Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
0e6328b213fbdf6be04ec59ee044244c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e6328b213fbdf6be04ec59ee044244c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0e6328b213fbdf6be04ec59ee044244c_JaffaCakes118.html
-
Size
2KB
-
MD5
0e6328b213fbdf6be04ec59ee044244c
-
SHA1
1f4eb273ffbc0d5688c2d5d59822878c5466b7fa
-
SHA256
aa7f353837377ebea0aae9bfd19bfdc5d83e67e328eb141aa756f26007544b68
-
SHA512
16ec2dbd76c8dc7f5a2c4f5cd6f89e890357fb29e2f86ca1c869a623e408f8a1a10d0cdcc1bc3e009c13f520c7f4f25a5b0bee4576a2410fc6b45dc8565f262c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000001aa3d71cee1617a3ec764050c8554f21b2b46c66d5847e051bf2a8924a615b9000000000e8000000002000020000000d363e2c5ef4e05858b1742942f0399ffd248b1f610550666a98d3baf13d7f6e520000000c5fe29f983e46a744c49f25bfdfc02b7c26688b2d0626949cc4abff6c191a80140000000b1b9d361db7371094d4fe2e456efd8078961cdaf009baafed5b0286a359680d3d6a6a35920b628a672c9422a3aed52487bdab247c55f84a3da7779c148844d92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79BDEAD1-0878-11EF-AAE3-FED1941498E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420811768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607a604e859cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2316 2108 iexplore.exe 28 PID 2108 wrote to memory of 2316 2108 iexplore.exe 28 PID 2108 wrote to memory of 2316 2108 iexplore.exe 28 PID 2108 wrote to memory of 2316 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e6328b213fbdf6be04ec59ee044244c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ba6aaed78daba1ca399da7c0dd33df3
SHA1734a5dc49897a2d109aacb4846169220fdee128a
SHA256ca693b09feb01dd5e96dd2e12f4241aa7914878e08912a8535574a5a2b301610
SHA5127a6e054f5ef0e3bce88a06750919ad43e9b286766469181c6a74236d84abb3051b127d6f2a116ed05b6a4c55b548b6a63e837c9c1e306bcb1e0fc714f0f38858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c77c29b0befae03f12a18a79f19e9e30
SHA12a9274876cbd93e74c49eaa59b20ea8b2f30fc3f
SHA256c9faab3a24517e8c48d2c142dd802dc41335f4470e4b92d601933ed9d39a6cb9
SHA5129d7dfacc865f23b8d55d64971a055f8e44d366bb1268e7e489233ccdba470c0a429503d953166d406992c4028ffbf6ad699f9e932b3fdab63eacc525d488fc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bbdd81d875224dba45ca2fa2ed4528d
SHA193cf487a1e90f6a1cdbb58883890bff6b605abe6
SHA256568344314dd9f411237b8a98c7b963b603eb28f0f83177ffb617d29fca5473b1
SHA512bd31a6807cb32d0477e218b2242eb5425c380eed1500bea057680951cae03382625edb2d2ab6b1ea5e20eb3d7257b6e6aa38900362d06fd10d7ec4dc1bcfec99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f61a60359c2ce2f43cbc7de087cbbb25
SHA16b4399f9cca3a1acfbaaff83877e03f20277d151
SHA25608d6857977fedbb66c0cd5ad9203d7e861607f9b8cb0c11c33ebf466d8ca4061
SHA512cb63bccd99c32c76c576b0c5f78fd1789f9692732ab32447b31083a35429c1da3421b0cdba23714c9a8778487fe249f563056a1796e355fd26e08cf8bb224e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536776de431b223681c93374fe242521e
