Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
68f9732328fdf9bae8ea0617b78d93fa_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68f9732328fdf9bae8ea0617b78d93fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f9732328fdf9bae8ea0617b78d93fa_JaffaCakes118.html
-
Size
2KB
-
MD5
68f9732328fdf9bae8ea0617b78d93fa
-
SHA1
9ab10794f961ebc42c50ede114ee88559481bec3
-
SHA256
8ba8561a5cdb77d35fad882904447bf77494d287faa969ea2f009c53be0131a8
-
SHA512
f39af548ce66eef46834617bf72e6721d1b0383f18184166781d0f962700aad830038bb8cf6e0e09869be98b5e398c0946b1d2764db6fb7578c510dd5f66155d
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001e3c3343b24cf37dc9567699883da3db7fab9d2d0bbc71e7a4a18c539ffe894b000000000e800000000200002000000043c34a13052195e61d193f7c3507335df8c39f3259e62e65c4e86cc8c303452520000000564f448c2164907d6b43b4e7979334b7d134700ff5f14519b0ca66cd4042270940000000019ae777d2abea7d7df5923042dc2de09631baa41500c396c8f319e1a840d3bc05d891bda16c90c167fde99f5831a68467f503336d6c32e5435fea83897b473d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E857A01-1891-11EF-9F9F-D600F8F2BB08} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408132539eacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 840 iexplore.exe 840 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 840 wrote to memory of 1044 840 iexplore.exe IEXPLORE.EXE PID 840 wrote to memory of 1044 840 iexplore.exe IEXPLORE.EXE PID 840 wrote to memory of 1044 840 iexplore.exe IEXPLORE.EXE PID 840 wrote to memory of 1044 840 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f9732328fdf9bae8ea0617b78d93fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d91cd3efb51c911d7cfb86f371e863fb
SHA1507f82afc9bae7986c7b5037aadaf4c1d781d830
SHA256ad3ab4f94d09cec2565a4ae4fffa99d802ae2fc4ec8d80d02d48bc39418dac1a
SHA512896a18a522c55af06aa0e5c02e48d41e3fcc7df2dd6e708b5dbe6b0572795d6a14fdcf01718a078070b8d4985a39bf757eaee4260447968a1d6c028a32dbe2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052fafc3095932f515028a0a26929ae6
SHA1b113a70bfb7cebaadb62236d22c4e2b2530bd69e
SHA256d998ee0dd361ac6be983662b53289d05acfa1aac97862f92ebe399bb0abaaac1
SHA51295f4430cb6520ec2b8c52a04c56916bc737763dcf046dccfdb4fb78bbdb222acda95d125f6608c34a125666a21407fbf6c502f491f26eef0d70e1bdb5f43c254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134fb62985e34b477d2413304964068b
SHA17ca4f73950f82838e2acde6e62f89bf2b43993ae
SHA256a1a87434e5d53d2e081a8ac0df41a76141dde746651188147ef2919e97c19b5e
SHA5121d05d75de3831abe8933848a8743f9aa8b2662d92e679d06afdf052e9819b264b2c8ca73664751b647f750a22b2635715212588368a21a077bc3bdc554c7a759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d42e50fcee8b2b85496898d598df4918
SHA1f329e876282fe1b5322b59414805a85cbc894142
SHA256bb2b3da748cf94f53d067032c7f876ee91818c46645ddb56ed0b12e9cf05e2bc
