Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
02e40a0a32c76ba88e75684347252559_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02e40a0a32c76ba88e75684347252559_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02e40a0a32c76ba88e75684347252559_JaffaCakes118.html
-
Size
2KB
-
MD5
02e40a0a32c76ba88e75684347252559
-
SHA1
9771022089e2572d267389f58b9f160b4e9c1751
-
SHA256
338b75ed581b87059d72003a1db28402997e9338b9c6e09bd20961c27ceeffb5
-
SHA512
f3c55bbc0588b08afbd3d9be335ad2d40e7fbee3ff73cded1708ef3b682c36d3be6c09d2acad53d88920ddd6003b080f922244cafa5ad3ccf6db43977f5b15f5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ea7d3e8b27cf2723c9a0b3527e8862d9d20349e322c31d6e51007b20eb7e0798000000000e80000000020000200000004e7c7c891192071312643a3d8d3ef668ed29beb89ffec57ec0c4fce52c1243f820000000b114f004a014fe2990700b64e28c0469e02992a10ad9e2d8dcfadd845cabae154000000022705bca40e64271f9639fe152567c81903af284ef659fcc819840f45b6a91695f15b1f60086420599115f9094dcb7954451ad9630bb4eafc6ae2a72e6e42620 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002961774e1dddad238073841afb7134ed7451a6cf9c2451f94bc99d328f31a712000000000e8000000002000020000000ab2011d5a8f6450b2c9d49a5764bc31008fd5a3673b67a9a21acc928683cf4bd90000000c8392ef17822314b6fdc42b54594728bbf1e50e3ce945cd63f479b03bfb62a467e0e02c4f12fa37801dbcd44b8e62a10c3814b6981a2b0af8a715e6bf0bd7213eab876da9e630b165c9f1d4b45ea697dac13ce9454f0423a8b83454e55dddc3312896f569d22b65e58ef09cace82a4c34f19f8b28ee0f438fe50e785ef16529cb7ce42a9e9f689f4cd56472d7ca35e364000000065ded0dfe7c824f049a133475f878c1b4f3e9ae9143f5a85044bf97543be6792940aad470eaab39d425ba6499d4f0afdb4725c8c95cde8d7c0f48b2d8ab9d470 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420370405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8E9B8C1-0474-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ff74ad8198da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02e40a0a32c76ba88e75684347252559_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f5a98395dc44d748cf8bf2530e1b1df
SHA161ea56c58ec95c013ea82698be2ac9b8677832b9
SHA25647cd790069b4f57b6073f27bb1467d7324e9be5af03e7a20b40cf84e666e972b
SHA5126850ec8fa88f4455acab578b6cde1f7a590974a909666b9792937dee03f2b8669c1197c68a1d12b1d62cf65cab0088a49c1cdbbe650f6293523c1345c686efdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e647906dcbea9cd726c7b254abe8ff
SHA1f75264d4c62b57d70d652656d1673dfa464c190b
SHA2566fee17de7929d2c6da51ab6e8c05d3ae650c1f3a61d4fdeb12d239ad7bd00da4
SHA512155270e847732dcbbd5221e3337691a4756c0752b6dfef303e8b491911a5c939279f866accf2111e5d4b58672b0aa99c4dd1ae2e2235cbd3266895d0c0b5a2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d4b314136e752f5569a8e3639be1050
SHA17ac8b983afe290de7f6e3bc527ba3f415040cdf8
SHA256be5afc2b595f6fe5eb2823debfda6eda7c1ff79e74f5cda3fbc94fc3efbd744e
SHA512904aecff5b67289f2c953e8c7a8d9937398c572785752b78f38b89c523a2fdb64bdc4b3662b45a05e97090c35c768cd4a19c888ec687e19084dac4790f87b88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f10292858a5b057bf7953f71166b5dc
SHA16daf7052b5dc60f9605c2021dff511e141fdb212
SHA256b3c84718bd838185b6eeab2a4b53ab0b6326ca0896d7a424f894e14262a8aae8
SHA512cc3bd7e1e4b93ee8ede8a5e764644e00411c64fa9f7c487f5700f0ba4d1e69663555cbe6c266c7b5c83b08aaee061f9cd7717b778f454ff4bb442df9d0d20c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9a95118f31e34ba6c9de30ce3cd8b0
SHA189c1b51b927ca143b91f2f3d1a5acd47375b20ca
SHA256415f040d79762302f0be80eb19317a93ecb2a2d6c0f4c756c7f6c6e0407cc746
SHA51236c9649cda8094a44389ec0ce4de15516abffd224138d2001e39ed70f52ce54be1e51d81eb1ff76ec069ca3da7a6db6a8e7ed8c0ff121c56f1ca28e2c3ecbf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a24246bbb3d716d78b6aa26c6d984c
SHA1b18fe1c0641e57fc968a90d9eef7749764fb2fa5
SHA25605e9b92d9713861356db30c000fe0ea64ddda1fa046601b0ab46e867ab92ff8d
SHA51256e0cdf77ec1d4bdd71547cf54cc16de77d9f5807c39e2b1c8f2b04b01923f222024d0972854617e219e61812a8bf5a949788eaac07dfdaabe2887809728f3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517058af71023cff80616b26f514ecd3c
SHA118c9b5752e5ff25b5c49c2924af43b0e2fbb50f2
SHA256ac112f6d5f994f4d0397f567e7cd41bd2aa6b0791d36531a12b997b5aa49c7ea
