Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
73886e82cf5bc4a645ec3126a5f5a963_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
73886e82cf5bc4a645ec3126a5f5a963_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
73886e82cf5bc4a645ec3126a5f5a963_JaffaCakes118.html
-
Size
3KB
-
MD5
73886e82cf5bc4a645ec3126a5f5a963
-
SHA1
cd9d03c338e6274e270c74fb7c05f0287da587da
-
SHA256
b064fe8499dfed10ddf163a93178f3572f1a0ff1099f09fdc53d598cf1d8762d
-
SHA512
7cca086233573855d41e5f35b6d339bf4127c5c74b0d41f1f14842c38c22ac2e0073f92b2a985fdaf1ce28e3bc4aa4a43aed9a9df3d90b0e5c9453348424907c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422839806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e2d76d165172645977514224a641ed500000000020000000000106600000001000020000000255fc30c4b807db15218f2be6504a236de13d1a11ec4e2581d443958814f5c10000000000e8000000002000020000000c7eddb90ad14b6fb5c44d0464e1193b46cb155dfddf90547f8a5ab313f912dc520000000f05d2e5631e713ac7d93a6186ac6360263909884c86d0befb3b9d9d6e218a8be40000000677cfa71abbeb49ced878c13a97367c529bd5ae5ba45477121838024c82fb8014cad30630b46b0025721f8aad990ea675f1e2f57adc054e86be4ddc5de360596 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e2d76d165172645977514224a641ed500000000020000000000106600000001000020000000ab56613db88eb12912375d55e9c60d838b8e4bb63cc210503c66c914a88f019a000000000e80000000020000200000005c95356c8d6f6c11e483385eb5ff5af9cb2e50729de836f84159a8a8005415ad9000000023fc6eb938e20c3b7f64ebecae299cd52d28d1de21bd12cecbd19be97aed443beecba8069a81d9ea27315cb508c2f385e5a5f0c9a1c02ad2e4daf531c4f26ae8aeef3bed08619d6e2434797255cbe77618c93b9226c4c75f0f1f4a71c7dff4aec18f27ba3cf9430b774d7e0995ce28cc45b61e5f55952d133d85cda063b3521b6a9eda1de0c02872044ce93e19383b78400000004c61a1306b4d8551e43e62ef88515ca0bc19113b33acc3b42d07673ec360043d54c1c19ee1ffa6ac93e9b31c9c6b402f3d3eac3cbd6b7cbd8038df268579cd90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F308721-1AEA-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4028e133f7aeda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2656 2192 iexplore.exe 28 PID 2192 wrote to memory of 2656 2192 iexplore.exe 28 PID 2192 wrote to memory of 2656 2192 iexplore.exe 28 PID 2192 wrote to memory of 2656 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73886e82cf5bc4a645ec3126a5f5a963_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0998fcc656dae88e8d1eb7f6b3fabc8
SHA1d546f539b3f9c911d370304ed8e81338a49b9e44
SHA256b07ab0010b17e53d083aa01f89b8ac6d56b1ada3458455e562481aeba864826b
SHA51211d3da2e1a30e34255fc11e16552abe7828a46c2ca3a52ddc40b49e42242e36a3e00eceda47961f5aa92519f9e4ef0aebbd8fd3ebfdb4810d99f53937ffe91fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc0732d3fca5fb87afca2b624fc2046
SHA1b302eafd82dd4e2d0feaefbffd43f41e98a34ebb
SHA256778cbc1b44686c1f3989d462a03a31602f8210a7f4c9a17e90f87d6b9d5053f4
