Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
49145b9f7b95ada9529342efb14e0588_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
49145b9f7b95ada9529342efb14e0588_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
49145b9f7b95ada9529342efb14e0588_JaffaCakes118.html
-
Size
15KB
-
MD5
49145b9f7b95ada9529342efb14e0588
-
SHA1
16b2979f89e462c307aa612b7bc9ffdadc9b3a8e
-
SHA256
9f4a715317d0258d2ec414d37f1b684777f2dba37d285a52dd90b8e9d9b1840e
-
SHA512
386896d23f5efcd2b4e108802f75f2211bdc6dee55e5a00021ac0223b01e8a1a7ec4e9d954aae016fed7e13dccc23d8ed75e79f257e2bc402aa3c92a691f6e94
-
SSDEEP
384:x5uw/TlivoTh48w4il9bvDAfqvuPrlaixWgW/:x5NEATh48w4il9bvDAfqv0aB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d79a3ac5b21414687c14e1fbe55765500000000020000000000106600000001000020000000fbf26e01a7dd1ed8c1addcea2170579eaaba2c7acd2c0a435ff9bbf01370eda8000000000e8000000002000020000000ccb854f96cdeea24ed3144a5997d35baceb3700e98594e80915d09aa92f10eb920000000c4f0b50eeca743c1fc586900c8833db217e24ad143682eb5619a5c856c779bad40000000295e485c6bfd1cf8e48280d64d8e09189ccb1ceadb02e9bde5f096f089f03629709ff928e3dd576c86fd26edf35f706dca6d89889aff5ee182a9c5887a8d7ea7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421987498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c508c536a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFFCAEA1-1329-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2504 2932 iexplore.exe 28 PID 2932 wrote to memory of 2504 2932 iexplore.exe 28 PID 2932 wrote to memory of 2504 2932 iexplore.exe 28 PID 2932 wrote to memory of 2504 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49145b9f7b95ada9529342efb14e0588_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a962698aa09b62f3730cc20584bd4777
SHA1c55ac9dc839abd1190855ca71114a2e02955399e
SHA2564561bced03ffbd97e4ef06cbf594aa8db647ffa67bc6b3f1999c9d65e546bcf3
SHA5128033852ec570332fa2504955ab6b51748642b94333114f4681c3a11831619f7598870c7420d5ee531f0573a6f96c97e2e5e58bbeba9188a0064fe5d9f9706d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad9444d7a5652c31e71e2c9c8735c6c
SHA127148b947c58768b83ace61238d95fdf4274a1af
SHA256a935ea92518cc9fc84ce5e0482647f5a5f1af256794e280f764ca10980157525
SHA5122831deb493a3a30644a3a4d2633c86185ec32708348081e55ed2bc0e57113b41ab9b7a49dd76b36a0ff8f4e3ecd462c33abc0d3cd4c2223ae33fd7dc0f7d18a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c2f3968e5aedec9f6447b7c5d2c0359
SHA17ad46c9e6bfceb9bea129089ce65e033b5d0a81f
SHA256d302f43459d129a0872f3574c708e6cae4152533a94a80fe27d92cd944b87268
SHA512482d0de292a2f0baf190d0143e0284fd03b4a6f53d49dee0aff6518d119ee47bc6e0883c3a7dafc15b7b9e5e4755c7e5c2d703d68a78a16ff79ddb330a1f2fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159c6a8a671ee538280ed81479597238
SHA11ce791e253a3aa015a72ab847cc32884b0050c0a
SHA256e9665ea3e62832bb06646aa8f3397722d8885a6c9c6356507ba57827461ca0b3
SHA5125b1a25b4c0db23c23808efbb89bc91f097deedf32098c7b15e6ab01408322e7c86e0703c13c7cb7d70f62230fd5080f9a61b34e05729e562cdf7b6b21cb3b4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55287f97043082b4710d7db531324c92e
SHA111bd18f3851d94dea8f8689b00746c9430204ac6
SHA256be03e47080093744907639ffd4dc98c39e9ecd32f10dddba07d17a6a7240a7db
SHA5126c82d8d8d4ad7ecb2c6035d52c225819362dda7bc9d4b844ad169a590a7002a7ae61ca964429e79786d1241f79dc83e9decc6e46a3c1cc0686b0a40aa3b767cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b443c7517a49b3fcbff1b282eab09cff
SHA11cf518b422fe33213fe8535d022540d285ced83b
SHA256c78e760f47e171911e0ae2bb8d943d488c828ffc5eb6301ab47b3e27737338fa
SHA5122f67622739efd2f4c9a45998fc1de80d3b068ec2f1b1df8c72036f5a4d5a900189aaa49af5f3aeb35c1951735f31b3e0a6e4a380a4cc663b94369a9878092719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adffc3b91157e0c7728dacbee85b5c98
SHA198ec21067988d50aebd74d7eab9dae3adf386ee0
SHA2560446392d4cda1c70b9a520588c847857710831288c2299192a1af51eae48ab95
SHA512556de0319d21b6d82d28bf9993ecbabf66aa9441baa1ed599bd3d3b3de9e51b9ab8e9d587c90ce6cc8eb62378867ea6415a19a83cbcc3035f1b0d2a7b2e5a4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e576953e785af18f419ec7846238f528
SHA1c1dc068dc23986f786a08d3ac45df7ada3f99a19
SHA256fd27e2428a39dc74f1dc2e05f0571b2cd9b72a91a9382c3e5ac7035ab497d2d7