SHA5129bf1859c6470c9038c68433fd7f5e9aa8dfea241763e6b87b083e5c419b4970b8622a6d388b80b903822e09a9007f76c6b63e7121690ac5ea60a2dc62d4babe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c84d329371d5c1d4479bcac8e96b33f
SHA196a4d09dc574796a3343e35c06cc7d30db79524e
SHA256478e43c30e5931e260587da4737ef0d3c7e44bcd315a726fe30f234e1a907b87
SHA512f515cf8dc34027f03db5191d48b824ea9bc2d15df6339ff9da19ed6c0f3fd6d2865afda07cfda764e91b414553cbbd6bf6a28207d37871158299306a2966f3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9c25f13cb1416ed55a9977262db9a9
SHA151add8bd019fe85000e2dff3eeec39f787eb8434
SHA256b6e58c6c4245ee2f75b357a2dcfd29a015dfc664fd5417fd3af6a66e9bd8b139
SHA51226c071f7515e8ef4534e7e8c43024351061ca7971115e58dac70d91e968920141619bf95a59cd09757b3c738b8548e69460bb9568d74e220b0e9cae743031c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550af063634d34ad383b707f214445ccb
SHA1e8e87243bb7ef1bfb078379e3fc527575b179201
SHA256f2d29b67b7ed9af50fe8053ad2482cc5f49b802b6ec8705632b02e6fd063a194
SHA512a21db1f41257ebeb5860f69cd91aa0bf90b71193bd2ee930189500df9e8ef4dfac1d2413153bf896da487076231ff40973891766c5a518daefc931b3000691ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561babf83334099739be4c1aede7880b7
SHA16cf938ff54e0755c1b0dc146a878e500af173b2a
SHA25686bcc00e9a23d12af335a1322b4012673d48c92659df1a32c65551cd2d7eab6a
SHA512205210c59a42d3ce4855d33a0144f8ea6176c668d796aa0177ae7fbf32216b8b1c0ff92c75d1dcb4ddca41046f07354cc77932d98b8516b729324ce797769f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54098ad9c1eee1c6f6b0f94918f07da18
SHA1d6fcd36319ddf4c9c44a677e04af71b585869b5c
SHA256c4c8a838cdaaa66147f8701cc084326eb86d653429ed41cdbbb370d5733f3de3
SHA51211f9cc12ba4eb3ca86c8e6f44bd8e5b55a2c4c96676c18b0b373675f91d501ce696ab13296d7435f5b74702cac606d310cb4a8b3ff9d4d791294ca228ebc2b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658eccc2f9698c44e3754d972cc18885
SHA134c3354fc62f7561bee765a2ae57790cc810963e
SHA256e0eef302c9541894bcdc20b0e5bac9eba5cd5604f549a9153d16f8650c01d5e3
SHA5127d28c49291e024a137e2ccd48e4a4a5ad734b33bd993288ce404edd445d63fad298985d7f353dd5705f6ee75e4e0443c1f347dc8342644e2d77817a74c2f19c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599f8370897a4f7314bf4b9cefb05b4fe
SHA13a181a2c1f5e5e4057292030d15008c942e27539
SHA256c8106bc7172b2f41389c71f8a49d304c775c49573620de037157f9242b85c694
SHA51232a7bbc53678a5102a9f60547c7af6fb19219c6d7f2b04b1414b2bd28201f388754ef4fa947de843ef6be4f0978894e053d02d38413ce04d78f81535aba9eb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94fed0da59fa39a27a34fa43ec63419
SHA173f77e09fd46b3b8287b2f203a64e1f4141fd722
SHA256ba12e427c1d06c531abd60ea0a837d1a4cb1ac9f1599abacba8cee9e3106ce51
SHA5121493cf640462e76cd11c32beb3fd9f40720fe3c4d2aacc707f0e34dfd93d7d554d5f9ae90995727654d234dbc03e7cba2db318b778a05b300e432cd6655c8d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd0296f14999d66623225b09420be92
SHA15bb396d4291317248d72534d6ce46a648ff88d27
SHA256995bd07f3ecd04898290d203ad4849a1e530827b2d3011229db05d7e56ecccb9
SHA512cd472a1a586ed3e4dc35431fc4b35c25e4a0fb882ae3670162566de5a26776ec43cbc2f4435410e0662cbd17170947f26d37252c9ae0922031a4bece6b069a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578680afecb4fe6de2566f3861d2da71c
SHA1efedd90a7afe2af9d562f8dee75bacc847be722d
SHA2560043b41e0e4db2c816b449bf973abdfc63e6b2e1e0ec8462282204c3af63d91d
SHA5123841296b991d3aa4acdb427590a92c81e482815d183ab9041c8a5c479b1d0d33ab347a8f76a8cb34d9c27fcbb9e275ccf28416936728bce9551c93f3aa50277c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d8768031e7b9cd3cae47ae8bd17cb85
SHA1612b1541a2aedcad1f1cccb674e3fc9556e59690
SHA25635d85976aa96c10e2786c376fa7097c9648e4971d8271e10242a8a8a4693dde3
SHA51209e3161e8cf6b477685cb9b5ba6249f5288c6196800741fe97225636c341c260a20ad22a9671d5a95fc9cbcce65f18a4a8233b9359aaa4285b028b9c8fba94e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2b5fbf2dcae95e26a2f80768ad9158
SHA104daa575822531654d9b57514b238d8a76b487ad
SHA25699a23ed271f84582667bd2acd69055cff77b86a83d80b368f46e0dbed56df78c
SHA512384c17347a29913ccb5db51768e175245d2d52fdfe3146f150b44c3f94d0594d72a2b409f46aaf203d6769a39ea59529a3f82949a1490c3afcc3a1bf4e1a632e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a