Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
1f63c14808be94a832312e867270d244_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f63c14808be94a832312e867270d244_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f63c14808be94a832312e867270d244_JaffaCakes118.html
-
Size
68KB
-
MD5
1f63c14808be94a832312e867270d244
-
SHA1
f6a6d22c967e672eeb86a12faf4aeda86a344d35
-
SHA256
6db314436718bfefc3737c2a324a94ed4e84ea5401ab9b373366f40897a5acf6
-
SHA512
330b10fca07021065592ebc578601d5ba9e5b12a2565a15c76797ab9e106386716ea657a07ad9448a757d8fc4081ca019b18d534b5005b7a94d28a5e800962dc
-
SSDEEP
768:JiGgcMiR3sI2PDDnX0g6NEBwd+f5oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JSRCd+fOTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000009bf850259908839b39742a18eb66296f3f16ff597e194df1b00e75e830d221ac000000000e8000000002000020000000296d7b998668ad4e0b2c5216f3a431a31bc999eeee3599ce93067675b859840f90000000a94631dcd62319fda15b4f3f1344f9fe0ce101ce96d3c3a9813e792c95ad36e3d4cb3b0570ccd13329a39036a900e958fd71e2772bbf2e5b631bcde0f7502f411078ca7a67abfeecd1fe3cd1b10fc7c64fbd2688df8ce36fd1f9f2aa7835aba0273b4793c2e681ba74005335632bcfb562acfacc046695f38143a472e3c13523a6e800bd2d0623793d2903be1d614625400000009f07aa7455926e557fecdbdf5e5003bcd8ee7d13568852f49511be9e25d3cc28a3539fcb7c3e36ceaebee7cca7d1353260b55889f8a24f4a29aff8d2f30bf3df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D87F32C1-0C26-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6053b7ad33a0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421216514" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000d43770710294e12b403a311a868208601589a7caec2c5c842ac290ecdd21b225000000000e8000000002000020000000236fae0b0960bca5f7aa707406a20091490b13106686d1ba57868af7a1f1588520000000a441f095a1a0ce6c6c8341e0723ed7d2e97c2f9b090361defdc6ec9aefd3b63e40000000f376f5b38ce41ddd221879542b6f4ee551bdb7435259c940563708d6faf12ea190aafb5c721878c61c42fcb964247da8de613c2add545d63aad2f17a7aefe389 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1404 2240 iexplore.exe 28 PID 2240 wrote to memory of 1404 2240 iexplore.exe 28 PID 2240 wrote to memory of 1404 2240 iexplore.exe 28 PID 2240 wrote to memory of 1404 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f63c14808be94a832312e867270d244_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535b30721ad7f6b7c458d7cf235c61f66
SHA134c05ad4d415ebd856d38d10e23a52e49880ee87
SHA25659dba81030ee729151f0f40406b8ccf2f977b8e7db409480b74599707e366e2f
SHA5121e8decd1a8b234ba50850a0a2a05a8fa6143133fda9d868faffa49f291e969e16a2b68d3b5a9faca5581aac102694d2e00a00523d9b9fdb7b39287c29d780783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d708c749465fc2c89375f5b0256d3e08
SHA1128b56452b5823260a7aefd8debf964894afcc2a
SHA256ee942e5b18df7efb58b2eced649a6f2a6e96b96d80bb9d209476909aebbc61a2
SHA5126e83e45b31958985580ebbaf8372528263c163f1e98eaf6a21564d88568016a8490fb36dd51110040e5b5cff5dd4ee44f12a784f44b2c28f3677c5a9e0a85536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2308138449caa534a1c213e7f046ca5
SHA1c08984bd5bb25879f88f2d92c114bc9401c3861a
SHA256161767135b0536bee7eb9afe364aedf7f48df5cb4c7e3e92924b895eb1a6958e
SHA5123fe904597254763bc049ce74c092c7a61f467f50aa4e16029a6a06f10d53208b453555d9a27ee1e70beb64e8880a4c848eea6aa155e5d07bb2f356c47192b339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f3e7a7f41796fcc0edce7d7c09cfb4
SHA17dc048a550b5a061b1760dede406b5316718f0e0
SHA256bb3d1033a81395e321afb0e9167ff0a8d8c7d8ad2e5f43e31a4e49e070bbd428
SHA512ab8f46d4a505160a52b328d15369300fb3674c675c986763eec617d470b31a64e166a755c3cf0a2f664d6a4afa4c8015d0a7ad417e825f09ab0f1ccfad73e087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516705057d3f174aa0e6a013ec0340e4d
SHA104a09323edbed362d93ade38f173eea865aa8fa3
SHA256cec2eeba3e2314b17287ef8775a021e9b21a95515a219edab5ad5f95e04aee6e
SHA512fec8ad1cd66d707fe4e36ed4e7395715949e22aecb16e875beddec99d6abb09eaf0fe9aa930172085c9e315eace53abf6cbc4807fd89cad6b1529a7da6818de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b3bf6e4328e60432b72c8793e6accd
SHA1956b4fc6c1cc23c6de199acc2e29a559d338651c
SHA256192840f8abefb7dabc1a47f6830e6c3c8ee14011970681f32e84944c1b6f356a
SHA512bb3d29553cb8fa9caa17c1535b4788727470394c67231a2fc5b0f71d2bf901d88d4104500ebb80d946ffabde986f6b74699178f3874662eac5ebb8bd086bcdf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50032f6cd0530f8fff71409dd1e84119b
