Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
63c67b2bbeb05bbcd3ba8e2a1e288aeb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63c67b2bbeb05bbcd3ba8e2a1e288aeb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63c67b2bbeb05bbcd3ba8e2a1e288aeb_JaffaCakes118.html
-
Size
460KB
-
MD5
63c67b2bbeb05bbcd3ba8e2a1e288aeb
-
SHA1
13cd37da4c1c29993d3a73dcf34de6108c3f3666
-
SHA256
733220c7015037360b305283b53bad7b45d7b1fa1b7e2f67a831ea485b5d5179
-
SHA512
d3f6189f856188918b9853c77da57c9191a0359325695e08c72fbbc4496fd184aa87ce5102968ac8ba7503e29a714cda674d114d2ddde68d47365b3100564c12
-
SSDEEP
6144:SRsMYod+X3oI+Y/sMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:25d+X3d5d+X375d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08435f992abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20ADFA81-1786-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c72bdb6bb7834479fccb4ad80131a370000000002000000000010660000000100002000000098a8ee7a5f85a00354e9bbed5065149d8d0a2c8739f4fc764478020185f549f7000000000e8000000002000020000000f727f56f2821c8d641cdeee23be7154b2677a5b6d28337909a6943bb0ef2e760900000004ff16712c5512c93ed0cb7170721685e3d469c729f98dcf42d794ac7f61cae8258e8ba36fceb0f99f98a441c40394dad0ba287a1f5d429aea40e464697050fa9d0ce74cf68f6ccec0bd45356ee8686e07ddcffbaee3d5cf59fc5985d3aaaf559734d46c803e4c7a1f1dd331b670b4cbcc836db4cf664782caeb3501d1f08c05c08641b5ee75b947e6e0f37b66efffbf540000000bdc410f3325e5c921b6e4c2c73b7cb22bbd8a21ef8c3fb18e3f4ab780b769a45446d4776a10f0decbe08cbfe2885fb0c2a5b16bc625c8e84340bb3b8ec6991a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c72bdb6bb7834479fccb4ad80131a3700000000020000000000106600000001000020000000749a4189787a99c21a13c8a9f42b6d941c84461ea29a048205bd75080f366a29000000000e8000000002000020000000eef4079d81ab4a59af5360db692a57170319d489212dce9ca1c7c0f16deda206200000007461fb9bcaa4a91e7b02d4f3baa6b20d52d7a666acf6d253cb92a0893f10947040000000df71a20de9a4787ed745bd97be5b336c8d9369f8a9e19319536776dc2b86d7732e4aacf33b89623f2f0f40c853465a5fdc66e88bcafd121b6895f411253c75d8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2208 iexplore.exe 2208 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2208 wrote to memory of 3000 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 3000 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 3000 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 3000 2208 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63c67b2bbeb05bbcd3ba8e2a1e288aeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c7763cbba425d43c6d2d65192a3127
SHA1d05ab78b9e20d81930d55cba83a35585d1ad44a9
SHA256ae64936fec6168dd0c3c46d4141a79bd2c6eccb1acfa91a14ae0151c6783baa6
SHA51214f1cc80c7343c67a99d49e08d310d7d6a79f12b7577df41c22a01a0d6cfdcd4d980e0d68bce7793a4a6ab128f34b6ee30fc936fbbb6b0954a0f75e48a218ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b94d1dacd2ef9d374314fec8d14e9d19
SHA10781ff0f6412a2c165b8f81b476552073ca42750
SHA25681f87337ee7c932fea102dc8d1091de37d0b86c3d78f70dc11176b5738d4997b
SHA512cf0b62ab1f77ee5a797ba278e2217225c937add6c38985f249e3118e6f87850b105a2fc7a5282853736ef7da2c81c1b4bc0e48db3be7f25e977c4717a4e14fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29a20de88b8f90efb0fd7ec50a331b5
SHA15a5e606ba23029f7107e209575c1f7225be1f8c8
SHA256d961a3ba21c4c720ec66895aa47ff3ec08f7ac600cc1aafdc65d4aa5ff444652
SHA51277d00d2db928a61a962811a7eb541513d32754da69f704c125d54dab46a36384735300d68f05462bc595b5a551761b895b42c7dcf4db323b16b195822254f1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ddd1be92e814700557984c5a0deb31f
SHA1021fe35044a6cf3681f155ffcfec150969a04528
SHA25611b998b0c216e25ce7c4104d446d83984bc3a6fde49b69ffe0e84b98465c4366
SHA5126f65af3ad8e8cdaf0e496a9b65cb12b4886892c241db03f51bc6b6bb9526f73384b103ca98d8690c61b2514c5976c23eea60b6ff694dc7ce2ac6e31a0bae47b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a68edcfc8eb25ea4836346fdc1a87b7b
SHA148e006b86b854d142c07583a13cf56ad20ccda09
SHA25660232b1666f69316c4e6ee73a692ccb9e308b63867f4b9ba07005cc7f1d70a4a
SHA512072c7e9eaf5a1d3a7dedc0517fe30fd110f2ab38f3897eac1ead4c1bd90bc04924b828a90137a1592c6d539c04a1d66c71e2e8b961cadee6945bf6487cdc6d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525a2301b414093dbc7ebc424d7191399
SHA1755ed6d909e37fbf6dad59b3ca863a2092c06221
