Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
7317ae997f25cb37df94fd976cf03907_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7317ae997f25cb37df94fd976cf03907_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7317ae997f25cb37df94fd976cf03907_JaffaCakes118.html
-
Size
3KB
-
MD5
7317ae997f25cb37df94fd976cf03907
-
SHA1
136b74c157a31c07656853727d4cdcea835d6d1e
-
SHA256
333e911e1f00c9018af9a94164b1d11890d62ab702e28c29c833435e344ca7b9
-
SHA512
277d1588d393eb543c70796e25bd77f2fab9bb3403d6f351a65839226bef4dad4ce658f354fa42daa77b79b0513439f7f39db3bfadb1a21376ab88d190ddcda1
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08BD8861-1AD2-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422829354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f40e9fd90f967046b78941829b86594800000000020000000000106600000001000020000000d85445fb4558844ab5e09d7bd7c18f2bdd73194033b0ddd3222d74b3ac9f2c18000000000e8000000002000020000000fc511c0facff73a1e723f53432882bcb9bce474692cd7ebce816de7d56a7c93b200000007358ea0826265f1927a242ccacfc2516e27c27fceae935d6f330bf9e57f88849400000001ad470a7a16a4ff4e80f3bf973afbb47b341e6b94100b1aeea9e4202bcc411059cf8f57589d12db80b8f3fabd0f9d8ce1b316e7187b4060baec00d45c09ab62d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a55cdddeaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2752 2384 iexplore.exe 28 PID 2384 wrote to memory of 2752 2384 iexplore.exe 28 PID 2384 wrote to memory of 2752 2384 iexplore.exe 28 PID 2384 wrote to memory of 2752 2384 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7317ae997f25cb37df94fd976cf03907_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e38998a772ddac95798e9541850bfc
SHA1f0635612fc3268db3ae7272a939fae02bf1bbd93
SHA25643de18bc535d77c26c8a9d9840e243e43bef7d33330482a7ae5b2e4a02d24031
SHA512e8d01d08f1b5fcffeaf37e7e7a76ca3ba391e92372ecd32fcda18f6cda4e563e9d56543d3769bbc8885083e4063f9136a8dbc42be784dbb62dadbf20a4cc171f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d0ee27b65c0f9fb25eac741e589879b
SHA13d5c3bbed0f56aab6484e1d6de65c9cad67eb7f5
SHA2562e0f99eb42fbbb1787381f37301b8361d6157a7beceb883508a5570ff442574f
SHA51257287148f01a350844e38455cea7b0a5ca2ef73615f38377ce0cbf180f9ab58868e0b46244121876b82b92008c7508cc00b4847bd51f369b4d6b8927ac7702e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56164c64c1538fcd7a840c7329973006f
SHA1087172c060d3436f019e01f1dcf9231a8e2807b0
SHA2562529a152f5038727b7a3c5e82e47e226fb07ec6e77b032d45b98338d58813d80
SHA51271be0402acc9516250b6141e32670d0971bb925a18b1d0710eba6ff63021c26ac54630c252e7ff967994b10303117da77c07856bdd1540402f11bd40072f3d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b26c6bde322b84a63d09a858570814e3
SHA1614bb29da4bcb99a9caf85e41f6b67270c51918d
SHA2561b2a8895af9e9f5ff3282fc49c2f8378c2c4afe6d2d71c4db8a0b3201766da15
SHA5129be988cd3777f07b53bc8ed439b1e38a2d68e6065dbd4f60ce9e220ff120174501a14d6c46bdc2bbd833bdb0870bb996548ed495af7f7932d78e4674a1589b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59927086dfa98b245b51ca8bb474b06ee
SHA1b33e393e24312a68637b9c8a4a7be786ec31ac39
SHA2560cb018e15b708f32289638e9a38536e9ba1837beafff700e4d6c7afae76c3e20
SHA512d056ff2c38eda587b277c6b1b02312fd9436696978ebedcbf130b62c1b7db909e3a780b3d0479c38fd06c2e8c11891a49162ba49a9833464b36bedcf9ddf927f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5546f8b29c42dc9c4209a2984b202f240
SHA16471f00245ea32fd200a56d3ebd5f8d8fa222a49
SHA2569e49031d4fd5b1170bb017cdaa53405540d5df016faa22c4f9d39fc5658a16c4
SHA5123918b40c9b07ea10938e595a2d1248818dc7b518ca458d1df0a52cec953277551caf9c9028cb48271e3cf524f1fed7105b9f62c21aef4d9dacd4d90cc03310d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f778698f0698f40f1c6ef710ac1505ce
SHA1ae43bcba5e6a84240be548a0ac4a5d6d26664362
SHA256ccd00670880c3e12aae548c6672e9467b85eb39348a6f8eda2e6ed9897ee8389
SHA512714cc9bf1901d7c91f2a4d938274dc40d40dc10d936e1f4d07f85856d4f3856a483b163825e4c8228994b5e0e23523f04d418f6d9654163cc3890d9e046f4fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba0ac6ef5fc30b1ca43197221bc15fcd
