Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
3ae9a30240f2810b56c0722a001f53ec_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3ae9a30240f2810b56c0722a001f53ec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ae9a30240f2810b56c0722a001f53ec_JaffaCakes118.html
-
Size
34KB
-
MD5
3ae9a30240f2810b56c0722a001f53ec
-
SHA1
4bd873c19f80a7a96f7f633735a94d950a814030
-
SHA256
2d01d1c90b12f279bf5cff970eee2d40f4992aa80447b708526ac592ad26dd13
-
SHA512
5ca4a4286395cd94eaea95d0746877ddf2ea6cf2d0290c7d177f51b9d09f29950d1f7a79da32f485c7657577ad516ff3823d041a697d13553eddbe50f4e9f5ec
-
SSDEEP
384:SnBMCC0tnr6RbvU0ryypBAgNiD+o9SeSjBUB7cfGk3eYP3FgCNk8AAaHSAPA2U7B:SnCKM/WRDkCznzVEl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606f900885a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000dec5526a1d1cddb6510725a7cef7dad4ba0700ffa7e75c32d3bad902b3ab46ac000000000e80000000020000200000005016cc18cb6fe3f27515572fd326a36bd6fa9a2ce830a59f97a62ccb4203be0b20000000fba1c6a3c2f3f37faef5f51b923d2561b2d49864d1af3e5d664fa244264f5b1440000000894ef5011989a9def1c6e4a3353ebb5308be8bcf2f91a9e6b5d295f1314da559ee17c1d316034bc69f4b43d98f9ba0244a0a92ad2505d2529445702e800e8199 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421691258" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3333B791-1078-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2024 2428 iexplore.exe 28 PID 2428 wrote to memory of 2024 2428 iexplore.exe 28 PID 2428 wrote to memory of 2024 2428 iexplore.exe 28 PID 2428 wrote to memory of 2024 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ae9a30240f2810b56c0722a001f53ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5bdac5f45cc7fe4d77bd716e3a8da2
SHA19ad6afa0492c5eab6f573d985932355db55f620a
SHA2565a1573de895378ddd90e91bc54bdec4377e408068857db49956c1284db878588
SHA512090895d1ba698109fe8cf567a45c524c8b57c58fa32495d26695498cff61de721911165e0212a899945488756cb235669e3b691890bb349dc3872e0d1494cc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc98ea2b11271b06b5fc4494678eea5a
SHA11a311af84ac316d8af6dd028d7cec523cecbb888
SHA256a5f34a571727995815ed665679e6dccaabbf113e52290ee64178e7dd16e50189
SHA512cb7f22ffbdae657087807610a360e309c231f7ae72c0ea2fa082c0f1265668a7f5294e3ae8c044e0fec06fff3a954451b9786a9d7a6881ffc89f34e0da973bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb1a2868518724429720e71d902c2f4
SHA17293ae073992a7ddf2fae345a1af9719858ee507
SHA25686d343656931446492b0a388f7016933a9b55812691215e01c39104acde2ff69
SHA512e70c92733557b03186e27748c582a29ecd549149582f39172845773ba95acc5cc75bebdda14a14605158b0526a0714992f5d30a595ec5e0467d5023845f135cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6ef25a772c9ea84c105c8f4fdf2c6b
SHA16a0afb1a06cefac9bbb05f538d1bd7a903f82856
SHA256eccef062b2f30e3789d77c3006642334d263abc46289f7793ced69b9cffbe75f
SHA512978ee7e037e6cc70bf9d7c2f09bc7b5a316cda742a20415c96b7511f6973191d1423fc3fad3cca72098f9b9c5370c9a6dcce2f02e7055e23ed7515dd440414e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d831cbb1e58cf40ddebf43e018586948
SHA106834fc9ea60f8161f37d263f69abf7fc5b317a1
SHA256e8bddeab4468fcb0d7850ed66d3d527289237e99e2a8caec64eaba548fbb8443
SHA512198458d9d602eba7788ffc0623eab04c7ed20e45e305a517a612241ae855e189141ebc3ab51add38ad65e138492025c53181829b7699b04177f4c6f6bf9c88a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b871b32669338b2c1a5385723b99b183
SHA1af97fc1a55aa83c5e46805181cac4c6783467aff
SHA25645d3544b832356301e8a3bb527bc640125a72d29b840adc9d6bc149995ee710c
SHA512f0f6858d01b48a188db6adea6e9575450773548b40e50ef68db6b158ae14de8265169d8bf8f7296a573435c094081bcef48c692915a9f49aac1edd8db51671dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5780ec8e0a06467b3fec17f33298e8e13
SHA1e332b56c3bca7bd27faba542a6493c2fb94f0d87
SHA256214df4861a0483da8abaf00d415028801616989fffbdfe30fbd4ca1d303b059f
SHA512944333bce3171188481642c3770490ba8f775b0ea3d939cc52162c075e1599b66ccfce1ff4acfec9b8fbb681336053cb1548abde9126105018fc266d5ef6e3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50989ad8a429cfa408c5d3d662a6f7fbf
SHA1a677a70eaad2f7da427742f159d2d63767c113a5
SHA256d73cf396c4936cdd817bae76cc7c6e99210946dad21c1e29a55948d42c0b7058
SHA512b92a92b8672f91f0c26006df5602ebf52bcdabeade054f515e531f41bee259ebca89d317ab173229c378cf51b0e52f60d370a625ed14615708c6efed0396c814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792a242cb4329b0b197fe8ec5bba147b
