Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
6bdb457f0bb097f66f335a7c969441f4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bdb457f0bb097f66f335a7c969441f4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bdb457f0bb097f66f335a7c969441f4_JaffaCakes118.html
-
Size
22KB
-
MD5
6bdb457f0bb097f66f335a7c969441f4
-
SHA1
dce1d1faa09e2eda30eb636dc4e41fd2dccd7e20
-
SHA256
d250ee27c99420f5dab38fb97ad6b55e1fa46fe30ac737a121edd34613955d9d
-
SHA512
1699ab28975bb8c740767113c5aaa4956b19580ee2f44d00554df165186f9ee3f146f8c2a27be26ec10932e598701ed12f43df5cc3d5f6378d89a9b287cde793
-
SSDEEP
384:7zjaOb6HbBKoqoD8svpV2vf1/hJ7yRsle64MHI6lHDswzmswn/swhjswtmPs6el7:3/mHYpY8svpV2vf1/hJ7yRHWI6lcmPsR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000698c9eebdf10dc18aebb8f722a01dbdac1550fe1e918e82b76aa518aaa47b4a7000000000e8000000002000020000000c3f3259f5ca62a093dd7b7f62741dfadc3d4c50eca9960e13bbf05619efe78f420000000e48c54d8d13b53994340b9995004d70c700ed438c697998e4b1ab243befbea524000000061c7344c440f518d429723ab7129dcceb8675246ee0cdbd748fd51e7feff12061048c449ca851d298445ad81df7a6b15ffc476bc9039ba06de3c463083dae6d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2A91CB1-1931-11EF-BB21-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422650538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0733d873eadda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2216 1700 iexplore.exe 28 PID 1700 wrote to memory of 2216 1700 iexplore.exe 28 PID 1700 wrote to memory of 2216 1700 iexplore.exe 28 PID 1700 wrote to memory of 2216 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bdb457f0bb097f66f335a7c969441f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc557e1390fad9fa1ae06efb2dff57c
SHA1335496d95061bc536934f0589ef313512f0f4160
SHA256f223750db269df1028c07647ac0b7cbdd5615621ca0d87d2b3c5eb9ba146ca11
SHA5128cc1bb9353305387284857f60561d3b9b7eda7e7869527c0975a68bce7f0f5631523baad1bb2d8348716b610721e400a589e655fdd66490c4af730ee8de498dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e55f96932e5fb9a9f58170645d9921
SHA18880c8dfb1af6b42ef2582bb6d849c12c471593f
SHA25646c0a3b3ef4070ce265f8a1f11112c28e803e0f31721c70ce23d55a6057afc60
SHA512113f3f79f1d2b57169d740476cc1811cea41a7c51a2d6be5cc4458da873636856e78a98c639c0b5f1ceb19f529f13b590fffed2698430fd6ecdd9828a4a48825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570d85988b3eca1b080ba7af36f1d1b56
SHA11a37eb151ffc56176cfea8335f28e4062a058f52
SHA256abc5e1a4fb37840ffc4e987adece37d55452a313ad9723201e34bfb853b6769c
SHA512daae69660296cc6b79b53da53db393a3ac93420d0bf1bb7773c30c700e3caa78d3132c8a218f46b5566b239f983ef62a35a2ed795e452ae011410f403b7bd99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55218ea91ca13c40d8c9c21441b4b54b1
SHA12725a583a1a184ff1937bb2b6d4c0fa1e9087b47
SHA2560d4127ec0a97db99c5d02247815b1242ad73f3623635a740f9304025b1fc3791
