Analysis
-
max time kernel
137s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
33c0e738f6d3188b65d80421e9b764d6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33c0e738f6d3188b65d80421e9b764d6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33c0e738f6d3188b65d80421e9b764d6_JaffaCakes118.html
-
Size
351KB
-
MD5
33c0e738f6d3188b65d80421e9b764d6
-
SHA1
ebced441e6c24714fb921fa052bec170c350cdd8
-
SHA256
c95a4d9ef5b5bb57a510330d1e83ac047e518d08906a7209c32d1384b2d668a9
-
SHA512
19dcde4493eddb5dfca9327adacee4550b48109e25103eaec362dcd0a3fba0c8f67cd1424f64afe84f4cc80da6acc530472fa8921c27de43b1bdfe06eefbd21a
-
SSDEEP
6144:SVsMYod+X3oI+YrrsMYod+X3oI+YMsMYod+X3oI+YQ:E5d+X3h5d+X3s5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000089882a5036a0aa75ed3410bc4bb90fa1c31ec063996e623ee864fb8183427aa8000000000e8000000002000020000000bba7227f0b597261d72f61c41df143e96dd2a9e5259539852431aae3c95e97e89000000035fcf511e666c01695aada9a6ab4b2c00f723261dc19a55aa4ce9b112afe1c9ea8d95fad5788b3dea722ae76308cbbe942757bc85a111f6b7f432e244aba697f474bf74b83ae234b190f21735b9a138df7e00e4586aa55a901d6259e9d6a84de29f6ec8c2d9be044c7aaebf115e307577bac1bce8fb31629088a8dfc4f53c4fa664ea733c43b4bb5bb5dc99532f66da34000000097cb7c8e3ef64d7a0f300584fdb154fe655621438d9789098c16651722852407b22278b94047d982edf7b24ce984ed4aa2dfdc6a3edb8c72124b4557ae484e8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421579356" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000053da53ef8412728730d32abf53e24567d32641550d16ce46b009515dafc838e5000000000e8000000002000020000000167f79ed1e22a8429bbbd92b71ced08c92de782a3e654da816a00901eddbbf8520000000f77dedbecb9e1cd04b4c6defe17655d684ae10ef5b90c5f107afa925d5fe165e400000008523d078a8691f610921f8abdbb7ecc0933ec06f78a657e408fb9f38942aa45fc3fde911cfafca669fa1824fbe7584bc6daf5fc7b4876c533f0fab3302ca5d41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000fc7ba80a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A701B791-0F73-11EF-8706-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33c0e738f6d3188b65d80421e9b764d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b874f552a96b275de5c9c0d67aaedc44
SHA151e98a3afb1d56cb517b03631c66d7a79697a5d1
SHA2566b66df1c0fc7734c5ad4bca1745fa0bc5e7e8498ae7d98091529ba00fd912ff4
SHA512c2b18ea268159c6eed27dea76ebe81b6aa175c14bdf4312f5f1a74f5588fa08916aded557fdc96b21c914bdbb021eb9927e729e8feadb7f34069783e7dbb2167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547fe91c35e888a819223a99b4abff5bf
SHA147025c6cd858957f16c3cf87855d5ad1ff118a75
SHA25687d7240a37b50f620bfa17b73beaae77ffc83e1398e131295f320859ad51194e
SHA51259f6582579c5e442d4e133d85646d2e5c9553483f4f04966d96387a7fd8d8498d032ca80565ce78d2136273396fe5cd86b23017e47a2fe2123d186165fd5ea0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baaa4402942285614f9910d16a4217e8
SHA1f5f5beb8940178c402bb9181dfd7fad4d038a859
SHA256735d2bbf2f41251056c7cae3cded62e9683ab92e0fd3fd1a2fac4a4b4c4f6d81
SHA512a29080852ed9a81fea7918f1d6f702e3b901ecaec651cff838e9c60da7a1ca83d9b7df12ac847519721b12dc69082f4492900c0be832183a584cc7007cef2462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b623b44e272968c188b0987df59c5bfc
SHA1b1508434a24a71fea1766f10c270972aab917231
SHA25684c5ede4e464783568c4e0a796bed42de0dd8f2d40c808f1a2a9565413fa8b8c
SHA512524a4a6f7d2e01b64cc34a7377e30b8f7037deb021f2fc2c17eab5c06d327dea0251fc5fff13310915e4a13b4eac879133c99f1a92cfa002db013ba77dfb4a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3643a588bcf35d822476d35cc6f57d1
SHA15b243fe1ace914752616fe408f48efebe625aef6
SHA25694b8338fa52993c3598a30c58d72a8e57c1a1315a05ae5374d93385a6b3cf2a0
SHA512299bf57ebd680b3d8584cfdf1ef45f880eccce01de926e64e12b0e24d45c89a3c5b4277a8993c49af538a485211bdbfbd208d78eb23a760b7c680063f427d1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0c25a5e7953128fce9cc8a496bcbb6
SHA1e87cc82dbef8704f2f9bac626ac8968a44399039
SHA2568580c5dcb7d7a355bcf6def4c0137e61616749c4b3dffbe390e3c55aa20314db
SHA512c4d3e454bc5b45680c68049b99ee6483ba52d4440edecf3746f04ebd6eb36f36a351de15bfac533b452270d2adb5821187d348e599a7d0730580ade8817aec90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5503202db3890fb07d41b708667e60d86
SHA1df13edcc9454fc9bc82257c95905d9bcbf460333
SHA256818baa49fc2849413c986d21ff182e397b7e5e36f9a954bc4e36f4f67ed6e114