SHA14e3254dda637940ccee2ddccdfc1d59310ea8d0a
SHA256a2360d9b2be241926176e4a8994bdd93b0d85f27486dcd6e42961add7292c7dd
SHA512343c7edfa450b5f182209a7bb093128643eab010a099d2bf730f6db1fc789f32df6004c30706871b074e89a8f48805be74dce6773113197c1659c14ce5f2c5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e551853e881025e267dc8fcdef160202
SHA1825c8533019fa983fccc2e6cfdd97ae039f4208c
SHA2564a6f62d1891906d79b2529bef6cf70a427d0feffa35c1239391cf3b12b2275b2
SHA51201feac15c9a73b316e9b4d6305ae91c5f46c200d6dfc8203a69e100c13e61bdeb6e362533a0e99c7fd6fed7ccd79478390847e233cd766b8952530305dc0bb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5990f06160dd733208062f77ea5ef6d73
SHA1fbe06f667494c2ae5530b6ecb1fa45a9a5584813
SHA2566f9525210e995371efd4bd6eecbd088201164d303a1ffbe85a3a213024467041
SHA512ea69efc632f836e40507e457ee59661c107d568bb852d90fccd7a90621f9ce07431a30700ba155f4238439bd164d83fd272c4b9e6bb53502c41aca34d58424fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b4f001fe8baacf3f9a5558eca12c89
SHA1b862d0ff4e2f52dff82b507053557808ba7780b7
SHA256c97b2d2610687a2dde06cd5aabba0c8a9c9375242c5c13424d52c8abc7df1b7a
SHA512c5517669146604e4edada8033124a17d06f98b33dc2529c7897a975f59ac9085c9e1a9101a60ff9a5089095dcf46ede80e494c6453b41b127f6d8e4a51526c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca46097ad47f63ba295f8288e789bbf6
SHA1d5bf2fa6377a76070e0c5a417c0a9d064307b461
SHA2568f3e3b61f677ef37b9eedf24e50cce3d0366e12f3c63436914a99e16a117f757
SHA512b87cd716200573e77438533915c290a8e427b8a3677f03ac29b69937a07ac85b3077c2db64dd535509c3684b465282994e72955e4ce45efe4112133e204744b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e22bd1e102da04e14a027249ed742b2a
SHA1d7ded0976eec786fb7aa49a9b9c674b9d0528be2
SHA256e18b8782fb23ab9eef936cc28baa36f12b58812263f2e811fd735f4f7f0deb58
SHA5129d5f9b06c1889874b43d90aeb4920b92e1870d79c17a03b241c297477f09856d28b080f8ade6ceff9d972e933579cc871421cfd51ab4d9f7d7baa95f5de844c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e8c1c06861f3cfa86d7120c7e1901f
SHA14791e662e033ec7d0456829e1e9f96209ffb0665
SHA2562f1b5827b70266af160dc3ff507c5de0347477c081a9e3c663732e15ceba1caa
SHA5124a073647658440594a770d8c7856e606426fb45ede31de18e2d5e2cc6f219bfd255e3eb275eccdb8a6268c6976ba00e121a3f4e5bc5dbba4ba3662477acf10f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c39c3e24be5d46ae5c3a0c16afb156f0
SHA19175e36b7c3ce69ad98fb4504ad48ad635a92f60
SHA256ad929d664c67cad68a0f3ea81171ecb8324d91ffc5ec78cff15314fb4fc7d31a
SHA5120c5a5307620d715546adf25b5589d0006e4fe3e9ac088c06cda9e4c61632921b98ecfdb455f5985f3d5ae1955e7bbccb20dbcd80f92f24534f65af2d88b21760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b771c53793288da891450fd814efec9c
SHA14c231f88caf4b0b54e0cae5f78570ce194a3d6b4
SHA256b223aaafcb4589b2455542f8adb46463ea1fe48eb7a79106aa11ea5e66b74fc7
SHA512fc36fdea5edc6e36ec715da88545df3a88d49c6263e8c06b175a9f0b2a3152e126394023de8a576564a7e650f95411199fe83b3c74114e583886716a3598e722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53625a6d7cc7ab1eb688019bea2969c02
SHA16ed977babb6daadc37fe5198bdeb3c49bb710fff
SHA256a9fe4e1817a579fab66e0fc3f33e6e15415e0e42d5c31cef0e22a4d521b817e7
SHA512106d833de0c30d64d94e4eb7c0bcb0fccbe5f27c6384f2998330310da31c5a24920b0944336c928254df0cdc8a40f744e0dc8c5d949471d587c675e6ab1d3814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2b0fbb4b825b3dfd09bab32fbe6ffe6
SHA121c9e4eeceb687344c6a5070d505d2616c14d136
SHA2565e20467b38dedd1e0cd86dd986792f428f4de544a680be5827d15deb90e455ab
SHA51202b275e14a7d9acac5cebc5e81a23006ccecd4a398f1498d7ec3ddb0215b621c675d4a51e5034e59cb8a405100d86fb8a804cb90eb421abf37a9105bfaa262dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD583fe673081e0e5e63931847e58cbcc26
SHA186b71d19044c6803feb6cabca2efc5d40fcd133d
SHA2565cb05dddef2d25d34d5026d6340f724ba43b93aaaacc739552d54f42d8914887
SHA512d0ed7eb1f11c68aca0d4d9d5f366eb73d5d09ff55a1d7d54c4d940f01a680dc3d0926dd3ee003f6de5707854f8caeef53b0f3483a18b2554b3a818ebe18e456c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\f[1].txt
Filesize35KB
MD5e025b879be2c63050db04bf7aa4b3a2b
SHA13094a59d5d3fc75e0292ae04592abc724d19c6b6
SHA256fe9c2e9a68b93e94038e13aaec625936c84c77f6dd0a4dc1d86c304ba77507d9
SHA51216817ad0f64cf152720049099d89ed7d337bf5be729a9c69f74d9fad660acc03134d140ac681a6aff72336feeed071b2f200ca1323c51103b81342471cbe9480
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a