SHA1bcea1ee18d702b73a9d844ce9891c24593f620d0
SHA256e821f47bbf6e537f059fa86478f41525b3e7b2638b48db0eb4f8790ab66bc134
SHA5129d6dd0db16b57a0775d981d48c831d3c5fa35ed0ce2f6469b1c9ae4e1d74fb6423f7786fb03735a098366f3b6abb7f2e4486c4cea788efe1deedff684cc37a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d71cea84e69cf3d066ceab36e99a3ef
SHA1882c9d0255f6f94bcbcf9e113e0adbdb8d45e646
SHA256d84b24f98ad82a39b4cf571ff4f441b4426c64c50f8c45fbea9cf51dfc8bab32
SHA512cbbea3e9aa8634c1fef24b444daf93d5fe9a80b3142caad3bfa9c492b9cd2d3302b1a8c753403551f6f31e67ef9101d707064c77a16ec61fc01c475033513f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5889a07953f542576dfb87c93eb1c4621
SHA17e2947791bc12c1cf9ecfa49da12a57edf4bc1eb
SHA2560b488d93846a49fff2a48da64220d7b28bc17d72cf7f85d0086b4671f70d45f8
SHA512f8ee32fd6fbf6bd91117167d38778fa83c040e9bb8932b04007b638d9ad4a9290f50ec773c72ee1557bd7763e90a998d6d546e4d497bf5a18b33b597feec28fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d572ade2eab161e2b2b85aef89bcaf3
SHA191ab0a869c859da2face88f25765d121b9e8666e
SHA2560502868abc2e6a392ecb1615a2fc70736ebc49bc13b098e1654214ab0e6cd3cc
SHA512167c40c3ee298d4caada87c56099aa5125c2470e9cd54ecb5bb1d74636fb4dd313fe37b20216fe2e1aacb43193cd70cd70272c6a004ce2a7efcfbc7d026b54f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c179261814f4d8801944db0adbff4d13
SHA15f5bc336a991e241aedfddc7da0d2b01f3a5741d
SHA25697d8eed13f9131173967d860e04ebb6ec37bb5fe4bc33db1fbd93be6647a9cc1
SHA5122d5201339c82d196bfbd877d6f34c27e2131863d04e5980592c3146c53115d2807802d59faa5962ef5c24ff3280a17a7e221cac9c5274b0fe5a69dbedff5c264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf92a35549a0cd8f3d781008336a7546
SHA1664bbaeaf2368694deb172b58e71a761882ab04f
SHA256f75e5be95c565ce0007e29a4e833cb202ca53ca069e33f90b82f1546691021fb
SHA51282ea6fcea8f2913e77e9c8644141db07d1a81a688d7466ae28aa1002d253f37b2c6c63522e330d1422705457bbd91744da7f596cbce1adc70e057c36e4bb4891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3aeb57286da3c8f47119e46915fb102
SHA1b2d4646ebfb3f0bf77ef46609bb3d10a61ba0cfe
SHA25667913d072ed41ce6830547f7364e85dcdbe5207ed3a858e1c827798bb89723fe
SHA512d7fffa87964d2bcb962c0e40334dd1779f6c5a7cea15db3dcdd591c583d4b8c590d6c832fdb8a4bdd2c89ac32595709e317827dcc5f4059713d423cc0af0c138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ddf0e7660db22b667150e70b8cdc47
SHA1e24dcaab25c10df552ac93a9341c191426e99331
SHA256a7ee1f107e4c545c629d04c45587d7d19fad39d31accfcbf876cb63e79831482
SHA5129ad0bbe12db26231117c541fd00dbab354e3ca82d434074803d20f9df4bf302f95ad00e3e958b3bea3a9ad1484bdc4391b6da6251fc6e425039c9de6284cb6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40860b81457950998b117155e71b4a4
SHA1bb04f6aa141faaa5db00aa916cbbda5f09bc91ef
SHA2567042796114a011d068daf1bac4a2490a8acca0d8b7b7165e2a35233c84d47325
SHA512cf64a33ca69765492828fdd3c09bffd265e3f6d1c1b2d98eca06da3e4c897c412a732ad210da3324509d69451082fec5326fc62f8b10efb09dce0cb1b174ae1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce75010d2c16672976adb8cc0c78d9e1
SHA10d16c43120ced155f37213348b15c7e32c3b534e
SHA2562f343a1b6f0a052d55ca266d3d47e9e805943ca97946f931ced2c972950b7abd
SHA5125ace034251320d6f3630b55424c42088644ce08bd615349fbe5068dae7d4d3bf08d789cdd427392ffcd452b0c8423d6f933e376013843077587c6cc9d6da2bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504efacb80be3d7a067b66102844b6c97
SHA1082f1fbc511ac1c27f6d3fe0230ee7d8f3422772
SHA25615a751366076fcd6409fd59faa1e80e169173f1e03003e84bb6b1d05ea76b8f4
SHA5128e39aba65ca6a65f9510be645be3b143e2bf44874b193c8c054fd760b52b1c8731d572ed0a6583525208febf3bdf37aa01396e802674b42efef1b5905ae99348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db9850c84c72661b92813b78cd8268c7
SHA1c00bf3489dcb9c31c0b320bee7a599d7f708c2fe
SHA2566c3310830cab33957d9a7df78991e1a478e1d59683793d5a6151b4b1914e01ce
SHA51261c8df524744536c8e131fd8706c9481f534492e3bf719e1632cd7d9767743a9a23ff11dd11c87d19d3501317d8e14a049e2acd32b7f8a759c8bacf5877086ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff96f826c726d263250c15fedccf3cea
SHA109fdb589c2fd10337f57e519f4a3f3332b4e45e2
SHA256ab9e42182ade9a24ecae61bd18a6af149566ece6568b3dddddbd29cfd6453473
SHA51247a692d3e40c4c72c4a0fb9fdc1734e8c24c83878fbcc352411d01fb44eae4b2e40f68c152844878b506f6abbc73b2ec633a6e5b16941e36c8cdecdb55239886
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a