Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
68d735752074f1bb89d7de8b59bca1de_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68d735752074f1bb89d7de8b59bca1de_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68d735752074f1bb89d7de8b59bca1de_JaffaCakes118.html
-
Size
214KB
-
MD5
68d735752074f1bb89d7de8b59bca1de
-
SHA1
d5549e5d10173179a50b382d93f93a16092ed09b
-
SHA256
c8faa733320ddcbd437fe618788efe6f61175ac05a419f355c5276b16fe62746
-
SHA512
b5af2924ee75d30c6e547a2ee61586b4fc4612bd8ca4abf8cab1e671f689aa7e2095dd52eac94604ddafd6fb45b829ae841eb93b0760ebd0c3df6874d9339802
-
SSDEEP
3072:jjrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ+:jnz9VxLY7iAVLTBQJl+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578525" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e5a51a97acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06F83CE1-188A-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b2520f042d3e1aa62af63c3d838ec39df8cd37e54425a246c944128a1b243713000000000e80000000020000200000004af93526a2189089cedbdf04fce8ad495c4e8c533cfa59ccaa455d5849214a42200000004e9fb18b93220796d7480fd7d8054c3ef1e5eaf72da6a54bc3d96930a62b8ef540000000e278f1cd809c2ebe94a61631387ccfa2168b6c670f88fcb92a89deb3e1ca00c268bb47a49743d36a54597eb6fc855ec801485e8b1f6a8a7255419ed9d82c77a2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2228 iexplore.exe 2228 iexplore.exe 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2228 wrote to memory of 1236 2228 iexplore.exe IEXPLORE.EXE PID 2228 wrote to memory of 1236 2228 iexplore.exe IEXPLORE.EXE PID 2228 wrote to memory of 1236 2228 iexplore.exe IEXPLORE.EXE PID 2228 wrote to memory of 1236 2228 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d735752074f1bb89d7de8b59bca1de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5219480c75e344acfa42aa657e9d4d108
SHA1d16a5f1a614948001bd180f93490aa0d2668138c
SHA2565ce49ae62880a5dc708eed8d2210aa0d334f487ff99f1a4000a9b207ad5ac885
SHA512f78762b34d4caf5d9d1e3f57ba76de864157d3517428294e63345257c6c06f8f2a405d882ced64aa95756b213ec62f8a25fd45d6e6b5a9caab58be04a29cc8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a54e5062e7f55dce69f82beba4069989
SHA1765fe85d9cbc9b3a1bc8c68e7f3a6813b27b4b74
SHA25604dd881031d791fd997cd93e3e29bfbf301b764c0e1dd44c0a39cbe43f876d9e
SHA5129f9c9b127754bb6f6f2428d0feab3bcbc682674abb2fcb1097054db1983438eac32e15b2843a5e9eb65b9076030986d5d8b795a692315eee951be6222295f1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a17dc4334c80564a30597fe958fd5e74
SHA16cdbed1885f111252fbac6b7abefba4d844cc053
SHA256b23cadaf9da44f9f423e3e90a7379f0223a1f3c6eeee0301399da443a1ef52f8
SHA512abe8776b4947a59213d50927a19c01e86c39b884706449ec9c3fd300eff9cee7c1072a580c25f16f7bb207ea66b582453a7880cee8c9e484ed363f76638dc8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbc91666e4b973ce8766dbe58c5e29ed
SHA1524492f7ff82505963439807ea3f40560b3cf0a6
SHA256295a770bb043b92e42ba1aad32e1346e2540c27c0243c21fbf9ed4638f453b40
SHA5127d17152fe2421651429686b5a968bf4dbb0b310951ff20d7c636a9d886e9a0d7ae23cf1dd1a62783b033a4ba48348a2bbcb9057d8fb14d3a9db5f47af3f4d28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534cfbd7807bb8dbcbf60d77de4cc371
SHA1ad81bf12d048789098a2e0959433fde995bf77c0
SHA256938d1c8bf8c3c49ecbaa5a063b7f905dd2fbb6d35d94ede02f697b08c1594f10
SHA51255c60f7ab7bcd6b0078879e604b5e0dfe17b8699cf230832a719f27591b2169b3171eb1457c68ee9e89da87e3da6a2beb88c1d45f8ba3ec3f45727ef23d8015d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816e151e2a375084dae5276984f77bf6
SHA124c2d54de8e0b7e9de07e10bcdbc937b51cb72d6
SHA256725cec36f0b825c27fdbc73a7a03cc8e0b23680838d395029d1a4ce312e151e2
SHA512f7449b123c41ebb72b8dbab44024abf2b5c0b5d3ab0f5687864c2bb8548b669ee88a79c8fc6bac27ec744ca4e7559ff788171d0c33356723a0b3ac4abcb488e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a1b81376ea7df99350819df8fd0fe96
SHA18fa7077029e78c3e928eba7afd18782903f3b27e
SHA256ba58257a9d17005a5910687091221da8ff85f8e69adf9c53884ceaa38feea32d
SHA512cab9c9f1ec8c234aa765be627898f4adda16abf1f89ab8921e605d213890381340f0df2b00dfddfb7a236c309f88acab0641aea65b066e181bb0dff86f53685b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588113f35bf61014cc70ca2956c722083