SHA5128443665efd48b90b14eea6ba0ca61c105ac3f5246e40a4634ed17c18f787e2fec02343b44be4649719d195b6c40c947b04a423b62ddf12001d21659f2eff463a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca8c6b66d8e87ab8a20bab33bd06b87f
SHA1736505f51e0022fac2094d0f54d40eadcd31eabb
SHA256c4ef2c46b0118d31e5c88cb9fb9c5c66a34f77bc612029d4f9deee78cc308243
SHA512d50445e9beb0a31454819017982e5a7b75d1b769ee9a3e781821e92aad7fec4a8764b65ebb6f2fa3786182555dadde29fe9c834ff13616c4922153ba63adfcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a600c58ba962cacc4c8fa29311faf21b
SHA194acfe2e3c69de1b1d663dc8af5a27e21affde4c
SHA2566f19d9127a74de17a6fe240c6d409cdcd75a9dbd7ee53fdcb09a0f5ea4204b6b
SHA51280903cf841ace3fc70bad71cd34bed2b2e1e3f1858584274616b473c76ab2ab7f8f2622ef8b75cdf2cb69fcb47b23437068c0bbbaed3895310eb542ac833debe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cba2c0bdc927badca99302c7a96edcc
SHA1fef2dd508a9c694ed30cf93d5dd39704e021fe77
SHA256c99ea97478f283e1a15b67706bc4701d8d1b0741874e6a519c15928cbd818440
SHA5126032f2adbe4881ded9a94c7e7e5460def5f5b893c8d14fae95b6c69fac41a88fd7ab9b2975cea7c952d53e5c64937e064fba50eeecc1cbe97c7ba0c2fcbef9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50053102374d9fb051177a1e8b5a660b2
SHA1bb3b51b31e06ff2a2cc7ccf2edc1ad0f2a71a659
SHA2562163dee8cf4e6c0ab2874667fd52215e0916d14b9642e023654f65e1e527b45a
SHA512dfe96a1ce018d2a55c7b78b5eeab449d1f466d11c501eb55b88c82ddf4a5936993172daa2c99dad5342a26400f9d995424e48d9c99867f1a0a2c715baaad342d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e54c6a3c4145abd365425ece1b4f3124
SHA120640f217438f1a976edc30e4f4e67b214b984d0
SHA256cc5887333708d3ed2ebe84dfc56c49a07aa7aa357272c8d8ef0c59d19c5a8e29
SHA5124d136d192b1188173f35de82edd0c34caf5017d855ab1c58df5c8e9484517b84f3b59a222787fc85552cfcb875943d2b717ab61290f8f5cd4f31feae665548ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d29ae3da5a6265f22e6afa518ad29d1
SHA18a7c7f177ee6d14f5ce1704a43915515722b9d7c
SHA256b4b78dd3b0860ee3cf4f011c8949087ffbe752d5b133dd77c39da8f1e1d1dd38
SHA512757692ade82bd4bcb35559fb367a8d88b69dbbc979ecf926a2ba8cf03a2a3a0c43194983491b2d98b76e4944b861b40b3194f0ffcdd9edb2dc8ea255f673e6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd40bfd3de8991a96395010805b827fc
SHA12c0e29feccc078c5a1d8c3d0b9189fdd518c6e03
SHA256f6f0dc0c0698fdcc7776cdc87c27a6af1258ac827ac2d2108a1911eb3998b66b
SHA512ffbac47d6080febcbdcac3ee43fcb09670311a63f2e345abcc311201258b7595113b79aaa157f4b8878d2f502e78a23e51c0a86b13775d902629175719e62ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ede8e0fec580a9a0af5e3d40fc8ac50f
SHA113aca0c5d96dd9c125d2b799bc424bf59049fe02
SHA2567ffcd084ce44dd852b0f2a0a074ea6385fa82f3eea986d393f0bd42e0960fc8d
SHA51222cfaf4805c7279440a68d40c7ff4188c46b9f5acd53f925cd2bdcada7f45eefcd4f2dbca8caa94f7bcf1c3c8594774a361704f2188de491bdb6b8a5249cbd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fb2f1593d44cb04dd0a970118a1ccb8
SHA1307caabaeb02d659c3c00daefdc4cb33d163f5be
SHA256c83db145c2c4430c5ccb711a69a21b2f4efb946419638c123eaefcb389214c95
SHA51217e815e2abaa30af9c84aa91a870adc9cf2ff4d1973a9a979fef07f4eb19fa14a0980ba9acc40a097cba607c5ac9811eb79508d7fe13fcc5351140697eeb2376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d72e4e64093fb51ebffcb24310097eb
SHA17dcb7bff9c41fd11e491472c37232211420e12d9
SHA2566b38651f81d263775482884ccb7b855a2eb623cf8a91acc214a8b050d5ed3c7f
SHA512beb67a457677be77bf10d1ba44481c543475b321366b0f05265ac2452ed50eb55c3d25c9f711dd232173b2645f98aface32c442303b47df6e26fe2b8487470d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b58c3de752d24908267d7d5fd32eb9
SHA171eddc0065fb493b22f2d0fc6fdf697a246ca163
SHA2564c741ca6b186a2b1bcbf074e0f85d95698e22758d8a66ebd5b2e2df79bff31da
SHA512962879b171956871b2d0720404afe2116b8fbe39599cfead6250cdfc06ceac87a5fbfb66ff55f5b25edfb753cdf090cf4719c7f8827e5be09367d2fe17fe1ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57967ad822262fb58040498a59dd076c5
SHA1fd0594810b91a22c4cdb43d581a94785c9c9e541
SHA256d5d43b33f8151dee9effd66a19480bbd658cefc16debcbbc79a370097143a7c4
SHA51221d928de043be11af51f5c045cd4c23e82ae634884270596e8541ba8810c2174be74a5ef1dc86968a8cb17f8aa9fb06b4c2917cb6e99594d615720554fe1bf73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a