Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
710114dccbaeb3ec372be4a3e5877518_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
710114dccbaeb3ec372be4a3e5877518_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
710114dccbaeb3ec372be4a3e5877518_JaffaCakes118.html
-
Size
461KB
-
MD5
710114dccbaeb3ec372be4a3e5877518
-
SHA1
042a4e60441ec4cef3ca1d49b81e20a028711f42
-
SHA256
c21c4856776a2336a3153c30db125a449a02f4d796a13631530ede1ca3ef2968
-
SHA512
085680fc2dc29e1bf3806fb7c3a85abb6a0e265082aaf444e03209403db98f6d29a6f947672c246994546e64125bb16b5033d00ddeb61494f4d7968fcf183517
-
SSDEEP
6144:SQsMYod+X3oI+YtsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3L5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422777368" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000004c85924a0cccefb89d541672b2e414e5d1790f5bc9b1f5c8c6126202eac0be8f000000000e800000000200002000000064ce8cff675186830bc40291144dc48636c4da48b57ed83ff000af6efb116900900000004a51134268476a8e5cb39a716ea70c938e54b8800b9669df1328b61ecedf2b0a63c235ab384b8b87452af878357bca36be39077b786d51a1dff9fc4f36b51b0d3dfbb5c4d9dbaade4dfc87bdc805a824f356a86269c16cf5a225b2110b1a19eab396addc016f33d40cf04a51dd5f65143b2dd77f2a788e0691d89866844fb0b50b8fbae8a039ba4ad72fc88e691b00354000000057c34526f13fecd5c42f6e296d31cb37e4723e8108ead42e57a9ac4597bcc74b7a1e3383ff0cb30232b9702ff68ea78e4f7d42372ef3c5b47cabfd4fb1e96ddd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF3F9D11-1A58-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3080cdd765aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d2686d1fde88e0e2ae5cb8cef959673962e128b120c3b6d49d66e94e5560f23d000000000e80000000020000200000006f973be7a634b22a66042f0374d2b9e9c79a646ee0b286063c66cb2e9a59736c200000005904f149cdd0c9b9095e65142783aca7b04689196582323cfe577704caa2141140000000abb8582aa45f69bdcd44d4441ed4fd0415871c2f90b72561139055487156b64e6804d6e8e0323d819a0d3c4544752f71dfa423194521ca6d54b5bdbdf7943b46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3008 iexplore.exe 3008 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3008 wrote to memory of 2600 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2600 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2600 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2600 3008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\710114dccbaeb3ec372be4a3e5877518_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a25637e990be325efa3b4a600b7f5cf4
SHA1da5a12adcdf83319f711d4b099fb3313b35a1346
SHA2562769e0dd64f0b6ad1f34173a92c09f9b5f569650a30ae79558ac3ae3b022ffc9
SHA51259ca66dc55188e0ceb50a17addfa8eb6daec2395d3480c5aaec28e96c4a4f6ec8e9670b39e65b420f6b72d8f4eff92d62adfdb5ecb1e80a21abaafefc4619e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e6d00866def39a9b44b9d607814cbb
SHA1c575ef82ad8591e532fe8e34911e486fb919ab16
SHA2562a93ec790b3851e33de4b5b5414c271cda205a4505996a074ee0c32379d903d7
SHA51292fc61fa631ac230899f2788b0876acffbe4554724ba3483aa9e7a70eb6fa5be5f0af7a8e0d58bd8d23b9227d8396fa6554de28ef024d779dd436e4866e72f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf6c98a650a44c3ab5ace82b7c091b3
SHA1ba09d4322b7192f10c963caddf61060923edb2fd
SHA2568c7acc08164a62e9cf4492a1e5dd3eb917e56ce5c7ff9a81d73ecdc284585a35
SHA5126a51ee41b57b81ac6292c89e77d2c6514f80d611dde5305b86bec739e69a4452cc2f5d18dabc6e6663bd4e6fce1bf61243b3f0c085742cb2ada68380eef1d13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53249cb989f55068b30fd6d7a284b9293
SHA1117a9b18ca270c8c0f7ee4f7a021b45d4c404b60
SHA256050f25bec60e9072c87938acb68d69edf25cd3a9ae78b954319a2891dc9fb78e
SHA5122d522534fcaa74504ef2bcc2bb947e1085372c7434e72ceffecfd7c0b682528bded6f44fd7af038f76134e4fb559668d394a8d4eebfeb56bb714bf572581ffa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee2f2fb59623c96a9ce0edc96c3a109
SHA197756be88252d1ab2988cabb1945a6a3351609b5
SHA2568834d78e9a0fb530f12d0f69741556d7b5e83533d8aa3ca20ee0c887c6437261
SHA51243668284f39e63d090649b8bdaaf385aa19f397da663c180dfe6a68d4398613f3cb76729d79e94d853df44fe5ef4c01271d6db8354d2e5eebb491f9719ecefe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba009077a1a83ce4b43654cd7ad0b745
SHA10f37fa06e55be9dc7268af217f4621bd02023dab
SHA2567fde635a274d8a7df84a317699ef9dff5490eccbce7c9e944d045bebac087744
SHA5127f0c74e90074be7cadb20e5aa0c603d7d0936f28ee42ca118050504dd6624ddecaec4392dc20b6ad8083ec99a7268b3b84c6d9d4cf97e9dcb45301a8ac7992a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a820141ba2983ddf959a7634cd2c31c
