Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html
-
Size
1.0MB
-
MD5
4993b350e7a95329c56b59b8c4f02055
-
SHA1
76c64fac5536824082ba0d6829a34977262f1942
-
SHA256
d20b808f46a99fbbcacd1ca4848e3dda477b9fa23e2e2c3139ba6422f5d64246
-
SHA512
293312172e3ad7ceb080b3a1cffa3d1d0876aa413ab31525844869c7b4878790c1c4f9096473477d076a0923f3ca70319d177857b544a092f74f0a488072d654
-
SSDEEP
6144:zkclr4UQ6Y/JBDRl3LHhFKB/SKbO6/lsE2HG1qxt+GPaqFZV+rW1bW1:zkcl8B66BDRl3LqBZ7xq/1y
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ca4877e4528746ce9b424e1b74c107a8db912f043421fda68f550dcf55a780f9000000000e800000000200002000000070112e1cb746375a0acd8810991bf440fbbcf84121e44af0c867282a1a94e26e20000000b2ecb97aaef4994728246635fa1c93fe5f807a841814be307bbbc74d2fdf0a3c40000000a7b7ca0c384f0ded929c81a445d48c9447b88c15832a74f9967ba967305f3cdba2ebe35bfeb0cd23be3e2c1ace7dd037fa4726b8bbd43dc5d369c4bef1284dd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A5CAAE1-1344-11EF-9DB4-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6065155051a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421998898" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2920 1192 iexplore.exe 28 PID 1192 wrote to memory of 2920 1192 iexplore.exe 28 PID 1192 wrote to memory of 2920 1192 iexplore.exe 28 PID 1192 wrote to memory of 2920 1192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b512abf506f24a99d8b8c1d948739018
SHA130418ae14abcf4a87a62ee42d40bb51dfb5176e2
SHA2561e76f676b2a3e3fd32bf8cabd37f01072be1422f8419dfa2dbbe6071a1cf68e8
SHA5126510d06bf04e9fe816491371a2f86474968b107902272031d416d4d728636782297921f3de7ac960c50d1b59ee25a855161f0df26500965966b53ff6b47db75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2ab884d59783a33e8fc55a56d6bc23
SHA127ab29be60a39ba63e806f00ae221e8703dba857
SHA2563141fb0be17e25b531f5c13e8c8888755e099e6c2a34730c390e37344f9bd7f1
SHA512ca11c70d0703693f05ea4a6721517dc82760db3c19b63d19a0fa5a0466e70a4f53f61f736cd6e34af224b3713087082ecea1eec9ae9f1fce39128be237ac5c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5342b0e790b5180af1c6274bb5e9212
SHA1e3f767fbffa7e3f0f117468061b49e5b0875157c
SHA256bc1b5ae405c55221a5d0dd9f7389c6f5e9138c3f0664835e8253bf22314256de
SHA51275ed4c9c6f6a56a55e565af8fe1734c074b4ce5fe5ee355247072dd95b9360ae4a5ae7686f9e1b6e6b0c3ee9f80c6aa40025b7d96f93b72287ed984ff0a7ee23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc0de7650c27561397b377e8ca5da2c5
SHA1b8a38d8c8bd338b763e8813b7519f73992a76026
SHA2568b68cf57cc5e6dc803d178fbbc1cb892037177ce42a99db676843128aeaad61e
SHA51298ece2eff7ef687e3dda3d0879f9766d173e29f537b310b64df24909fb4bb616b5757c1e7e464aa8a431d85383fe0afa483e447d561622d7426856505cd96777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b31d8a594cce066910b64229d8981e
SHA1137be638833d15bd15953248388a74eff11b2fcf
SHA256eb58121eebd98b81f47c0814e02499623818a1d81c54aa036b1fae9b4b08b436
SHA5120d6328178b7f13a7507f46030e056c01a692617824d469b4d2e47d3a4a6900956457eb9a148a974e5b63667f5813b439b36cdbb518aa3bae706e2b1f0641fcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52042e3472c066bc6dae6c1f6a2ef51a2
SHA16080aec997754c5fb7bb3f7539815a98b022bdd0
SHA256739f856979b3ef6d649ba58d94b4778f097639ea1fbb1e9b3cb3ec0ef3ec59ba
SHA512d806fffb53330b0db9fc20ae627fb37cd2a7df884703e11be37f6e0b24df4dfe18db751e799eaae25bc34c0d996a7628c48d1fb54655f2798ea09ef23fdec44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481f36003428c2fe5a258a28f847d565
SHA17107a2361ec3a6cc98f183028dfe3eff147d27e7
SHA2567cf16fcf7979f099f62431c33ff13c75012e15c191dfa8ac8acd9efbaa2a52e8
SHA512b5935087ff403adf0dc27a779608005f2c9158e9db327610011643a7bba595c95c050c38aed6aedadef25fa126c41610416efb94206b069e6753f3043df4e285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c7d6a52ec4a32bcdfa38c5afc02468
SHA14749a1caa4eb29d3f68eca6024586648b4cc5938
SHA2564b192313c1663a902229eedbcefd57dbc99e4fa8447a4d8b49e06161cfc2e196
SHA5128a82e3a0c22ddf5862252cf8f553f83c95affc4ce326b8bdb0ad790c30a0c9f868f6a458faffb4586c0a5eb855e747e436400b3eda940b16c82208553eb50c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c2beae459d544923100c916e73c5d9
