Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
7537b54097849d4a3cc467260773e406_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7537b54097849d4a3cc467260773e406_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7537b54097849d4a3cc467260773e406_JaffaCakes118.html
-
Size
86KB
-
MD5
7537b54097849d4a3cc467260773e406
-
SHA1
c070c4a38e1d460916dd7b572397cba83e688acb
-
SHA256
95be42239ff09de6fd209d5f195634565836cd87e8f10a8d9899fdb0a7e298ed
-
SHA512
85d0c6c5cb0311b28f0ae92318cd704a9ab686428c4aa7215eedc23a5b03aee40f968c80f4b27cf1d7663aadbe6e46d58559492dce0350804fdcdd70f209aa0a
-
SSDEEP
1536:8cEeCbD8Qhg0Sf8cBoAvPH6aC/F/2W1gsY7CsjH2Y7WRqbsGWw5I7vxlFk/S48JI:2D8Qhg0Sf8cBoAvPH6aGF/2W1gsY7Csh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000090fbc44b779f2eb8787e5ce6d390339091153c212318d7a8767f406dd75a7ffd000000000e8000000002000020000000e393b3f275a434e416d330823e6e24a05f4d0fb56a01975be585505dd66f8c7f20000000324648cb7abfbabb9893e5dc9a074ff24b466ad5c9d03bec7f9b1205ab569d01400000007bf7db9094ac555fe2b4cddc535f4b34b6ee09fb8aa93ad979bc317bd75a09d1cc4745916aa104dff14a4616a4582e91a51140710392b5b90b1c9553f40e8f83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422882029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE0C5921-1B4C-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101cee8759afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1232 iexplore.exe 1232 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2372 1232 iexplore.exe 28 PID 1232 wrote to memory of 2372 1232 iexplore.exe 28 PID 1232 wrote to memory of 2372 1232 iexplore.exe 28 PID 1232 wrote to memory of 2372 1232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7537b54097849d4a3cc467260773e406_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558df79bf60658e74bf42e6e768dc47c1
SHA1fa9fadf219d7310890d87f0287f23a8bd16e6c52
SHA25671251d5a8e35112e8c3ca55fc4a2a104c7c79582276c51acd90cc4f19d652e70
SHA51273948dcdda820882fc887d476180f5ff3eee75209703bad6d91b91964cc57c7bdccb1e5d7c42f4482a77fe0edea99b9c6a01055ae51e8ac4febf07e6520f1104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cfc6b302681698104ea33cd640ae3f5
SHA1725f1ce6e68c890b86d9ecdc75ebe01be04400d8
SHA256fa85fd0201fcb70fc22865de1bacee226d967eaa89c7a700090130cde89e2b11
SHA5127d7fd6efa53d29b9218200b9e7297a8edb9d3b42e45e3a03e323b13b7e9c7122b10375a565a3c604203631ace354e35da870d4715d34f7eae2af9bead2055a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bfd591ed99c93c92310aa905c4e6a0
SHA168587574915d8ffc04c3df7d2e5169e3a9a4d495
SHA25611e8503b8666a4491497c2843ea19cefbeee39cf965400d74041d01e06a7dbae
SHA512c10a699147b206c36070627d133b49418a3d38bbbcafde3aee8407dc4f44f66ff058a798eb7d7ce6f485a35f1e6c9a4b994d80480c130f126d4bf832177681de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a0b7b5a32a1fcb9795b818b784c95a
SHA11113e09f7523948f2585aa426d387fb013edbd53
SHA256a9f825aaacc0fc4937617cd68b864aa3fcfb02d06ddb02cb3486cf379292d9ca