SHA5127bd1b99c655690820c1afbceab4dbd7d182986f4103d2152130be6815276a2e77e2f884915778cb74675009dd38242f3e71fa499a10d78130f9b2b1a6457320a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efcc7c21d6ba13538c10d00ff200ae5f
SHA1635a2a6d984530d84bafeece095641a776572419
SHA256bdcb2d1d938fa7a3f66bae328584b0cd4393bb24378ac1ef80e882276a0daa7c
SHA51291bbdf4a27937a2507c3aee9a99ea371d6bcd98bbb6f5abe5e24519aa542da2ba0d3a293fcaaaa4b3ce7ed226235f56271a799eb476875b400ec64bf11f459c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb2a54f82fd49088d1638c1c4d04fd6
SHA1c2145b77414986ff106e243b0ebb87a6396b6fdb
SHA25660601ce8b8b7fa830fec6ab676f8ec7680803c1a09a7d2501143d40b731731fd
SHA512f21be52e464e2557257301bda9add23215c6ad023a0efbc4a7eef1fa2e9f5ea79f4fc74369ce8bf0771c0ccc4a6bc01ed89c9a577514491106713096ca4a13f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e28bfe4ac99ce5355c39d49ada3658
SHA117b35c94dd1c5df9c1537dce0eb7239f7cda1874
SHA25647dae85125bddf0d7ab6fc6d75b72923b1624ee3141fc24ef62a4683ea6f2dc0
SHA512ee00c73552ca4ffacded716fe26a79b3b1928bdd1ea4e1d5d6ce5586cca7af965d5e9c26fa456f7b43ce151cd847175ad0b62c2d292c7fe3eac5222f083a1efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb70194cd7cad610a21f334a927ae6a0
SHA112cfb0162ec6cb309cf36ff60d374e6dffc4f686
SHA25689e8c976bc3da3b19ae03d8dca7836e507caee9037ed1f4ed1270de647c5bce4
SHA51235c61607365b00c5480f8998aa796eb1d901d0c4d6686d6880a8ac439dd1521140b198dfad83090d83dbc13159bc75f28c2ec3bb50047e774b4618e77249b8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3f9f7bf3a59c2aa8f857ef279bd600c
SHA1611a24f75be0206e3ec1f683c9337b24a9c9f405
SHA256fa0e5269d681f80a3e2df65a584894882df57399b5f12106b53bc87245b795c0
SHA51221a153d1d55653245fc520aee2c35513c1d4b67e7598c5deeb54cc3abdd0959e2ba75a7651ec72e35c217a09734cb452b2d1531584fbce1407e2add438a5adbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a277876367bbf5c881e6eeecaab80ddf
SHA11383d4796e669946dcafc6ee771b106ea25ab2e7
SHA256a0a59621804c5d9f8f87e01afab9c7eaad7fca258a0d550cab77c7c56aeb4440
SHA512ab859fc040501a8894881a8171f15a1a971055938ed9727d21f813edf3cd7bf7f889bd08f4422102a098a230a5bd89e586d88938776fb68033fec33aca35d406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f9d8e2031a96164b08e2059bd294edc
SHA19d0f81ba57e4b3571151681c34fbea72f4f7ba4c
SHA256fbf2bfed2b8a49e5036358ce7b2f29e62dee6cb2a3b7e84284011b81e1e263fd
SHA51282812fe56f3de17a33efaeca226f5cc22fdfeceb5a9f0d4c6d8885cdeae1abb5fa33227bf97c073a76577fe82428e67755f4ca8d3eca7e7444f2b4c8fb91ee9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dae3d0bde8be7832b9db7a4860db53d3
SHA17daaa47b0eb7b62928db6688d4b2e846c7b652f0
SHA256ae1d35a3a3d696247083c3f27fe2138b1cc1f9ec9bb62d4ff3089a09efd55496
SHA512aa63d14b6fbb7c4797b91cd2d2a66c24656ae207b87b2198183218a87252a05cb206aa8a8b9eb4e6ecbac1414a4f1224d89ea55bab1344b27036bfeb0ab49fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dec5ae058372d7cb2cc0e53383bcc464
SHA1215c2be12b5de8174a1e2cd96ac80148b88d0b85
SHA256b8972527decdbe9d34a8bd213f81b68328b374ce1b2336bb9af6be26b6b19a78
