030c76a2faa3afbc18eb52f000000000e8000000002000020000000e88f9f103de223ba1b1eea8cd46957954df8dacd4cdd55a0344e5f0ac95cf0bc2000000026344165a44c0987b4608ac25d5c6146c113c337daed5e2770f6196ecf02b47540000000e60ab1508612f5f526c3088651b61c26ad841c3a051a82107cbcad4c7569f774eb3b4a31ca90204ded8ce3d3d3584ba8d5df4866fbfde2c70c0e2326a287adff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dd25afd55a0cff4b9f9acb0733df367500000000020000000000106600000001000020000000b5ef364447918fad9d5f9fb2ee110572d2abbf9e0d1bb7b5923b6241c5da568e000000000e80000000020000200000001e39e8ec39ce2411c1d6bfe966972fe5b84afb86a150dc9a08099748073bbec590000000c851e3c584e67265ce0631f906673df377501902f389b1d9a123011c88683581d0ce7928c8d8c31123f62c668e872b56212ea16e1937ec725e79a2a475db2ffee702f2eec8d0e2b86f2b7d38f59347fb6a2a320f572a61a61e0610ddaf0c22b1fd2c5c72dc5d99abd6db4c476005cce9e051dbba29c494f4da2643f5fea36abeb26170afa90a1b2fc8cc4502f48ef76440000000b6bc8215e3ad322932745923e182e51b79058f544cd8a0a029ddcc4957e31d7dd41b9914062f8f95c4ae95debc7878e4dfc5ab0a01deef30edf65e113e6db231 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D757561-1744-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422438681" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2636 2688 iexplore.exe 28 PID 2688 wrote to memory of 2636 2688 iexplore.exe 28 PID 2688 wrote to memory of 2636 2688 iexplore.exe 28 PID 2688 wrote to memory of 2636 2688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6231178fe31cf487a740088a46f4562f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa43406936270e6d41c4a05428a184e1
SHA1da20d6d78004f7b4e2e72cb22a3455f07cda3d0a
SHA256d46f2e10f9e68e14a0612455e9a90f15aff700939eb047243813914285ad1756
SHA512c759dcaaf7fb3f33fabd0249bbef8027b7e936d5474a437e04329ac879e180a50a6bb7aafa51ac21d8b49bfa020bc38e0430ddff81f32c899e274759f16201a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56548101928194f425a4554970357619b
SHA14c46c40b604fafbea57ba383b4f3fb5a60317ffe
SHA256e7c2627fd8a699516aa3f8163b7c602e2ded49144f54a20c79dda829d38a4326
SHA5127622c2fb09f60db5d34de3e8887969491e118edd8d2239fa6cc9e1ce581e680571870dd60c85267ffeeb6e5ad5c1e4579f1babcb4e17656e08618074206fc10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4c85cfc7ade93e6a3bfca043bb2812
SHA1abaf89c4fa058f1bd7a681df4d7e125599ac8401
SHA2567537388b99e250937458ea8659e25755cd6c40a94991536cda462219f8554e12
SHA5121c20b21a34af72bb81978185f0abcf33cf29013e58c3d7f44ad8ef1f8f32163e0d6661e0d0ded908dc863acdfae05ffc621ed70023fedbe2a1bd2c2708f1ed96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc0b3c0e8817c945b125939ed7760559
SHA14b72f452e7a56cade493cd5764dc68d1f12ddc74
SHA256dfdd0a4d13a61ac9c91a1dd59e173eaa113acaefb3365bc55fda493bf7f7fade
SHA512f424b68bd5fa1d5ea50085f4dfce8b7fdd3ac21fe22c152c66206d39aba09040a2d3ece343f7ca71f0d513521f2f299aea7e4b4a691b8fc4e3fef3f4fd11e4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507992074add22f453e3fceb2c6b52f8d
SHA1c92df23e9d43b932ed6d9f74ee93a270ea2d7b87
SHA256c8726158a0d0574cccb32b9ad79d3d2a07d5f33ed3fae39025cd4b20e102d114
SHA5128fd643eda7dad9c3b98fac68c71db48077c695779de49db3b82cfe7eec147f11c321a1d802145d19fde017f00d575d0d070a1d751a75449ed368de32260cdc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682e39b99d6d5eb3450d6ec9cfc5c8b7
SHA111dc3ff1f3cbe5f0aa3561300bf2e42226164199
SHA256420f7de72d1e7a9953a2765df5c1d7d5e268995486b5fabc51bba7b93f75ab25
SHA5124820dff9fdb6c74639067e6b5cbe1477c693a2326717444768de1a35f010184ff80bfe4381de8bf8f9aff229356383528aeab99b83370939e5e9f3d5bc8d33c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ac7fd20e4fe4ecf1306240bb26b5fcf
SHA107cc081e2c8ce5fb6cccc1e80f889849baeeb4fb
SHA25684a884251ff5ae679315e4b67f4109fbe7257a59a396c6b4b3e6674fdcf0031d
SHA512998afb07b7fe7f78ff056db033455d64127fd6c6417bdbf363e009e7c59a0c517d110fa58ae54f79fe5e4ddddbe1b89b01f58d8c6b560df46f1112dd605698e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c739b15068bac4ef317c849697cfe40
SHA116e5003c8f20d2be654d1808a211e8ef999936f7