SHA1dfa30073b56f99d950465784538581bee18adbea
SHA256541467cced1eb772923fc5593920923aff7e0d07dbecd4a243a1a612624eb272
SHA512332b6d7c1a71a49e6dc9c0b82e812ea0729624ffbef39c7b4daa51e45c3276bdd06bd5b920f0e7871c91113af58afcb56517c75aa8026b413d1fb71d938089ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da8f790867876aa498dd2e4ed03078e
SHA1222641ebfe8dc846ef53bead1eb045efe337d9e2
SHA2567821960d0860e2df8fadd790a7ae3b289046852611caa41a1ab35280c52eac2e
SHA5122727e9f9c928e934c2532be977c9db7cb32085079673e3034ddb7aa2c13bd22b7d2e887538569e60c3b6edec8d92262b577556b8db64c409e84c0d4b5a00259d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530450a1145cdd046b0a9353edc9d71c0
SHA1e94191a0f2cae0aec608e5156c435778cb71594a
SHA25647bb37ed7016314a4d780e802f04c78aea850ef62d2aabfb4cb5f379309bf4fc
SHA512733d4175cea01d291a8e1f86a65b2d58b12ddee269313051a5e5cf4dfc235d48bfc7beb2d4efcb5d33151ed662e62fee432605f457fba8a021932eb54d1ce4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c034616009cd69cb5e2a11a9c85cf2d3
SHA19689b2d58b73451aff3adf2bb25eae0ece7c8d7e
SHA256dade0f4e08fb182020b2580a2a6d0f45d0dd4fd96852cf86d6258b33ea2830a7
SHA51231df12ef282fef8e9eaafad4ca37eea344e5cfd679fee2c3e15498eb0ab4bc8afb215ad2c013f7e20406e09780e5262739fa25737b79f5e7e3195355fadf89b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58526f3880a9dba4c18eba359af79f586
SHA1925af6b168ee551957d141595264adce7246a826
SHA2568edc22e8354a92f10c6ac9a37ac860b89210ebc20eb20e6ebcd092c9053ae777
SHA5129fdf17b05e10dcee9052a520ab0e9a7ff1d2b4572696c5e124c7525911a868623df84562e270e63d3c27736fbef865d2cbca61934efd1e78b43457edf714588b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c656620d65220ecb83db475c73ad8265
SHA18873e01171eae3249315be763f5a2a920377e81e
SHA256d19889b32fcce8c2cc349239ff989fc6008483f0528ea5593bc9b3d82b2a3876
SHA512555770bb19c8e2bb9b0dfffee36e4ba2ccb61c1ecc8fa87ebff0434a810660bf320e607bdaca898fbc52e890080557aca1d61016db685d4cda460a35c79364d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b64b348d4ee5a2b9882585aa15ff7d27
SHA1e17afeba7b27c5880b9624ab38a055982cc6e6ac
SHA256fc8b8909e374bf0c7415e9055119b90c4c8413f7ae9ee122493567c2cd73846f
SHA51212e1b7e301ce317957ebcf02da09355033c3dc094a30aa98df967b854232fc129e870919ab7fe999bd05acf25c97320705aa476ed52973a1ec94de38bcfbac93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5a394f107fe3c5d1f472caa8c63169d
SHA106cdf51f1a64803a7603008b6ce519aab4b4e2d7
SHA2566dcbebe86f48b64f5fd62671eb122e6163e441503160b71099623bf5dfe81c4c
SHA512feb7af3f73224041c8db1458c75d24a9bf757d120f744aad70c9df965db164bbd1b1f9927fda0ccdefc3a4ceb9d97897a9a4b2d562f94113e7182f5ce443537a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d162233cf27b7bc4e28e838142db63
SHA1ea862d14700b1df3c8d716b61d86802910635fd7
SHA2562f83748f68bcda189a7324e7f8ec6ebb3a0c32f85005bf6489938485fa70d0d6
SHA51218125bd50afa94352f7f9f87e3ebacb4c1b6d9b190e3aae3ed89c11384922ce49f27f138089cffa3924b218fa12591fabacec4ac380d66573633a8377d9c6669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cfe84b210c016dc1e6695f5e8cfd9e0
SHA114b313fdc1bbd120484f0736f864cebf114fdcfb
SHA25601668c3bc451b13e0f1e788f02f8d7d203e421faef351eb73c50887a3fae120e
SHA512791bac9f35322e79653a71cbc68c4be5fbd34b866238b929ee86313647ff0b385727f56b9ac44f34418a2dca387364f39d24ee3e6bd66983310a9e94740fbf6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57808e0cb9a48f1208281df91584e7830
SHA1b3699bb8f1e3784d3c0ad29649431f0600de1af2
SHA25631eb3cfd6d24e8b6a1a8633c0babd8ed81cec62690819bfaa8d00a0cbab78b6a
SHA51208868afa5c03a6a3d5fecef111f3e0b53dbb098372b53b6a55779b35564fb8d69e38c1daa5979cc70e8ef609e1f6b8517b53e50465fe28d07d77ab796c8affb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aca74d52dd06a4bc225b743247771ee
SHA1139d17bf9257fac2e325049f72f8818c4de2a851
SHA2566bb36c505f35ce54c8d0fb1c19f5e6c288ffd68aa40e20cecc15623d21873a1b
SHA512b95b39ba3b34f1cdf7cd55fdbba6f5b0e2e57fdf7d650618a34876a544f64d0f20bf1ed80f20ffeb073ef3ca02c4f442ed5ae9996150b7aee6ceaa0bfd3c86cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\bIGsREOzc[1].js
Filesize32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a