SHA1ccffc40d0b7c0b9c7e5c933eae2eae8a3b2cbdf7
SHA256a5fc6dfccfa703e23d1f027c98130b01a342c376b0d5dab6fecbc8d924afef20
SHA51254cd6ca0a17028d5f77b48e42ca130ebc87c2a95e0c626c4af2fa5ff3ed384c9675f172c2869a1b2f4743858f2fd7f468a41de9d544c4ece4be22546e7045bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5040911b5af5216f79cbc9e2393d3756e
SHA18b158a076c379b21d43c7c10d3debad5f0283d1c
SHA25688341a01334f4560f76d0a7f42ee01392943957cbcf76a2eac7823477da57ab9
SHA512f26f6a50ac0b789a9a0c8e02b31862efb6606bb80880e498795ecd5e959f8893771d5bb0b9bf7510bebfc7587faa5116c57ae706f7b8f36e946858cf350a6f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515af1df47e154feb77c673534c2442da
SHA122e12be394dd81a54433023ffdd2568df0b17c04
SHA2566d8795cde5457d7f9b1eb0c06117f8c2e5b02b45fa7273e6f9bd9e9dfad593b7
SHA512749e74b6fda7724ae55564018890e78d218abb418c460468ac7e4bdf9a58db6f7b403128ea87be4cd035a3d8d6d4d8448abee6b2fe4227f7e97a399085706747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c25456a99c2543d7a3b95a5d6c3c0317
SHA15d3377aa0a7c6c34f3c5ebf7af6e19463e40dac4
SHA256fd1d4d0568128ea33602e4ba4fd805531faeb783ba727e93a293a6640a936e0d
SHA512fd652decfacbbe86bc6897f9214fc1e4ed2c28ab13a16017f58813e9c63e0b8698cf17897912e7d16e6d8f15b933befe2460c4ddd9f9d95913c2a3fa66550f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316e80f73da8207a4ede9a74a0bcd3c0
SHA19b982a68175d5b05f66ac639889382bca70eb48b
SHA25688a6da7b1601d031b42a26ede51a5f17c906484c4ab04d66eeed9aeb782e3786
SHA512cb8452e68bfafc96a0ae8641d9442a133a66c0e905d25b035ee26d70abc8174725eb99429dc23f05c81706e9daa3b78e3612fcccd58bb827e218db7cab1765e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf419e6d2ddafd4d67a7d45096ca943b
SHA1f70023dc6ed14f9d076d1a08276a0fc7bdfd3de6
SHA256531183a3da2bd6f3c53f96ef45a9c3b9b23d3c7cdb31f70d840d9c9d555b23d6
SHA51291bdab3abd0c83b471c6f345e511812fd4fd791e5dcc2eae2a3aade5f408fd08c2b5d8f7a262d76aa33d28a2821451386a27b5adb188288341b2b2cca468f21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a3ba43854532929a003114cd5c63ba3
SHA13c84082907c0ceba834cf06f6da6093106467264
SHA2567eb7380fdf209250c457a680402d8a6a58f3590c872110c22f5dbd7301df8259
SHA5122a99552015c440e45ed86c7f08fb5bb126f4c51ed2b739477595f93b6580db741870a21bee845735e17a5e34df4006245cb670d66467a1b7b83ae190a47c1ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5174bf9abfac29c6648a62fa9fe1a51
SHA191b2b2c08aa2fa4282eb87329f75091003f38b33
SHA256d10d976072c50ad074fafc908835e2d4d4c7dcd43ed4ec7f97648057dff2e110
SHA512e6429303d630e26a827c465906dd0ad2adbc13de72fc5a3fc5f7b2c9e0f4c45a880b9598558f56cc3333744ae0ed5384e235e83d1d83f693604e3860f7f9e328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef44b80e313ae45fbacd53bb090d242e
SHA1d67dcdea3d9f4ab1fa22f339ad95a9bc9db4dc93
SHA256bfd169d53df47247aab7b5a8072e6e7a62d4df29e1a229498da26af2c95bae6f