SHA2569ac2685b592ea2be0170936324597cdd0680c50c27fbe048c2b1304a0d8f2134
SHA5123b2adf82bcb7935c7db64af10ba1670886d90598a5a38a72b4d9337723993a2ca3c1fdeaae15f492f89132faae7e12da581767d19b44b864ddfb0f0155b958d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1814b9b35c46dfcab2727c4172637b6
SHA1b8c97779a7980c7cadba2a13fe8acc7c0b7df01d
SHA2561f0c62f0697879dcc412017bb2ca6c3ec2a76d55cb8690b9d5a9ef2856c6fbb9
SHA512597562d73088115885c56b18f5d091ff1b6a0b58e9dc9b12dd6143d544fb15b0e10e6d3ef4815a2160afc4d7cc1d9b699479434e05e158051e50d92bb93fa862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe3d108b9be4717da8b832cc2393e1e
SHA129b007dd8e041a1b8d50018445da176a81bea869
SHA25686b11be93b7280f01e1807643ee2bbed6af1786dce7bacd5eb008ce5e70e89c5
SHA51295da5b645098c40a1c409c2737faf3d4b70207694c1178d4d96af857b2c1135801cf54befb69d08dc50879a7365e55407a72629bca1f1f486c26272d17bcd4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbec714e9e0bfd69f6c4c3aab4107401
SHA1ecc009c3be3d2fca54f57dfc2793fd70d8f96dc5
SHA2568e5eafce32efe7a3ebbda945488901f8f079659b8e56fda65dce9655c92447c4
SHA512491770598ac92c21b2599c9fa35e25c9a97399204dd8b705f48c9ece8da6041ca42e4fc64d08008c9bad38d0078a0fb62a6cc243125e483930687262f96afc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b450805342f77ff0e5879b1306871192
SHA101bd4b058bf7b7846a97899d9f4a730c0302e2e8
SHA256c6b8134ac95ae155b498870f8ac14ed8368b3df0f888e53d41e0a10754db634d
SHA5120eb51ea4b51195ea124063510e46b968784f6a76b6646ff209ef1698ea881c5be89b5c2f0d09ce60578b8c3c75fb5de74699b3e5048f77aef6c09dedf28de563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91d2eebb299f438657cdd1361c9f1dc
SHA10c98722b828b0070336d5a6d6618b298f48b3b55
SHA25652d69d7ea588cf06948056ffba30b6358ed557643e741edf5d7621221742b258
SHA512fafda5fb01988eabfc7b2b8d789616d8f0b0881af26cea07dd017483e3f8048763808f4d4dea7695fa841116afd3e373241a11c62215ff7af6b303003bbcf6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc46dee7a43ff394dbfd251c3c15ca4
SHA13ceb841fec1ba1384fc2922e7e462954e6949089
SHA2560c44cb969f5d08fd190318a4b60a5dd4aa9c4a09cd400c8903f386f49f6141bd
SHA51265d20985b47050380a4ae1d3c98b54f4bb0c9893841da1f55ab009bfdca547ebc683dee2b685a6ecf1fb8137dc487761ba396b88a81f2b1ba2a4f0e03d87409b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54da1d01e6a4b0d1b45df6c4ce5ddf5ad
SHA1e35280ddaffe7f01ba4e73974351b29c8e039cf9
SHA2563908e90dafea08da95b964027b2b186eae7add50ea7b122a71afa04efe53ac3b
SHA512198838eb3adeb44a4d742c8a1b7604a2d112c6e1b8168ad87963d059634c7fa6ca1493ad680f31d6ff7f81c31a4eca8815568e6fc819db78bb46359226de0e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c00e867bcdcb1a0a3680357cd8fb44
SHA15eeb8862da829dae636447c43fb05f02cc4f9a01
SHA256bb00f99d8055a44d5224908a1c7e67653f18b2ae4f926bcd77990ddc4ecfc1b1
SHA5123f73473b30716b8867b45fa2d1d0aef32a719d3f0e6f64a2e3c226c7725340029b4b8f1c630e39c6aecd711c7fd91ad163a06f04cd48221c285b3bf6210696fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5920505e1f80d9090ed530ccf1e6aa6fd
SHA1b050d417f5d71086c4bf4ae634378f60dfb2fc01
SHA256bf85f6e4447a1666ca7a765474add7c5ca5c8dddbd8b497129a2c452568f1a3d
SHA5124e3e911bcfd34a9b29cb677f4939a2d6bebf5926cde0e107a0934b5c4c2d87110591570f00e07355f1d958247a360729b36d25c4a862448263175fbd737a0c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116bce71b51fa27491202396d945a6eb
SHA1323d93c0a6fd2b439a26aff8d2c272618b9afab6
SHA256783ded2f1fe0782b9d53053a6edcebaca335509dd3e05c63c7fa92d924cac129
SHA51202492cb68201b02d9dfd779c197734e812fcbd7e04707555f2d731a60894c5b0aac070c0b108246fe28b3001db6ff433b918bcbb7c78ebaaf058353e169302d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e80e8c77cfe977e365cbe9263af2e80
SHA17fb066a90838a73344b9d06d3ff5010cdefafb14
SHA25657cbec3be3cc17e2353bdb113febd2507b285c41d7fc83a5936a95f1ed685ef5
SHA5126318922af0d955cfd01992d97a43ecbf0427731140d24c24d2eb118603ab725f0830ea4cf030c856ae3faebdf502b6ed1640b004c13dc39d32d5cc759cef8ba6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a