SHA1c04d6a53d5a84019f5c18f027b6eaf3cc1d42c93
SHA2564b3106fc7b7464b34a34a8de749cd869fcc32bd755d45966a7132d5ea27d6b5a
SHA5129a9a78ff17c14d2de07f4892d11c46771e8f9499da002e6b1f0b0010834b713d5651322f88b93e5a4c2d563a9a26a53ff20830d3a9200692eabbfb2deda843f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531424cebf5208f788aa1cc55dc9bc17e
SHA14b89ccb7bb53c4f3b721b23e809c658323628a07
SHA256bf290b91fd44acbc0a5d5cc27bfc3b3b6719d651d7c51d26d14b3190da60b50c
SHA512d9d3a49494d1b43675f9b1b1a4b784f8fab625f5ab19b97d97962b3a87615421d0962bc2db2c11ebdd0f4a17f93826d10de0f0fb65d3e7e1236e087123e1d7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5158f5c7f5cbb0d7c0213110a04c5a880
SHA1112f275d50b77d571a541c572d05531120b2a2e5
SHA256887b649977df9558ca4c78d789fa36d79794981c099a0043aebd08fbb11c9167
SHA5120b1852210babed202a28834c9fa25a217f1724b469f25ecafbf1291566cac77bb5e639eb6176f69d798e102c99ae467df5059f826dc0926d9969065a76efe741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b85909acbe66d96b2593ae232ae0d4f
SHA120534678f87343a537156cb70bb0aec0984b9a45
SHA256c0b3833e4f1b0ea742ea9213441939918a42d5d5af4f941be350b012d0de502b
SHA512fc7d1b17479c33c087fe67861091b7bcac960a844696d604d5c32e37be4a37321199b8a081c341e99f3a28c71a00d3a48ab62677e21a846e6ee6f5af865b63b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0fadd5203715ef6f3900e12072a2a43
SHA171582a360f58f492051a48e3718b22812e68378a
SHA256eee352643f3c7edd92ee3dd7879f9f8d4554dbe03d475208d883bfd8f8b8d836
SHA5129f57b87f2c5edea8e0f85d263503685d8ea5c770cc1de9e85fecd1e5a73b3aded10cdddbc90bf71181512f23626baad6c59c17a1e8ff470604cbb6ff971986f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5628a6347ea81e55fb78a7cac34a5cb11
SHA1d3d2880ed2c58b72a28398a4c0023506dba609e7
SHA2566271db15730e6532afb55e512ea9c715e5ce6651d8e388c08cab380554513291
SHA512c2c5474666bb03809b818bc2b93ee545332fdcc35cf2b9401719c010cba82407bc7b9a7e9c65f3c2f5c15389a076441d3e634999fbb0bfceb0c7acbf2243d39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17490f8a2e14b315fbb1aad49b646a4
SHA1c1db183a83a8aa74e5824f79baca11cbc63b897e
SHA256ca5a94f6a5cc017704f72df6fe6103a9ef52c7459b72187b036cc55bbdff8cc0
SHA512b166662f2485d180c8f5d14a4c2bf19da85aab60186f4159fed287cff1e1ae76c4c41bb891a9764d6ac65918bcac06c01ae1c970c7ff4a8d1d1d2fae4db95872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dd52c1ddd0b2bb760cf7ab355dbcb6f
SHA1cca669a8a09114982cee104e716b206933a166a1
SHA25609ce9072349a55154ddc8aa1271f62d72c0d8b6821c05639d779d9c00ae545aa
SHA512e93b7162e7113a43a434c023c044c66e5cf2e8508f014d0c007f871e7f3beeecf2c4b53a89447b3a8aef4660abeac860f93f6099e9bd4f805e887a012f9813de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca579ec36a421b666ce9a2f88e6535b
SHA16c4e88d2886c7b306bbee782c47d0e5223a2cd20
SHA2564cfcb76b9d51402893aa32805e204adfd42c458a7752d2f3f86120ea186b6076
SHA512cdf282ef602fb8a99a03c63f346619999662a7d6972857fee48c9e51cac1e0e320e666e4ecfc6af7f62feeef50c7214fc3b842bb83a20286346143004222026e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3490a6be65e67062f62aa5897252ec4
SHA102a331cb9f0b6266a52885b8a8dffeb831d99fbb
SHA25622c46ec439defbd707a7b929cd4f8ae3381885c399dd30c8942ddda036fd0213
SHA512b2415182be4a51c35cd737240aebf512b74b17c4d72961250dea5eed2cf00852339ad815d731b5efd2b8038a0cfc19b4cd41b22756277f9481c578c5a5b2e9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ae9c639383d1d1bc3525b13de7ffdd
SHA1a3ac3ac307cfda4e5f62945de4466db5844a6daa
SHA25621fb768e9418005eab79c0387e3a425055fd2a29f864eb6d0d6131b206ea35bc
SHA512a0833317cee91f1c5663361069af223ad9094a7b3b8f960368ee6e875248fd59179963a2e940aa6cfd906404de71f6b8fa9544757b0d7af432d510b4b91e7380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c37cc183c01191bcbce42cc1359e6272
SHA1ac9f8e5fdc2f909977fac34ccd46d15f31c04c1b
SHA25660e75beefeac4369509225990fef7c2f1d0bc5403f1894a5a1e2bdd0a952a898
SHA512c9ba3f0a77c750ebd096a027c1b76074bb9506d54dee542e6c9cf06800b2784fa68ccecbd26042d4649a37029e4ad741d9a611944d732f40ad269266b4c18eb7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a