SHA5122b37c53eeed881488a17ec8a7b0870feeaee2c6cb80ee7519d9496b75f0f1f54ec723136eb330d7e19789fbc958e6b9082403be8f6d7286316b12f81510a6ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c9e09acb71269fdbf9fa140bf4042e4
SHA1ba70d6a263a3446a5631d03d9602e72fe29f0e12
SHA256251613088c5a5996e1adde64d06e36bc2a907be052a8538195f52bcdbc34df4a
SHA5123b90f19fe3945e54cc5fb658c60a8557b78a5f56706fc1b5930670bdece0f219cb13d1a3baa3582771da0c59edb1bcc127acb7e9809a7c4d2ba0042b26c4c93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572856485388485ad3233a56280d31cd4
SHA19bdd16a70b57f7dd140ee78731aa26001d430cdc
SHA2569f237df8fb5161d1f71b0b7caabe3e5f5b9f71a2701888883d548ec4674f6f78
SHA5126a0beaaf3697a5ca2e132c78cc007ba26fd9cc8ca6b4a6c01df7b3bab1fac9d7914406ed9b8dfc09189efbc4a0c8b3459df3decef4f33c7ee4065e340e0f0cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577cb2fadec61e908b54cc1fe82e766e0
SHA19e0388a56440799baa21af8c888d0848f2d73ac7
SHA25656b164b3455d5f9fbb58057aea50ebc8183e3853ce2c1b1623b732a36b3ab1ae
SHA5127bac4c3529bafcedcbca8f9d392a092f58152beeffe7231f08b83c036fe8062a4ff27e0ba1a5d771238371524c8c0a36c6ad4b983f9a95f20de01c0674a3bcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a690b251d9be2b58e200e15303783959
SHA1814eb373f60f3312dbadb6c74f75e8ec6bec4426
SHA256d6b69791530c16948a6bede4b281e1eaa9b6be50ab0a10b5f15b971cbef3b6e3
SHA512c288f7656533d5a9f7a5e7142c7236988a3cc40c70977acf5dc0718f9ced344b99c88f740091d10edec65fc146be8d237ab978d91163a4045e04b139c45d90e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5092f0a194ff7a320928ebbd55d0bb4c9
SHA1cef99d87842ceedc6427ce40e28f1af6f83baa5e
SHA256a2147319a57cea1e98a83315f427fdaa717e9553f4ed110c3e988f327612f8d8
SHA512670236f92f88809e59a15ec7d5a62107a9d8f236d5864be68afaff165bf62adc393eecfed2d53a680fd15bc160c55334a445c34ab9ab23b6eacd80c56f9122f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0718b1e8604b0b34386f919cc0cdeb5
SHA1b267c525d36b1cd8ada6c2be0a648ec7a537c830
SHA256e2e1270f8de937d406339ef5b08fb7aff1a9a7dd125735c9307a3d61b634c078
SHA51235bd508b1c6fc3605a04bf962d60d554fda8ed0cc6d23863b1cb4a19197c5c80d11caedcb0061edb273041104db364781f81e9bda1fc22f9efce201ab432643c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5497c6ae09d0913fe2827bcaf711b3b2e
SHA16b880cc55be976bdcd3c238f9d3d06ea73a2f2fc
SHA25692e98af7d7129c98a00d7592f9eb40c90161b96541dc7a150bdd00ce2c97065c
SHA51225568648fd012f471da6a6deadf3571117906728ebf2d15641ab33651a3b4c3a54f5302642b194b4490d9b51fe0a5e7ec37a62a4eba2e928f6de0765a2caefc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fee00e990c763ed0bbb9d92390544bc
SHA195c95c5e8665b13a7fe0c7d3cdd89889ec37e844
SHA256aef774f1943bca628483a5b72c52f6016cf6abed151ceb208dc9bbc0a3ac5677
SHA512aacb5d7b50ed6759feaebcc3676dafc5d0e62a5b9a8cdc4519a076f83babb0faceb7d9060b90b0bdf532dca000352dc00b4bcc4476bb1a912dd38854b2f998a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a