SHA512e4a280449ce0d70e7dcc4715ed6f0e1122650fa252e910f19b868b068adf971a24692285bcca825c3e304786fb2543420bcf80748ea4d66e6643864f3e817a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545431458b1b9d7462c0da98738440bb9
SHA1fb13ffe8adf84cab7bf393587ccedb7a39fa3f73
SHA2560d682c88d7de58ee6a649a7cdfbc4fffb947c2eae17a871bd674f06c90dd0dd3
SHA51294b6e49eaddab93e41ba9ca9e6647c596f56b7406e9ecae51ad0fe48d4156a1fa63966ac7d78c325e2569e8de3cff65cb266abc85bdaa1a71fad100e8dc790cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566cf7e73f3b363681524cf11c2383966
SHA14f34192c1c09f7d282d5f73c331f085add34771c
SHA2567fafe347eb1a0e9d599c5f7a5a535fc6b2510a3fac9e562882b29b782fa4bf12
SHA5128de102accbcef80e7ad62ff8ea5adcb5afd01ecc9f76e0ee9f665c9c7d38a9e8bdae48fb0e96a784559066534d52bf3d0a44df69391b71f3149ff60cea9b94f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b83d0578fd19c038344252c6371413f7
SHA16a60b2d784088edb8233c88a23aaff7a88f5d0c6
SHA2565e2849bb986fdbabb4b7a5495aff4832f5d65235e36e537acf6e01728fc73721
SHA512e1f940669e5d08799d48ff5b734a37000466c1c8ebc1a4f0d7e058973751d38d45edb9c0aff7198215aff5a3918a34729e28df47b9a75b627c1571b28fa2215e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7293c395033dad26683d3630372fcdb
SHA115c962269de13f8d0905d0c8300b0b26bd7f65a5
SHA2561e741134b150ee5268569bd0f8674dc065bc8f67c34719983e0e88431dccaddc
SHA5122bc3224ae41344a6ffbecd70e609a010468c71f27c5c7cab6016533fa141ac8303d11bf0e7f5b3aa27796adafe3c74cffce8297840707d5c9e3875af0f309efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc39b515d61683f256056f9c16000947
SHA1dddc4f99135ef7adde2d0cc9dbb243e7a4e848fd
SHA256b98a640d6eb9599b77870ea6e35e027bc8b745ec3da932ea1961a60f1f0f8bde
SHA512f2e06ee97e7dde5447e767881e3b65ee6306cf6b5b2693ddd81ca8eb41035e30828ede264d8b47446b3773c414ca8d440ed382ca14599546651fa7c84e1ea78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543c18994164231b6f6035853df228e17
SHA1fe5a2981f47348958f801f1f71fc02eba8aca6b1
SHA25643f8025e34d0e0c9813ad786255b9c71ed6f26264a0d8550dbf988e11d873a30
SHA512f4ff16487e978b7e76703b0b9767137616f80b3af432ea2d9b5bd7e5b166f92348932da57ac4b3b0f93ae33c14ff089b9fc0ce92800c4b78c0eb76984cad2633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553dfed263e097c71e3673493e18dc682
SHA1cb044b474bc6f0acbcec58318abbb1a9ced4d512
SHA25678f457ce1c02287d95c1f2bfe7c15cf52999c502287eb2d615e395fd90575d95
SHA512f2855365eea4d1b8ae795b1270fb25bd614af508df5c317c61aed950bf6c5eb1b0c920b96e4b99c137895a1909bcdf416163492d0302409babb96315a1198c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530286533d1ef8fce847c5ddc6c0ded4a
SHA192a4f458718d565930beeb46d7215197d568e213
SHA25687b3ad3695cf77b4176149a94d456ececf7d1a0193d4a5063d4e4d1f0c32ec7c
SHA512e8c46dafa658e902d3aace82fb4936a27c855d9d3cf2afa13eb42e605ec3d499f26b4ee1a9b60bb79ae64a42a558c1737344cd319eee7ec95a121e6426c6e483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d1e00e53be7887190d1269b70af3a5
SHA160464f81b38c0778933563866c9f8cbe3d236044