SHA512534d85fa27ad07b8bca3ec3d37e78c41583feb9f7575d25d821594bbeced953a05330abbcc0f23d7e94c61ff4540ef4586ac13c9312258ad945d4d07a5ff0547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc62bb630f06b1c3a596107bf9343320
SHA14d92e1d6a96702484a8512c03414641faf63365c
SHA256dcb651c32ffab7731371d5ded8d2a19a2ae5860929bcb0730ac6e09246c14409
SHA5120928b764fbf28ec6fb2d243d696e30e30c7f58900798e07cc431e90b642ec341ce0e9c946e12dde8329faa87d80e70e74a75b709ce0c8027653dee94d5150676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50febe04f9bb1f5a188cc5f27dda5af8d
SHA1d6003b735f4433e6a817a9d4246bc783b1a8150b
SHA25679d4e14d72a937ee0849df0a7c8ffe5897b817bf0abd05085657f4d1dc73fc5b
SHA5125fc53b98ab6daf511697446f96a36646c5815099d84a7323ccd31fc3927f1f520b5d67442899a2276a059f151b5c796f5f08a3ab43fb9d97771baa8455fbbee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6ceb762e43765ec71ccc095f6f6b14d
SHA1aafc24fe10b17465fabf7ff24d9c70b0266cb6e9
SHA25686ecadf5f3239c2027b35ac1c18b63a28f5567ace4361e45df783912a7b83a8c
SHA5125d6307cafeb0f59528f66620e3bab3d0b79b4ed0288453ecd16110943d5d10ecbcf7e283c0a796a4718d5790a02a3cc14fb924ea93ba11c07b301548000693c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682bd6eb58354ade86c65c72cd670435
SHA145d6389fec6a6b53c937c365ad83fceb32930e47
SHA25623394842109606706e6484889093de36288f6ddf52f8735bfa614be2d5a56a62
SHA512dc24c51ee50ba35d561eecc0281177e5d4446d2b1a77ab33dc1086e67dad3b9e97639a334349cc8dde75eff34329cb8ad4973008999c21e38a3de6ecab56b5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8bdc3670b691916ffb8c9ca09138769
SHA1d04f26f0afb777bbab987c16a18598af378c22bd
SHA2563a50283fda001ea95d5056c5bed67f3bd988989ef9601c3e902d7d7bd0e29731
SHA5129d3b459cd268df793179d55e9060981407fbfe163ac0fe67215a8491d2cbbc72520575010915b278a013aae8400fe6ceee36170124567051a50d3efd70a965e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54558c5c212b19e4052571769ed7515e4
SHA1fe98ea5660dde785a9f4cf3ec46e0a7333f903d3
SHA2564c8cab2181a14f4b5033649fab29d83518412d076335e8f500d96745b66482ec
SHA51274f87f573679c876f77e8862207ebd3e0c9566d54681a74de54a2b11026b67933c9f0a531dabf9bb5c832bbbb7c1137a261c29491d6404e65cc40f0cffa4bd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf9fa38f4b9c206adc46cc8a47bb2d7
SHA1a51b124973bee79723eeb0a4d025046dde84eed8
SHA2569e31a3539634d878b600278423674bc7d3b34b3f862194354087c7e2fe54a800
SHA51236dbb77c867d92e04d2e30c56af0988665d5aa5bce4ea36ecb26db9fa2b15d26438d8436addb092453d94b19e29457739fa3ccce969f2358df78a05600409b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64da11bd1426f49c19b1f971d3eb534
SHA1990cf2083d7668e71383fe95f6bd3f77a2e80f9a
SHA256a56f5afe7c36ae36ece9b8bce50006dc29d3e3d2cc3ba4f8c38b35ee32b8c32b
SHA512a8894eed3bb22370a1fcf62f9812605acaf87342736a08b12db2f34be7e903d2de6ccab1b0cb0f2af78af1856ac9e85b8560959211729593e543993bfa7d0e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5636b58dceb861d99a13210e9adbf5e
SHA14d48e7484b8d9e5e606953201c0a351e27c436cf