SHA2565dfe538fb1ee9afa0a4a6e6bc52d58ea61f8c9b91264aff11aeb980cfb90e2ee
SHA512db7001078bbba5339166011fc6893645c6980c4e262f5a9f69e357cc2bdad9f1226798fd15e03327a416b221f4a0fbf15153c9962b98f43491293a2227abec22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535fcee2644707e248a5fde1124950fff
SHA14ab38c78a4bb63c132c496214cedf4ee55cc9b67
SHA256d2a9607314ead49a5f8e39ee41fd5a95f44139a7c310e17eac48ac732764e6d8
SHA51273146750185ad1fdd89a329c5a4ef4dee49490bf7a0aa5c35baf15b552fff214e70e84be706af75e8a189601c6817efca733a913f9ed31a66e49b2eda5e66cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f07051582557fc6cb8510808b0d9b4c
SHA1b903b5f663cbf50895648661413d414b60cd033f
SHA256ef4ac8507928a37cd70b1b77703ca10dbf9c0c937aa2edda0b51ea66582ff601
SHA512a060da350fdf32bec7ec3729198a0154c8a040b7c7ece357e22d43f7fd7e87d093e5cf7f7d260ee7b6d19a0710f5e2de1034f040748a08d3cbb72886bd2b2a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078d8d0096d9278ae6ba264c3b566efe
SHA1be1e7865383caab5534ddf0514e1232e7f0ca549
SHA2568360120a7e2c1d8f34747983a5327f3357dc22f7cd56bebd6faa32345fca2380
SHA512b39aa3ab394ac40ae8bb9466e59bbdb45cebc6b3fb2b5208baf1716c880dc0cdb2061c0053cd82eef8dc67c41daaeaf9ffdcb69e71c4ac9fcc52525818bc7c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d08850b89568edcdadc95c30d96de0
SHA181922305081dc9f4efa7f77e76480c947752dfda
SHA2569941a5e30fcf6ab5f9a27936cd0ce2e43a10dd0b2b94e1f19ce981a94589031c
SHA5121d3a44a6fdfdef718c8c0a2e40ac2e140f8443a7d24d3595c42db3547585db03e1769d6247f2ca69d254c24fa1d1c47b7a8f5636c78619699fdba723a921cce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543775cc8fbc3a425e82e11108c8419c9
SHA1ea100a99ea9b0c271bea70c7f53b33b281b9a9ae
SHA25644bc38adb18848beaaa3b3432b2d66fd9e99bb97267a68263d438ce07b220c68
SHA512073f42efb7f5d1398a0deb5c57d80eab6f9c1fa06c1ea273c00b184cc80afea235e8a0926d11cbb94ad8f09d4e05b1b8ca6f7260755df85dbe488f1fcf60b13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f40c5c2f51658af1e4c50bf584f5945
SHA1b7faaf8e8658abf9af51fe104a94f869fc3a9448
SHA2564808fa76f992b6548ff8f9080597e1f6b1b507bedec3ec0d56362e7453f7ebee
SHA51288121427e26704517f776ca399468180e3a1b77a797f910d86d06a45a089f18daa2a123415d19be479585ee9def2fad3994924805e5b8b46341bd46fc3aa2a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5965d0acf6318075fcf1bd18f7ed53363
SHA1772558ced0a98eceb0a9b1b4854bc201b3113a5c
SHA256e2fdc6bee0dff07e43f775a1d77928633c40f577350ec7d70cd675c1ead85a39
SHA51248e26b7cb5d4d434d69807fff176e1e7738809fe20c968fedbc98e95ef2af18afceeae966bd5a7fc65b9606490d90d88ee6cabcb7d842cb6b1203b24c27ffa6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbfe772b532a536a27e239d7746e9d22
SHA143cf1301b2ccff5ab66f7d6636f4d78e004a4af0
SHA2561350917c82b7a383b0f2aa8259229d0a79d664761731443a1eb4836e9a42f87b
SHA51262211c942c4fe0ca34359871e9543e64e4525d019b987cec9c22f0af011c6bcd503dd5868d70a3d737011b7c9838eedf00f3cf6e3af4abc23d45d02eeaec471d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527ed2256a5ef72463dfbc12d18e4f3c2
SHA1a55bb3d1f19a9028d840a8c122173c5d7231b619
SHA25655d82b3adcdab6987c2dfcb94c35585c1aef0787c368843f2daea295568b5e69
SHA512039e1f71db4fbdf5d35e76464189456dbeb17243cfddafe4b9a0a9815fbf3920a522559ead705051ad257a7aa9a0ac9c712a60d2ede9d8d260004c02500f9f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54104d0e3015c007c1a842b7af47ae3fa
SHA18d5427572b8f71ad5a55cf30927371a50f37e18b
SHA256c7e1fb86012ca9c97a3c8a9fb820a5f14a15578e6ed43a2e90b3df5c7db4016f
SHA512a9070909bde0072faf4131625eb4e252c555dcdc0a6eaa4593474cba351d912f5e2b50812cb5ec2b358efaf090ef70ec62877cc13773b1e6608f7b1b93105d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561098590d836be3771fd9b2e6e7d469
SHA13ae4642bf1c504d67fe825c3b6186bdc1411d2bc
SHA256d9bd20c6105cf02693dbdf693906553e6955ea5e5c98c3403dadeb00637f44ae
SHA5122364a3d2314e412b1d5fb454556385389e6298176ea8f2def90d5af25ac05eec9b56e6aef6c4984b93a6a1b5495c8b36d529d443918306220f971cb06de44b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd010c55653d3ed4f0dee03acf712d80
SHA1d87237f661c9f9de5947af20585926899be3fe25
SHA25610edbf15054808ec0d21fc7101930d1dca136ab759ef1dfc9e11900e1c724293
SHA512ab105296cf6eb1cf60e44207a2a5b25a091fde76364fcf85211a4db15335296cb71b800b35f411bd054d62c3e508b523d69402f18041edc350d6dc55bae993bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a