SHA256de68d59280351216c295f6622128dbef2fb51008b1706011e9e42d1a8644b77f
SHA512259b457cc85e9850fe981dae9581bb8d5b53caf6efa738d17876347ec12c601c8714e1e622ab3f35f24abae8f3f9fc09ecd990eaec9b2495b369e7e2049ed079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8dbabea25575d08f81a855a8d6b27b3
SHA1ca8b9e56d184cd558f16ca8a372c16a5a153344e
SHA256d74f53e880a5dad9d47b6b31ad7bd0005ec41b845b7860803f4f5be30fd3d67c
SHA512166d168b69d5b5b6f9a401fa6151b7cb9a9c478ecc90f5c75322d4c50191d89940d657a14c315b3efb8b9c92f41ea24565bc89b3732a91c2e5d69486fedb86ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce70d41be89daa802fb4b332653b927
SHA11ec810516765abc90ae607231c103a53a3b0aa13
SHA256793af40f83f81b3f35bbc18dd5220dd25d9f71c9d2c5e6d8c0c456f3ac973d97
SHA5128020000defcf428d003c4e83e277ec4e9c2f9c4a91d5d10f23abb1f87e9f4eabdd6bee761b6eb9ed85045f3779297dce3be4259b126f5171f939b7ea23d3a4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ada1a627f48d576c8fbeba1e9d06f3
SHA14c6e9c5026a0254b057b1f38892500c0feaf5ff8
SHA256b4b6f71aa4555dcdd91e1fa11f3ebce11fb8bd8dc348b9dc897a08f65bc0ee83
SHA5124add10307ecfdc30000f293a18475fef7872f8ded53ca1484768f3e8bfc7f5818ebf7c5e651689ae0e25910f99bae152755a37c3ebfb890d7212f28fc523778f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e22d4efa4152c5d4883a813b448285b4
SHA115793c5a5aa6627c6f73de8686bfe36c33157688
SHA256c7e164a2486a52ddc672fd73fb81b0e969377a26d59611afd8e2e5085e1b09a0
SHA512dc6ef6ee5947c2862d76bbcf26284104a2984e3125d7db801e62239fe9939a15e02960b7cc1d40a4f937bcee40c3d32586391af96c854fb41dc75451ff3010ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528bca1694e49f392d0fb48d39404ec61
SHA18c2bfbe4c9c7377b694acffd95e82682768d00b1
SHA2563e928084693ccde2455f6b3a1163966a087b52768971cef14a0aa8f1f5ed5251
SHA51233c1af46bfca7cdc60d633013319bd2fabafa907c38618de6ee7d419ff80a5c193514053987559372b1559c9ac84585d36bab3a51a5e5700f0c9d0e5d3f658d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c72b5a769b63b6163954e0b8704bbb4c
SHA1862dac25ea78236d64ea47e2d234e4d3a71ac813
SHA256ab8a91b19d5a8ecfc95d02306e83f58a84aff34836ff4d03eb9c244a701e120c
SHA51281b586342b5a3b57556efd50463c1c8fecba68f7d92f2b60b6c6ab7734a29022c4a47e2c8d71c951383690ecb0dbf8083254fbeff0b4f793810654c0cc107372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520a3f346c158d3aed61761f6621983d3
SHA19b23edcf695489a107ba7fd2dd6686b93d9afb5b
SHA256b57a398e1a5cb7a68d32790d10a2c02959448f69a34d5823cdac4f7f9cbf783f
SHA5125dbb21ca9e5e2343ca302be7c337a20f3f7ffeed5ead666e31a6cdb196472083a7ccfda2ba70fa6e9a48ded8582d3c76ec1b568d651d017927a84a94cf16bcbf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\ad[1].htm
Filesize4KB
MD5accf5275766baa211f514be52c4914b5
SHA1fe21dad2cc392d278ecf2e779600058c9f91fe86
SHA256dfa83ddd3fcc3952523d16d13cea7e4c36ff335cf742225ff0bd89d3e2c18d15
SHA512b76064892ff830f0b566daabc789e694b23f5359889b5e440c67358f50fc83d6cb82a2256d09f148044f69d621aef12d34666956c8210331bf3d26e367146177
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a