Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
639a4c0a53fca9e0eb08ac47c34282ff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
639a4c0a53fca9e0eb08ac47c34282ff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639a4c0a53fca9e0eb08ac47c34282ff_JaffaCakes118.html
-
Size
460KB
-
MD5
639a4c0a53fca9e0eb08ac47c34282ff
-
SHA1
d07f2b527030330d2e07eca7f9e27626bb267bfa
-
SHA256
d94e36b44437b4c3629614ceb950242b5be474c5d37c64f2d185874e6b1705c0
-
SHA512
1507dd994a470617e27266dc1dde3bb8124e9d4a01f7cddf9d000a4e2528d00c9b6b0b7292f30712feef930bb7cf1a3f5e8d0aa27ede532efc5695ba8dcc560b
-
SSDEEP
6144:S6sMYod+X3oI+YUsMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3s5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f6d1968aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000098c16f186cb9ba86b57e701d00b51dc030a81b9de74dc5890e62ed5ab84f74a5000000000e80000000020000200000006266931dc56b895ea63f73b4cdb7eb8265ead5d3f7b71f382cb2f4a51571539b9000000027c5c004b525a5de8c0ec9f15c8630352052b09a5c586aa1b59d9626f4f907942147e8643bc03858c4369d38bf83db8b54c4183f1cee2772387b17edb01c481b2a429325bdec34d9d0e8cec532e5be9520c5df5ae0fadd4285238e98a54d7d6d94f0c3fafd323405ef3ddd741b9e8cdaaf6e7b6d3cdd5d573a4160f4ebe910c48de0bfd5a749d96d47d292dcf6d42b43400000007214121d6fb95c9872ac702ca45792b13816012e13dba8f75c1a2e2a47515516eb4e120f7744f38255aa185133008a7da2f2fb09cd174438c11e780ff7c0a27f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE4E5C21-177D-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000632770f26d032f194501ae1f1fb11203c7d12764f71c4c57d0fb5b90b0b99d3d000000000e8000000002000020000000ae046b0c9bd777164ed9de57cd5eec7171981f5b81077959d155d204b475430d20000000080121737e67b5c4b9d302d24d651f04ad4c6bd87f05733e94162af7d653148e40000000fc84c0cf2127d429d75677f742b3fb9e12f29aff0c90ec06282a9fbe47fdd008bae9365aef9129dd62cff2d0c8755413511385ce21c71c7ca9c111b7260d7284 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2244 iexplore.exe 2244 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639a4c0a53fca9e0eb08ac47c34282ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca328682f6b19186cc19134572da4bbc
SHA1af68ac5e864e57279a35c1e06662663cedc3c37c
SHA256f00d15799f778cd1bc4c8c9254f544dd62a14af4b449ca202df0b18f588dad55
SHA512384563839cc41ef5a1d61ad974dbd17aab86502a9f39f25f2e4efac50a00b56b7d93923a7285a5c0433bff91558a7fa4b2339d40a97e10e90489fb81ec3d97eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d75c6bf671b4ad6b3e4993a49c72b30f
SHA1a73727c16a9d68b5a9e63dea89b228d2f007b0e3
SHA256c270609e27579d4f0a4abfcec34f8e3c27f2209bfdf494694fc74a798d4d9e21
SHA5129dc6aedb8583186195cbb473535b91cacd2fae0efd78e516386ea375d6b7a7280d7dd2c8c71be254e8ac9b4112f3949a58cf4429f84d9270beb1559ce583ffde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572470f0f4d5a615495424b46a7b4eb6e
SHA15c8fa3e7efbdb3dd7441422487c815d3e29d88fe
SHA2562e1ca14eb041a735e92f2e3c0a90d65aea3d010b8beac741196fd574d1d0a6aa
SHA512cee476cddc43b92086d35e685b71be6b4068ff3319732c076018b98f062acf5bc58e082b2dbf8d89fa489b4960a70bf7a811a23d1206f76591b2632ee04af03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f217f5ba8e4b0a7fa15b04af53436117
SHA1c0264f4439c4212ce2dc80967d69e3fc8c1eb979
SHA2568923717a6397523c0390fea05af119ec11839edf28b6d5158f678bdc656c6ea9
SHA51258fc5b54475f77154d1998e467b45d2bd9b4a9934606606d3a4ee142eb4b1c9769fb969dff6a89c08ad29406fe4eac110f05ed066bea87436b593c49a868e868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936d3334b2a92e850ddf58736df06ab2
SHA1c74bd548a32104053019e38e8ca3e3163e16411e
SHA256c837de43e0604ad43882239e154917705d5e28b849e0f46154c4e94dcb633576
SHA51227f15c3c55f7442ba0320fc71a07f3f5ad24fcadc297f847d32f21c173d948bab80387c68e3ee129f827b74923aa7af11daff78ad0e4bd83b9c0813654b3e655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5065f2494926baaa50b5376ad8c5afe
SHA13e4a97b859fa3ecf038c36a864b5634328bc459d
SHA256716ce9a90120aaeda250547eb815f03c4291229e707a992e2703c4236f1f01fa
SHA5125182ee6898195b3587f21d0a9691b23d8bcb9de1e9c45c083c55e30f088420bd2c91b897e859ac9864ebaf86bdb0ec45f3361872654f4f80b71772fc4dece2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b00ad560ec2033074bcfb75a0b801c0f
SHA101770c0f27625a70ad3f1b2c5775d371076b1ac7
SHA25611aa63ecc1edb53fbf8c232fc5d563098af8646de4dfe9b244b55287e2d79f69