SHA17f074b4a45b053a0321726777045cf9f51c01327
SHA25623791ce73a9cfc79828332aef16c853b51b13b0d6c8ce274c5b31a6217ce3458
SHA51285a6f2a160387b3d24ce33d3cb0c882f0dddbc269521f1ba05a246a3ea6e1a8103e4c7cc024fc28b9bb611561a7702f75fe56f0a6573995f451c7427909c005f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f42270a56a9be02fad93bea0d50969
SHA1e07b6ab317a211c65bc5045ec8bef6efdeef951a
SHA256707067bc0223dadd3015fa634728f6fcebae8ec532e1c727d1da795fc0055b73
SHA51203c4b5d6a69e74ef7cb9cd409643bc5142d191eced24c936a68c37a1f132947636d39549e4e495f6e3a6d19140b3e8d5f4b20d93e3ba89e12e78caa5a0d6cc47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e382f4f4a3e5c3a2c9c88627ad1550e3
SHA1e0f2f557ec950acfdddc65b36eec74b188ef19d0
SHA25692e2b8bcd20cdff32010520340bb8feb417ecbe1245206156a67b25adf5c6451
SHA5121129a83dfd2e5cb2a42f8ab004cbd10bb186c6e80f736c8147500311b060b21616b29998aff074daf2459041b48c413450bd8397aa553286cb91fcd41b17fd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e885c798c1c8bffbe2ea0f007920ba01
SHA13dcb32ec55abd31d508b551c1a9d63c42bcb9f76
SHA256db2ffbb2524114f071c35c8f8e41c91184a39b77ff43c08ad0711b4f653e37a7
SHA512adb43d98561b8af1fa9e21e33990e2ceda7c0ef9ee8f724db8c554fb4fb646c1d426d6f46a3aad3aea22900c41914515e9aab98b54b931e0057f26d3f3cd8830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a723cd6c37fe2c9ddd45f5b7cf9a07
SHA109ef8a1858aa55e3474823802c443242b0a44cd2
SHA2569a64ec8b76e0cf3ac383f717e4122fae7a990ae6c5bb4a2799b8f3a46eae001d
SHA512fa54ea648f4ba3f2a03840677611a52c1a0ddf727a15b97bbbcd06c648e1d881a9c1b5f838c16a70ae4c1b741d817cee6cc8e10030da9acb3ab4c15fd3cf4ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faec9312c24186c582c3cc96b2c037fb
SHA104db8f532ccbd46b13579ca4d827e6d34ec86452
SHA2565cac7095878443eee0049f39fd1fc90ae05bd92cc02276600eea1f25934f6554
SHA512dae7a1a6b529b09cc94f91cf56241bb647249495c1c112ac349ae20b43f7a6a1312e6d7eb6ec90918f6bcbb5e4f4b3d6b02e739040915a1fd048dea7c2e302fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0cabd38d3ff88b98073fe86743b54c4
SHA1612783ed2ac8001825a8d517219fee710b35a37f
SHA256c0726064df7752c463e0ec615f715db05b2e67d76a0ae392b07b4f867ec7beff
SHA512cbfa60592cfa906a32ff1bc748b1eededa77e8468e6e3ddbc6150e10589f51d945d8b2e1fe9c4a70a4f81df1d050a233e6778d6b4ba2ba0ca43678285e7e134d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c162934558780953b68a00329bb248a
SHA1e65e6e87068a514019fcbfd0428ceb912d17aefc
SHA2561f82a45b80416b653967173822d903d2ae698890eef1fb4f4ba27025af4f6e4d
SHA512b097354719941abef21cd5bd1bee71db626608e091525c422054e7a8a6258353b5f142e281bbac56b0427eabd8e2c0ef7906b841c6376519fc281893296d01b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe4c293e610c1f8b94b8ea2a80fd0c7
SHA19a7438dbe2f623425a218c83e31b9d91c54c51ab
SHA25694f1075791a81b2d5fec2edd36ea27e543ea7a5ae6c64d151883bf19d4f3b8ff
SHA51218c2c91d690fedc201cdb16898d788ce9207f8d80fcdcf7090faff34481c97650365c2433a9e723fa0f6e831901f58cbffa092daac368eef7f27682385aaaf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada763605160c470d75642c44b1706c1
SHA1d57ffa1b813788bffd6d72e34422c70ac39ff50d
SHA256d3946d2d3b6bb7553bdba8a206fda77678ab1acb64edcca2e55028933b39bf3d
SHA512d13e6939d525fcf7b3180bdd3b31df5d001544e58b66ab0110523a7b92b41f84a0a9ca2d5312e4f62a61de097a7c2ffab9149f6bd239f5263cd4be6d2bb02c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799af0340fdf331479dd7a56993fe1cd
SHA15faa62e585b97af510ef8e65a33536bb793d529e
SHA256ffe0159a24cb9a85f92dddaf046a2383c9b9cbe1b6e8462b2f76585f46046a46
SHA51261e3e805702c1ca8b759fd191670811877ce02be7b8fa7569cc2fc70d4907a4744f5fc2fe6c5703b5206e992fae224148258a75961ce817c55c09c2a231a1f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521aa8b482e592bd6e0d1eaea9ce3dfdd
SHA10430854887746bfdd0cac47ad328e7b8e998f352
SHA256dba06be92c78dc960cba19a325e23f446d83ab3dcdb08c61926ab41eeddd0645
SHA51209409537292fd79de8ece343ebb6626331faf91999712a5134f4f86d981de26c6701d46d8ba4aaf4f634e6c820b6f286e406bd4f089d6bf789378d796181cafc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a