SHA512eba5ec477c870fea94239f60d736426ccbd770ba4e10a98e03a168db483151b4f9ef69b7f77ae196ee2ae70bc9c6e5255a32689c8fec2f325bb3dad8e2049dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ac95d36a3fd3565f6f0d210e668cf35
SHA11346cd793753cafbc2c94cfdd0d397b595c96703
SHA25661e6f16bc1ea6d7e462b248c86676a442319fd2e1e9f6372b98f26903a2ba1aa
SHA51246bf8ade8fbe35236a9ad971436c8300f7e63bc090508fd6d0fcbf2e2d316ddbb90cd522461b50ffe06e23662835e17a519382bb28a0ad46c36e4c6da81cd190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782ea82c6a4ea762b47729ed1c8c00ed
SHA19bed6a327777d1044ae55a6dd9a1fc1baefc0f06
SHA25641c540735d42fa50290c207c2d946eb96f93d87f94baf94ea7623d35fdce437e
SHA512821c6f0405ddbec8e7cefb114648220abf69052a532733793bf1b34b51546fe20df0ca19dee55297daba758eb5198105e489fb5ba9bae29ff89b59918234ef05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db7e96b93f2cc5fedbe21fb6cd4ab3b
SHA1ebb25ff58ab17246d54bc131df726f30f487bda7
SHA256f32a2fee95ff89ea89bfb414fbce2a8e59944f650e2af2f3fa8ef2f1c284aca5
SHA512509788eb53cf1cf84c6ccafa79d4178085d54cbefd89f537123634658cbb0e543b3c6f99f6dcc16c6701b85216dc41e9e0fd3f81d93edee8c47448f4d9170a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f9fe325d1e81d7b36b26554a2c1fa9b
SHA12e19d118f450e12a17f5aecb848905528b9bd24d
SHA256e1ec522420d343ca2a5f02eb54930ded95583d93f67bdf2b98255aa4620cdf60
SHA512e6a4c7ad9f89a39714bb9c1013f7f2ce5abcf052fe9bb4e192290b857ebbdc25abfa3cc63f9ca9f90db45f1574f7a45543cf05ebf8023ff075975e2d0f2e08e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83b113866974a674bd7da4fc5493dd1
SHA143344493119b460aa72ffcf033744cbf7c71e2de
SHA2561621cb2896f72e9673ec12b67ac364cd6ee3941617189e15dfcd176d47c676f8
SHA512398489bc856717ca8147d09632c3187b219f719e3068309138135e957c4f126c64dc7f7d8af009f8ff3f0a35862ee77f5689ae6998ee42977c9c08e87c939fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b845b6b7196f8aeedf9e15efbd3470
SHA1f36e983723294fdddfde9946c89f0fa170439565
SHA256d5bae08062fe4e4aadec7c3e85e4e91695a74d0afca149e113437c10bb3a8d55
SHA512806dbf1e45d00f6109ad1c7d5a094589a542477eef23507be1ca52c7db3498fba6ee8ca6b0eb017ac07a6f9c4ec07bb32c38891af1a47ba06ff2023c1f10149a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594750fd842314ccfc8b7cf6162f8b2e8
SHA16eabe02b7dfa5e0d516cb1777e34fdd8b399d2b0
SHA256602002d6d13234c9d8697dde0df4443e03e83e5176cd9734fd400f4933b6a7fa
SHA512ca275ff5bd79aa52a5f6a570d11665ae92dda52ea06b48d10987a501492517a31a3ccbb41962d102490194cda3adefe930488bd49a148ba8f1f221132c8306b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521d6ce9a870aca6bc45c9869f81b3942
SHA187132eba55936a1ad2856aa2a7963fcd8207c18f
SHA2563060dafdcd8399aa4f36082c73f82fafbfc54d4cf63920b7c19302922ce697ca
SHA512c41b4aabf14d97e7c3df86564b781c02effc668607e1dc8c4aff0686ce6a32ede6df6dea25d1bcc9b9225c6d3e8c21fde2752362749b46e459f1d057d5344fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e4799b9c52d20d058167337b812533b
SHA10c671434558a5b6f107cfcd92a2cf4b1cd376fe1
SHA256950d473d4a6c30699ca575f86856f8cafba0f35752f1e27dd374e7149ea93e52
SHA512bc456b3385c372bc81d769a5a6c89c56ad2050ecf0afb010c577242dd0bf613c55b9297e949377b3fcaa5a1424ad0df99ca64a67559d043312f71b490d2788ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eabe2a364162120ec68d18710b6682fc
SHA1c1fabb71ee6d072e8d5b26ab00197b16648cc7fe
SHA25677f0ea180e4cb028932a114a48d7e095f30cef89b5b8de55f166e29565703946
SHA5124f8a7a423872c2293557912431cd7ebbc557b59f38c20d76bbace584fa623873cfec920e5dccf6f9b33378a715053f5e976f2ef3d3a3913bf8aa7c3c7a6e140b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e14fa71c5d8d0a0ba6eaed5239d9a79
SHA11266c7b675580cbaddf87bb96cd5debe1120d668
SHA2563b48d60c1bdb4c49c9f4ccc21764838797e68ab26242e861e01ab7e8ea865568
SHA512f9b19ca394ae811679bf51739f962dc9315858c97cd3906b56336d2b1feaa81e1a00f84faaa5f060e43a36741abb204dd42a909c4f2afa8d8549b88e657dc35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519252486d35c071a5a7cf0d031cbbd8d
SHA134a8f70d60ee777310770da39a3dff6543db9b9b
SHA2564eebaf6575be70ac9c7c9649e9d0f76ad5d553ba63d561a3f84b847f258699eb
SHA51221f6bd21b248bdb2cd12336817e57ee52345f0debc00930600aa3e36b698f62437446cb35d76c04f399ff81c34165cba5134c764e4f0a93aaab78a1c99566184
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a