SHA5127a965881e2ab6f86d73e1b8fd6351ff2e5217ff5d13e31cb458ebf89e9da8a2690d9fa655e824eab99062503ef9948d65a90533249a1857ac4c12e11441fd00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55440ad55dfa8e72fa5c8d998a1172659
SHA16d902a690d1b2470ce0a2291f55c3cd802b4e78a
SHA256d1ea802f2ca3f7de7a6ebc7d2d0e540163a857f7b52a616b0546f8f5b1448c2b
SHA51246ea8e722e65720437af1f73549f8d3d21027f575a0a81600d2283b62bc688c90119e813041b6141b074d54b2aee02a4f3b073852b83785c43e0df55fe66a97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f007bf7ea30fcda67543228637e2c41
SHA1b688793250da94f79720debb4fca2c34a67b6f7b
SHA25615f1dbcfa6913eb71065b0f9d69d1afa7d836a7d955ddc7388edc7f9529b00b2
SHA512536cf6d40e8e4868f741ae31cae6316d002bcdb057fdb92225f3fa06c6d3f71c793b11f54efa7ecc135ce50294fa5c062ccd474667a22332a368b301741c43c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b7bf002f6992f0345814a8b55a66713
SHA1ad3cff914834f178de4e77c4d0b7bad0bfce0a8c
SHA256c1d003d85ca7f66345d6058ccf0520f505996503d07b0a64e520d7115d177411
SHA512be4bedad6b416dc199d3bdc6b6db4e8759280553948ac7e3f16f1a6bb9e0d2cc35b2034d912863d5f79f029b2aca84b92392dd4a3374afb23ce2be1c47b9ee2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309122837eb0df1a8fba0005e59d35c6
SHA191de4023126bfc4075c99941c153fc8882e5c391
SHA256b89f1381d41b59656758e358c0fa4343ed8033ca6a4b9758a601851fa364d530
SHA5128af7a7868d2e9757a3476f6f0ea6bfc7ba9a5bc32fe0160b953d7dfd9ea4a7fe1a16d93e01b48b53224a4a1245696df64c3a5b66570e9d70444777348ab62ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c3b449cace9648a54c5d178444ef1e3
SHA15fe9076c1e654060a258dd53b12bca5e23859125
SHA256ad748e18c4dc20925960db0802ea8118a929f7166ff3aa10ff6cd15dba3afdd1
SHA51228b0107ffcbd94c01e5d3118b7cbd8de882d176be430d37d80791b01933ba6eaea1b3d03b1f3f0788dba11f070c58020a19573002422a3a2c498b1ec5ace8b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de56f8125266bb58ad732d5d876b8c6d
SHA18e7a448e4e2d873a4d0c102208c0e0d0964bd533
SHA2562a7493c8c06fe57a2a85b1ff69354053ddf3744c72f5d9225fddfa323004d304
SHA512530785c61544d80f48e2900026206a409e1f8e74cb72850d9bcfd939cbfd76e6f53a381d107c4fb384962e698c2874304c15f3712b4fa7c91383ed1b16da9696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e381c1d9b22be5c1a412dd575b1f0d32
SHA1d7476e647ef6531fae3837a157536a9e34be3fef
SHA2567bfcdca0d465fc2342513a21ad9e3f7a5041b07c712912cbed9ea1b22dad700a
SHA512709847fde548e479706d1dae6fc6f53ba4e9b7410db672a791beff7eec4023657007a1c42a5cff1899bc855f241a0b1a2da9a070089244d0f344bcd1e770e1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4be4b0a18e6837b4741e7f328ebd02e
SHA150d11bf6054f2953d087a60d02edc6da7c25ea23
SHA2561a064983d5821cb8b85476545c8c5834435e48efc158122a94fa8bd6fceb60e7
SHA512ad6154430a98df74f8185e6e0d262795b438f65da4c9e42a9fd3b5f64a6c35b3426b3ac298bfb9d4f492f88991c72a18abfc0daccd52a9ed2f106818cff50801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e97fa21691f57b00ade7841762456e
SHA1919130dda2a4ec55d7940ab67eacb0660d22d8c8