SHA15e4f23e080f530aabf5feaabb4b04246c16b7dba
SHA25688205b083717136ce0e1a85be9baa6df0753203ea579768ded2a6e875d273c6b
SHA512c128082f0a2976898f69e9f700e5d922969209c30ac0582b1d9a74ff5018f42b5646e64876be0c29f75bdb9e11e92adfd73e0356acf968afbaa3f5bd2094d4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e51f0694ce077bb5fe0cac35c7bd12
SHA1929655916fee1f607209d6bf1a748523b3ac936d
SHA2568d2c62bcc3a790b802dd8b9c38e759b36798d54b71e344e383cb31fbd739191b
SHA5120d5d8983068fe8ad86d8c6a1a42e58931ac31bb867eeb2d5255bc03cf99cd6d86493a688f6dba31bef7addbcc27675af1e61eaf3fa58e8ce36d0825c08928071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590807d76283f20179fd46436fc98e3c2
SHA1017396dc343faff4c57b397e20b394dee012a04e
SHA2565374dd7c51579cb8f589f814b5bba42e0b0bf88a0ebceefa39651a7305ef4b2f
SHA512d590ee43e293feadca462e688c7dc06ad5fa4fb77dfbcb266c670bf4d5d63b115389dab9d2c15327360e0a8c31ebbee2fa87b0ce7db084de8b64fb0c5fc63692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aeaa1f833942130bdb87d9c7e4e4a42
SHA189dd4b49c309b3270e4adcc25631fdd758db5bd1
SHA256c35f4471b8326aa060764477a9d81c8370c164d1c6abc708982fff1444e3a74b
SHA512f6453fc487e0c9e518d9bbb0b05dc1e76560b2b00073cf9271fa69247ab75fc53e699b1f851e1fbd8f762f965ac36bb7e3a7df2895b5ab135e86ff48781d6c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4708e121bd323f2ff666d73e141b916
SHA1390429a185f0cd746d1989a220f38ca00ff5865f
SHA2565fd0fd05f971df0673e8722ef64f4b10622c00f00a0e2ec2f1ff0b1d2ba64b4d
SHA5123028538b250cebab14e3cdcb694cc89e771b50222840a522b80e15846cd8f052c08b44baad935a750181b1a7aefafc0ec760bedf0fca36702a968f2d384e327a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5855625eca4cbdcd49440db0a0fe1cc52
SHA169ff05502940c3dbbcba307a1162849961f28bde
SHA256723672f32b3fc5fe3036b7c5b3c32cdf63c245e43bae028310d5d03513232980
SHA5127eed4d9ac26039b40b880ec24129407b7bcab633eed52af5a1381331ffd4c0da5d0f99bafd96f742ed570700bdad2b045cc1ebb8da5cc4b03887f29e3da0dec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55331b3bd5d5ffe2b546e672e38b3e37c
SHA18e88e6dadb55b126af391c23b807d688e0e980c7
SHA256c41a51ceab8f6b13a0193c1153cb098516403d8ba1cbb1e8fd9b24f9adf5c9ad
SHA5126bdaa455cbbeedf3caf65d7c2f2108ee16efa71d57d2eaae2c8cd8d146bec8a12e62030d71f3ed89ab5f3e02f5cc88b5b9f244bdab0f52a6646710271b3efc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568755b7fded3e3c59d73cf6def2a0594
SHA134687c0aaee644df7bd81655c0d95ec47831d09c
SHA256409b6f6c92ceb4737d9dcc31f19bb58ab5b35f24c0d62b87f17c885d441d25e1
SHA51297d07cffe6d8265fac08a1d9e3f54fefef8a865cc0fdafb39b5e51ce791da0598ff8e06acffd3e67e73b8aec50e3b9618f6a45fdbebc9bcce782b99a0750f3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078bd0ea2db0410a6fd75be16ca42925
SHA12e0ae3bdc01e9d81823f27e1d5522cb04978c5ff
SHA256a097750eedd5d1467dc0d4a52a130f5346fb1edcc5b6d4d37281303a63730aae
SHA51208f23c2489792718919c09e7636bc3e1f8fcfda87e4b51667223ee8926f0282dd89f3844e526ef91ce26f1df8a6ec630454c191515a9237a5a2564963381c701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bd8b2a2b2d7e7325d0445efad258a19
SHA170a087be966a72d14f1caa312f7a7c5b4d669333
SHA256f250d70a42fcadeb60fa2fac36b0f040a301ef3968c56027d9b5d76e93b706f8
SHA512bcdfdabca8caa79116aacf073bebe03e64f3f26bd777bcbb8389d697bd415544642116159ba5af79e31badda4d6f783294097af7fdf850ca37192490b04efa4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525fc32e2cd33f1a880e70d36ea5b0d55
SHA1536aeb790952c609fe08a8824598c5e0dc760ff8
SHA256dde1bc121a586db6299b44cd8f3987decf72a40d7a2a42c488431a13ff158be2
SHA5122ccc7fdd2273f263d481f011bdd3f82f1c98631e33e0b0d3ed95d31b7d9f45d02534d9aae135640316ac8ba32da02bc4373d71a70a1e2e655196585f4595c5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c973a08b884bc203ac58b3627d4fb40d
SHA1ffa98c41025acfc10766cec9afc0256a65c721a2
SHA256bd1f55e35f4fca4dd0169b779e4b0a4d1112d1d4867a6ed1a47ba94f70608389
SHA512c69195c2eed82fb1a67afac465151b1de10a4203e08aa743bf859dd536526207c58bffd70b27b6ba317694aa6100bf57d8f65d7fd97290b1cb0668c757e136ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd6ed57f64853ba2841da67e5f4deb4f
SHA15ee846608786346ec2dbe8fc4675e2c7acdab2d0
SHA2569632c24889c8b3d0ad46bcaddb9830b1157ccd9c65d8d965050d45fd9df1c471
SHA5125c474cb471a16c871b60040a90b92ae8d62523049aa007c1fcfb92f1688c1828e9753095f3f7c6625486a99c43f4c860236ac03a59ae3940eddafbc48b6452b5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a