SHA25626dbec52f4f11ed28317da5f452eb0f0bd6186631c0fc42300b30d482d8a7948
SHA5127034820d7f5b5dbdd8a0d7e042d2edcf11ff7982973f84272b0800310e6b7304413f7d3ca8eb37c04459b1b1b35e432279af7e800592c5a542a9b7e5d616bfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77c5bab3fbdc16189879d98c5a8e6a9
SHA17d0c305d58a37026d51891c510aa56ba857e5bdd
SHA256bdb7e23527820f148f1f4bbd9467898595070729f78de31da6e77def94afc9c0
SHA51236605d1eae35a1bb0b44bb2b8b426f1dbe8c879fb852c29ad549a4e0d958de0d17de20d4b52313008bf8ec7d18bb72b8930b894d4ccb95364d042dff97317acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecc1cbf9a36cab20bf6ca128ccc31fb8
SHA1ab39b13369faba7061a4dd9c283c06ed1042746a
SHA256a1a43ca941a5d972f8b01ce8d01156ebdd90cc65f3ca06835b659d50cc17ec28
SHA512c11fc38de03f79a1d1c1b35f4de4fde3ff464e949b4ac3f61913c39672ea6f58cb15b8e9b88cf5202428891a997dc9bbf376bf0105f5f04a2fec24dfd84945d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5169c5dafa05c3f93722aa4d9f5d18d03
SHA1a4498a12ac4e1a4137ce1858f2dfda944c218165
SHA2563266e933139d5f15fa693864d313b7edfc613733c8b9c45bfb1f4f2f4fc7c7b9
SHA5129b440cb8c34db98f82c9fe1dc5893c32d3daeb44111547e9727ac7ac0db5838f30124e823c3a6cdea94d8eadd39a796bac8ec2e2d089da3eb6c87449e51364ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b512da327606976415377b6de9fd9c
SHA12d5ee5b5874ddde69dc35dc0ca04c098a6a34fd1
SHA2568a7ddc100174f800add3a80992bf47de75bf87955510750bf63de75609b770cf
SHA512a2310e584f544827da794c4edd9b8bae3618c9fb175ddd5975dae87d5f20042a5d10d34e8b7ca2d242a61e8010049bdae524a8cdd2cabc3026f5f54b76aa85af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cda7b9f8a5eca39a58b69e075f552ed
SHA1d90059dcb5f5fed76007f29b0ef883c16f49843e
SHA256cea4a43b6f5f9259252fd5fd81488209f84a77e9d5de99319090454bee1d1928
SHA512a2b2b8addbaf88dfe0c3c1e17f63a93496c09883232c792a44ff4f6c68ec2bc8a6118f55923eb6f63d435e2c63662dd3092648d398090297fccd1eb1bd5ecec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c75515e4ce5a674ff7a6ac9ffbca42bb
SHA119c5cd5e2b839495778ffde14fc600775e752da9
SHA25602f8e0d189de02c001eaf164f125a38edab016447984d421340a845f289af437
SHA5121db76b3b8514318ed1c1521ba6e6031da0827ba95289a2b329c611f826b30568313de58cdd3d0c88f274119a6a6a506c01b2304de25dba42f9f7674c8b0b79a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeba6a93830ea6a391191072b7b7fa75
SHA191b2b2d896869ee6da6d2d7f31b094ceb6cf58a9
SHA2565c1c93cbeb59ef65d7e88152a3c2517dd9077e974aaeeca424dbd733afcd6712
SHA512f666eea569f7c558a60ee2d43de96034a984686c963753874dccc6c33b438d250f755444c0c4225dc193512adf9fc074dd7bcccad4326ec8bf5b7aa8556b1a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a786f3da96eb444a1351192b0e6643
SHA170fa70dfc39f8797d69a9b51f3c33875a10dfead
SHA256729cb05ab8f25f1cb42c0d097a4bc0015f193f84b5424250a979f778bce9ad3e
SHA512ae40199c8f303e4ea2be677c24c9bb780e83dc4a5ec5537c55dc7af27f0efcbf4b8422d829c55a0de05f7f204fba7f2374b7720c7e62fe61714a383804626fa7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a