SHA256195fa68d65fa0a957ad3a2351393ce5ecaaf506228ff0fdacad114b9f0df79fc
SHA51290556ae90f4e00bd6228bf8d77d0c52a720eb8ab0fa8c1cfdfd8e640fade92d17a21612862a67ee62ec55f5dacfbf8cfb8d7ff20c035281937b13ca805607c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54912e8d17dd955a745a218f3ec38a44b
SHA1b8cdae4020f17acd5fa439f63a38db29725efcce
SHA256cba04331d0b9a715ab2a7bd5cb2a65bc758ec032b7b49ebd8a8688329e038a8f
SHA5122c3a41828d22e050d4dcfa7372093af75b22ee8cded7f6e4b7f22e5929f0f4883306b4578eb580d0dd30e7521c763473333c1b771352a5845cf6ff3bcd6aadda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e3f0ba4523326cf2cd5445383a29d11
SHA1d0783e2510e2ce5553a634800af8059052db0179
SHA256e6b231b6de077b9476d03a4bf43e3675aecdbdd2e8afad57cba8fc791692e45a
SHA5127edac54367970dda33b96fb3d77558b230e0fac3a86165cf053ee3b756645800da56326abf4763f9271481cd1651dccea867765fb2e9312b1cda7e3ece4ed57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fafb2024e762ebba47aa6c08b768fe9
SHA14322cd1b79159f16814783f10201cb6963138d80
SHA25614649aea980c07176cd54dc18a161d30fd36db704d3bdf0eeb846bbf7e31e376
SHA512a9acbd098454ebe44dc3f86fe199388ed28fa1b710c92f1e515c3e53aac17d25e16f6f4b873941b1677f002a103a408eef7a3ce11d3cebaa6ad5cbcbc44ebe80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ba95c0dd176c1a373875008859a31a
SHA102d642154201173703c8a96048c77b25d99a4852
SHA256c799548ca0f42273ad5a7c7b16716d26be6ab5e7a0e569598e4e12acf2d07fdb
SHA512022bcd327511455604418573af394929ca634da315b7b98c25c052778abd2b95ff164c7a185d474665678935775901aa869f16502e28f5fe7990d5256b653a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e59716044175d0c8260f57bd15d4f9
SHA126a18ecedf4873e58d25986a0024fa83194fe810
SHA256f6202e912775befb30d19ff3ffb44712939bbbc35c45a073fbc94653aaf306ed
SHA512c9c93aa1154ea9af8405c41b04d13ec38b719f9c851f7f39a172e400e9ead2d0c3358c5b31545f88548fc78eb3f86b494182b0aa032a5648295bc2613716bcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f362d3d80d150c737ea797ef040d6285
SHA125f98927d8b9baffe84243859e5c9a4f778507ea
SHA25645bda64c8cdd95c5b42bc6a6c82c0b4829f039152683f9775c988ad10b1f38ea
SHA512061470d8a844d34019f0e41e179cbef69d8f430ae2f6c48f29071ea006301391a3d12937d0704e563169c1584fdc701d7388e2dbc6af6903885f11a7ec8a2eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee5a32c4ad2886ceadb229bc00ce0f1f
SHA1cdecd8f847578366e26af0dd2f01c746e7300e5f
SHA256944c12d9f3d755efc5d8ae07b7340f9349d24ca6a0c951c2a5f2f5dd27c7f021
SHA51261ee53ea319abcc8d8e73a5c3be99afe956b81ef728361ca1de53ba2ec8428a683ddfb699d3e90fc962e1e16fedd7f8ed87c2b9ed6c0c25cbb8459df5b730f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f171eeda9a66654357dd4c3a330687f2
SHA1b607b9d738873aa295daed7f95369992795a17be
SHA2568733e92cea3134c74dd95540cfc3673a61f06c3417972d53d09d45f6efb9e536
SHA5121b7488528ac1108ec5ea9af32fcf5de231cb564072c05226491e6b78ebf26e0d18bedb17dc9faf16c0aea63e4b524525e145fe1c43013631fcf4a39b39b9344d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a