SHA512aeb0f1872d9987f50e0de7a7baa406ca11acb7394d374907f44077f1850ab89f5f42c2d83ded895d7ce05701972a186aafd95d5fb674b52939eade5d559ce457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deaea324db88fe793332187a18d0a397
SHA1632706b16a4f533a90bf181aa04f42195bc1827d
SHA2561433b85b0e667be4a65b3df489d41bde9fc811731c117fb9e252faf232a99136
SHA5122b380a476cf72aa49ea5543c0b0b75be58903450ae8aba57ea7b5a47fd253062de60fe1aaa8e8c388244c59ca9ddc73bdd8e64d244267b83c185beba7dd45529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28f3389d148bd7e7312d5373bd87839
SHA1bc7cb7cb0710d7052a40954cb9f247d0971a725d
SHA256a3c912c6bc1e7e789f49df2ac3751927880631b26f9d6c8b686ca66814b0f7f7
SHA5126f433ba12be149ffbe11f3fdc1424017029e6586da23d0207dc16b1912bf5eaca26b76fb72d59229c1236ce6eea2b031610156ba5c07f718e4825b836dd238be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7934a09fd9678195c488734e99cbf81
SHA17f1bac2afd017e40b47ca6b53cbb2ab1ac73490a
SHA2567d4cc500c8c5b3eabdbb63dd2b6dc41c0a24bf5bd620ffbf04ae490c3d205ade
SHA51247c0c2976cbd5558642b9b1e1f605c151c3f7f7aeda4b19558a800191e1bb18920aa93114377d47dc9d80d1e748d24179e913f4a161562b131347c3710dfdb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6b17ec4c59f23610251d1aca942bb7
SHA1620769189a4ed38593136c8d7a17ee5dd28fc51f
SHA256b2b61f6ad720ec8bbba8bac2702a59dc6afff45bdc6597266de2c2ce73d6580a
SHA512479f781adf27d147a99ec2172e4c73523f21676ceaedd2dab1297db83c9ba13420180ec0cb75bdcd0c995e13c59eaf2cd707a192427d77e44e7064cb4554b812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c576620c9eb0f1317c8fb4d8ea51554
SHA10770db996fd4867264e14270e8761d6340427e21
SHA256de3e1cd9e369a954448c844a8e617bfe65df6731e16c03337c08982eeba6ed4e
SHA5126965052f6685e47b12c9870effc91fad49efeba2c2fe0dad23a848facc961e59b2a8fba7ef3a8f3733aa41dc547552fe8bad26dd9eacb8efa1fc4967f42a0ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd87fe747f8a41fffe2021da0fe85f8
SHA1861888996f8dd50fd9592ed4f9f666504c73f713
SHA256959b93a745126b16e5b7244d75395759e8c32dca7823c193f490a211a09984c2
SHA51280416e5cf424a84a2079b7f35571559bc4aafdc6d3797c7ce58ced63b4440d21f860082736e97d797b8cc8c416682cf63eb9fe6c6c1f4f5027f448b8d39cfd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3cd773d52d4f3405cf76be0b511521
SHA1ef05b1005fa41ac58cb1a36d2d920b2dfbdb0af8
SHA25616f1519bac709f0534d711854e468b5b178c4c0c41cc9a57b516639ddfe303c7
SHA512084cc75fcc84b75f98a9917204013a1c50a8055cc1bb11e98aa8f11740978610f396dfce4cd8c574d9804b4ed6be343149d8b16c43f20c177845aa9bb7ffdccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fe65174b855a11e815de68efbe5d0e
SHA1b88cf4f0068d25603203f9dc1f844aa9f61736aa
SHA2563834a5ccc3cbf0f7242ec39a3ce369bbc0852193245321aff8981846a4311e4f
SHA512eff235d375439c8de9925de00d03f6ef7c7b18c8553bf8db9f5958b41d7c9bdff7ca97f002ea5051f6cc2cb50af9ae06979e0fad0b6e1c5e658c88c6f52e25b6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a