Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
68b1f257ba0e8742599915d53dd789e3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68b1f257ba0e8742599915d53dd789e3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b1f257ba0e8742599915d53dd789e3_JaffaCakes118.html
-
Size
34KB
-
MD5
68b1f257ba0e8742599915d53dd789e3
-
SHA1
fafb57b1a742c3b2d96025ecc377863b67405113
-
SHA256
d3edd92c733144df53aeda1b7b2919b3e9cfa6c4a8c05f690d294d2de29fab4a
-
SHA512
36e666590b0e9d4f6b9301bb1607ec27561dfb8419844ae4c44445bef5e8b75e6fa164d3c50123f8975685037b484659a40c0967887ff81d60ff760c5b2650d2
-
SSDEEP
192:uwncb5nQinQjxn5Q/bnQieSNn0nQOkEntVdnQTbnNnQOgXcwqYCcwqYacwqYQ4+3:5Q/H/ig54++py4l3THgf
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104ee1118facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D329151-1882-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ee0c6fd3df01d7897be01e8c61012e9beacc6727b26cdcbf2391033bb8b7bf9f000000000e8000000002000020000000bb2bf0c44a3568ab77d65be860ccd196f373d3469b0147a62a3d8909f3b6cd8a20000000c8f17315bed9c6a840a8672a6a1d540827c1c9df74a54ab421d7b61ebc2a22a240000000952b389c344f0bd703db03f3d607fb331297a34af09f5488ca4762fa5045796ff6c2d67b6846060ca77c5e3c045132c70af1fc36f0c47be74bc425d6ec7e79ce iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2212 iexplore.exe 2212 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2212 wrote to memory of 2420 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 2420 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 2420 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 2420 2212 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b1f257ba0e8742599915d53dd789e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3d469f97d77c00c2d2cd57400dab8a
SHA1c181276899142fd5eef0ff8ccf2e47c1be62ab1e
SHA2567cf3fa0c521580e3178bfc1ddf8c74aa7062d00b284f89f2ab1a78b498b61f05
SHA512d1916d7b405f78d582852a1e3f35416f6f1129b1fc5506e3983d05fcefbde92c0a4bbe96adfcee7aa11cec90262bfa334815152364f062d43200fc221ec0d0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575720d9b42d8f50c104af58ea549b54
SHA100290bc03b870ed3d49fc496f1c96e8161956c05
SHA256eb16ed2cf887034a847c9aee5fad248a0f1e71a71fa0f69ef66dee49f88c0b3b
SHA5128fbb1e26faf2a9e676a0b8e620e20bc902fcdf5b04bfe2440e44895682ea6491a636abda9598bee4982f804f2d8afd549f1dfaa53edd16e528ceb9f915656663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de6f5666eb34be9a617800e5385172a
SHA196ae103cf734c26e9d6af4dec4825ff47107fdfd
SHA256c252ac5b27da7e37151115f3e01df9f06b8739402b86e361492c347b870000d1
SHA5123d6b798e0552b687fee9b444b9cf2554d2b14591dc87b9ba875b130173381b0f44826d51489dba886eb7b18ae1fbffb721c45d0c95969ba1b81f0cc2af4a2bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c69c0f2dc066a97f207533e8d3e094a
SHA1eb49cf801fe3abc343cb132e340ab5ea96c306b4
SHA256212d6c77d6519385bf8b567ae49da8e7dea01ffe3c176c6348bbeaf51c7d7944
SHA51233431b9011d084b5d810ab5e1b9adb8399639d4fc521c21fdcec8f6ebd7cf8b362a15fc564fa69a1ee0f6555040fadfad99672c107cc19adb519efd05d19725c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946a85d12521f926b2482d1c5752be5f
SHA157d9916c77abb5b02124ac0ad9cb5b66080598d2
SHA2565dbbb3b18e700fb3a7d2eddf76b8e8a0cd7c516b34fe521dc1a060b7e44883fc
SHA51275e302be5485eb86ae4e1a1b8ee776283f60e51155e8444e39349e4a1b28debac7d37667a8b5210a6d791998e5d6421858ed2708012b18d8ce46e2b5ed3f0dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c70775498d7a2420341986e2dcabb3b0
SHA139486db5b5ce1f0ed8385fac323dfeaf9955a0e4
SHA256e8e3a7436928b7f7a6f43001dbbecd02f81e9156341d22a8f5549ac5f3bcc665
SHA512c5fc03dc6092c1310ae95e78bfd24bbf5429727a625f38fbd7c508e9272893e001e94015600dd763371a84a7ce1324348af35982e164fd131870d238bc04daa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b2e53bcd5f5da6b33fb96127c4ff5f5
SHA11ac9007f41d1c312bf417383ede1bd8ff2d1306d
SHA2563897e54a3daf8214c9dd71f618f7f8599043f76eb7c00397cf5ca9ceda003fcb
SHA512a9a9072ad7c3329a75670fd04aa937ae61ef2565e3920bb77f31f15592be7262c0174419866ed635ba49d3c5ac9b19685138124e6b274ffea4b03f7443fa45e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1c6595d087239b22243232103c7898