SHA5121d0ded0d1facb1b9030880c4764a65fe61a6bed129c8ccba47ee8ab286a943ebfe04d5bdc07f1cc73a1210bd414921b6f35f13fca29f145dfb67211345e4db30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3279b3360e20e08f1b730933504159a
SHA11b6c5b603739c8131bee9be27949a9e56ab67619
SHA2563ab48d33af879fe14b3fd95f6ab7c627ef8d7800422398abe83103003206b4c4
SHA5120aba7211a1bab78535db828e2ee9888905e965830b0fbcc799d881117da899a51d3ecb001ea42de78d7be481faad6f035f0eabef593b6026fd0fdd8fd3ec8949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49b32272a2e219a667611bb187aaf51
SHA1d2e121b379b30239d8cfaa09d9f66b059fbb4683
SHA256bb9fd5b04f81f5766ae2719fca1f6f827f16abb8eae02eae84fe056b651e844a
SHA512e0b17b5c5978d7bec390c6cd69a5a0ea7204568ff7319a14981519767b04fa101382a76c8b4993e14864e0be132287df5d0c4ec020c83a6c3045edb69add5b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a93582699909d5fed60f8ceae21f3cb
SHA10e6cf7ee9af95381a8d24deb4aa4dedace0c680b
SHA256bc18da75a27ab2b77d8b1efb70bcb8f3d62c3d1d543e38e03d1f64a868153981
SHA512123c7f48c57cc6a53a6cc9c7a363c363b1a2084b10224d519f244ba87605aa920da8bc202993c54bd951f7fe2c36f7981cde935420922dd33ed559efa7c91e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3e5dc7d27d66616c12ebadd80fdf66c
SHA128b2eacc5dbb1c6decfa93b3795eeaec4d352a15
SHA2561a5e32da8fa88878ad5be89b621573f59ee7a88eb16b2f9e0df2a28d60524946
SHA512a33da98ac66f3375f56e3cc1cd150ca861d6b2d51d8f94771145e2fb9f33691884b0aa21b7d3d810cd2d998f4a476bc930419fc11f3ec99a46a271dd363b94b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534e7d1ee33b01754f140612737c14430
SHA13851f8c100fdf37d131371d96de7bb4dc90cbccc
SHA256d9514131ddc194a3c0e6f9f05c9c028fd33b26c55e1b9b9777f7234a0cf9eaeb
SHA5128e242a1e51fd7c2e6b4c9c5500a1c9ae8e5198fdcb0237fa6997b089eeec61b476ae8c092175edc8f36ddd15665bd29112d5184057a720544ccfa44e3a056ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55658ad1bcb2fa7c8d4acabe3e4b7152d
SHA13358b829d04ec5d1a0562e76e62ef5405f38ce2d
SHA2565a5ae9dabb4da8e28138fadcc63696799295aac44d03c0870804bac001bb369c
SHA5126af960889a77c63322c432f1680172ad6d9d644173833999c42d5310fe5b1267b3dd50857d885ec97c011c4eaa0f8ad85d0c6f30de98a7cfecf46d01b0f78a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548d775aa1cbf512594d73eccbec30f10
SHA1f2d977e0f4c097df0e667403928cd2416245a701
SHA2568d9a56170620dc27ec96cba820f95a8cc4e35dfa034b4d2ab11eed9e08a55d4b
SHA5127143a606260f3e970d8cfa428ea58df1e3d073536baef1a8c7edededeb0467824ed80b57569d2eee2c5b2c59225628ea1f1e8e7e37e83c51bf7ca608a3f15f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525781217ce047a86b4f31b790ea1d1d2
SHA143e4d38bc6a2bfc8eaac4e83535894d29d6b3d37
SHA25661cf29b5fdbb5701d488e7df9ec8bd69a6c3a8632e192cca44eeb3b75bbcef33
SHA512447d0b7afeeec679f3357675eee27020162d82f1c00c69ab279cb78a9bea48809d9b4c1708a19f7d3bb87baf3fa9c584c4bd36a12f60c08115d9a2168dc073e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509395aaf203c3a1647a7ecde7d9ddde3
SHA146f33b77c5ef6f4ef639566b1d39adb8a4aa0ad7
SHA25693b184a1f685e2b3584b0314c27032c589862106213411febb6188574cd11d87
SHA51215f79983af1f24a369aa0aa17dbdcebf37770f646f50b6be6bf6b0b29702a120d311070f2fe32caaf249785847d67d8df328d5e5e7f334731ebf06f5410bf91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166397267ab5d9a13ec5930094e91064
SHA1a68a82c4969740a0b5c25ca5dc7dc5b64df55060
SHA256ac621531ca61d041f250b806d5146cafcc5b8e143404e72c2b4994273710384b
SHA512c56f93758d1c446fbe7dd75719076870a3dca401a483ad4673df2e09e6d21657e78f51d08c685b027962c6d84c27c509a7da81a216e2f96df9b7033669a1dbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7560bafea654b5929f79bd44d054de4
SHA1151de0aaee56ad3c6d34502d6ff2a5a9e16b09b0
SHA256f40dd0342af8d9b55b3b96657cc04aff212cb27589efd4c3be69d4dcce5029a3
SHA5121fc37ef499af6739e9aa49f77e0cbbe20aaf46afd9e00c5e867b62f8de79bce3cc59f39430204db04417a1aab0710c4d7ea9dd0bf2f7a0e1428d04e34333a36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b956867ef9cec400f53ede010de4fce4
SHA1f88c4ca601e63935348b1d515898dbff5e70088e
SHA2564e66a853b9dbc8cb02e93bf854b766a7cfb20a8d7ece25bf12d016a8c33c882a
SHA512af0bd9ec8aff65e5a0dc902c90b075f1e659c2d5158dddcd7ca78faac8366bdb2e271d51e95d289c359ae77de80ec262937b318b184933ea8a636481eaae132a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a