SHA187123b5ec830e1e067ef34777d89634926eae250
SHA25678b064fe926d139a04286e4325932c5847585c9433eeb73c26e9dd3b8b758a07
SHA51252b9ff69a7a25433a74fb3f2292567191517f2982635a8c1c15562a6eb1c68a201caaa2198b37e49d0f7651e97d1624fb7cce5c82ef14a04836f164c032efe72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ff58f3b8664b8098a652bc4db425e8
SHA16542cd806fc2a5bedbb22b8c74d7983c6c227819
SHA2568330bc6cba9afa08d9e81b3ef96a012209353917a0613f67cceff8d8a7b1f9d3
SHA5122f06c163803dd321beccb13eadf2b89cb80ff9e9b383d9163d66fca83cc0ab1ddf731317336b781d42277d2d3097188241f39f2eb7b9d115749dc6648a8d8b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e76a993e08de933c817307f6408543
SHA1d35922df9361efd8d21f66a9d65b2a4ae87766a4
SHA25653a3b091c82796170f8967dff92d7fc8faa8e57ea4b36e0f1b029191c1500472
SHA5128630246b06b5cb58e3735da4f9744701359bc3d78610276f1c684fdf578ac4badc326df9badad6a645e6df5982f2eaa2cdf8b9823d0a07fc6b5570a7ea549fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0599764b14fcedef8802fd10ba90498
SHA1d0410b56db1e9052168abfbbc44f489ef339af95
SHA256541f8a564e16bdeb5370c2813d8130b701281165a949a9916a0f8761dc102f82
SHA512a81ae1fe3422ef7e534510b941274feaddfb3fff3fec4cd793bede76cfa5a81839ca8b9a59fad7a34730170f93347fce3f71100634450f14040890d82e45ebd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1016f66e6048ce51f943ccf681e6f4c
SHA1250636cc2627cff06df0e0ef16b764089e45ff40
SHA2562ebbc2e0b2f84da6cd31071e4986fb8074e8699bd6e75919673d3db1e1def510
SHA512c5d7ebe94f262c5f2f303983ec579b654fd1c2189b69c3d85cb4af1ba8900fbf0e1be4e22a7d3689fc51f005a63911ea4050f95b2e5169c817045b8199c61ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ffdade9d944e7c503974290c8cb6179
SHA18e81509cfa08673e425cf9abcb3af1d6c5ad6e5a
SHA2561516d0fe352d64fb70e771a85ee832514cbed8501a81ce5a69faa7fdcc666611
SHA5128d06bda0fbc4d9ecf57f832b4c3d8c20715fa57ffaddd79b4442814b2780a42ff36f2c99a67a409f415b34fe19cf16eab7ed82bbab845c1958fbc0bc55c5a664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd98f6ef23501dfcf8c061236474a01
SHA15e7a331fc74f85864e9c352a78f7999daa115527
SHA256c5d671e3eb3e417d794eb4a80a0cee0a5ec6bd4784f822066ff0146e8f40bb87
SHA512dee2fb708433578e7c88502932f4f0788cd0e540a47a40b6aa74d4129c52e84e5ab9da6d6ef885b44fed4359d2f47715227d0ce39cbf41514441e66b16e2fc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95ea05e1b2ee13b051eebfd2672a6aa
SHA19dab4ee9eac4b6dfdb9d2b507bcf9d1d30c83999
SHA256780abe102c8966642268097ae714d24a2d567dd910cf43093c70954e75dd0548
SHA512d5dc515f7e51196326f06e9fede862bc69feb32dbdf5ebeec412bf4089a85ce2c41bfbf291beeff9f85c447f5f45a891f73ae1ff15254d614832ba45976f2a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ee4aa789446c4cf8825b33a1339d8c
SHA133228a4664c91e2190324f1c3cd5c87f027fd431
SHA2566c435c1a956a2f0194a26ff7bd56540090db734edcf428592330479573f4af56
SHA512797b09f22ae2a629d1dbbd153298c4c2fd47ac5c85e0bbff7a6356763ee211c42860bb63261b5a7e67e1b02abc50e35ea8bfcaacf04401089946d8996a2d9dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae524575bc2848f69d96f21ffa593b4d
SHA141ac9e2332f86cc34074188fd2031d2fa86de75f
SHA2563d4265d741d7244fb8f91a441646076394f825133a0fd138b8a1a96c6e421fc0
SHA512afd02f6590fc6ac665df02c3cc33a9779cdf4616ce367866f0e51cd963df1b0cb3fa369b98f528476e852f51f02635c1eefc61c3be57519ca7da65bbf1e2c55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af79406eeee5b6784d85c69ecf57020
SHA116879d16e071fb5a9b728af26f26c33a89faca42
SHA256497863c447c90ceaa32c4ce1517ebb2c27ed1c06198208adf8acb3a7edc6fb2d
SHA51260be3844b5ef95e8c1be268b1e876c3b6dda2ac69cfa31db4bd3b73499b3692bb85896340750792c0a0a92ab0d166fe6184fb0b92f891017eed9bea7bc4b3802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d0b098b02d8c8562312d39d4075e4c
SHA1c0f9b99fff492fcdc69848c75e240e0fd9d7b892
SHA256761174e1df986041d3dfc89f242cf0121e3254d30d6d915f50cd38439ebfd9e8
SHA5129a179137ee94bac392902338f0a5417745aa903a51a1f804e19a094a7bba147d24c66afd7cc2c83b6e0c309837bcaeb35410ecb422ba0aba5e1aa64c850442d8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a