Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
45698f1e7c3e4233ac0aa7049cb0544d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45698f1e7c3e4233ac0aa7049cb0544d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
45698f1e7c3e4233ac0aa7049cb0544d_JaffaCakes118.html
-
Size
12KB
-
MD5
45698f1e7c3e4233ac0aa7049cb0544d
-
SHA1
38a9d77e0e16ebab75bd0aecdd5afd84e22a5999
-
SHA256
1ec5fcac76c08c50394745942951be24b820b7e27075ae611b2a407b4769845b
-
SHA512
a035d4921b77918f7c748130ebb7b88587ef44b04dcaeae82ef1c91a2701bb34b95a02501420432c1579328cf279a974fdd8d5efc50c544f70e5c4231b37afe6
-
SSDEEP
384:GPIT0sV8Dp/G/u65Y/UuX/9tG0G40guFqZDKuM:eIT0sV8Dp/G/P5Y/UuXbG14Vqq1K5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fe8399a5a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421925148" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4824F51-1298-11EF-A759-F637117826CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008a46f39a6394769f9ded8bdc3b75b1fee333fb0b1b680779b5a53eb8138b0496000000000e8000000002000020000000575af6bf64bf4a4169b44cffacd0e63999603da7c0a5640400fd4290ad507616200000006bfdd5a32dfb8a311f59fb48365540426a1037c5f9e88a2d2f47a3b666c71ee6400000002f7b7c1498f6cba696ed14cb9933b02ce80111ff6d7c4365dba5f6dd97f92e849c1d58aa6e29ca62def8ab820bbb644018fae4a30b331a64a323500fc6baf6f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2016 1252 iexplore.exe 28 PID 1252 wrote to memory of 2016 1252 iexplore.exe 28 PID 1252 wrote to memory of 2016 1252 iexplore.exe 28 PID 1252 wrote to memory of 2016 1252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45698f1e7c3e4233ac0aa7049cb0544d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c34f5f56bff847bc6d736ad1425f85
SHA138dcdda4eddb106ffadff76ba4665429dc23c0cc
SHA25618ccc6ea349677552f31fda15259bb83b1304328240c0e13f3a396e2bd8bfbc9
SHA51261cd811065fa55770f6665eafcff5321d64877aeb106761e2c4356c019958e38eb5faf2913c6dfe368f0e2d6f4134e05b138593e7e0c4aff8bf2dcc3ac5aea59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ae34eadf6b38482effbea4f16e7b6d
SHA1a2ecc9fef9576765a82339492b6893209b09c25b
SHA25630f678949ddc371e12ebe458d1e4dc6b736dd9c511b25e8955d9ead734149556
SHA512bc3150b07f9a4c13eb6e77b82d6d706dcc3a9587048b428a9d63366619457e73e99df69449d91ea1097277bf182d49475600df427217ca37986f818899432120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549269b4e9465e66347cac4d8bf3e1af6
SHA1788bd4fd0c68ed4338c6b23954d4d920b32369c3
SHA25687e2754f544886d84fb564dabd389abbc0c97be6f2f317a6a246cbfe52731cd3
SHA51293505e8544f63904773296cf6fb4da874c581cfbb65478029e18e1a8d8d386ad617e4e5e0d2b9c15ae86ef0f352f35a9a54c42a46fc5251852fce11b2fec8bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7f86f0703fdaecb7f974ce94d21b44e
SHA17527da1ad9a24a63638237ef81c555516b55b43f
SHA256266478e90bee60bc155b6edf8f743fb1c9966ee2717d03d747b16b82eb013da4
SHA51243f4d785336d31987f12e4d561ed0a5e64132adbe9bccab56585f16cb90062ce6de0656a5c19beb1dab49e40b6df9b779c2948e59d0430e6d9a2ba981d836c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566c4e6d5a7d2d9d35f9b990d003c2c71
SHA1c74bd7417d64e8d6e2b5b4a306effa80ed0beaf8
SHA25628cac66c88080954f66cfe5ce2f92b1b756ee157c137c6ec8a1953d2dc4e5abb
SHA5125a279d7256fbd5bc8e8f864399f21d43137efae10492d7be9847379985d586c5f47009ab46292970f104811914154b111277823f4f97e8cba051d3bd7f2422bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b23f5c6d746fae39f96b0fc1d04e07c
SHA14a429c201e426da85294ad7ed869effa0d22ca45
SHA25635a8c43546bda4b863cc9411c7ee8a1075500bb017d602c40a49ca8eb370821d
SHA512619c51967042fb58943c0f1d6b90251b4951f78886614d8f4aa178541f34149f188f3f2e5a0da8fcf64543c384398203ee3d55f2cf695f3fa13b9647e83ba5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faaaf147957fc4fe807affd7ac015e92
SHA1657bd4a5766147135759d0a48f880238afbf2488
SHA256c700113c6fc7bd7d8c8d2112e9ac9888a8da98dcb107e567fa2dbd3279865124
SHA5126b0c81bc97f7777b63a1b0abec441150b9cf49cee20ee4848443b7d251ad0880d93fe11cdad8c93764c9791d2513c77ed474cf0cc4f99c3fdfd74bca9f216c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53326fb9d46c7d833f7b2592ed1dcd8e8
SHA14998ecc5e69c1569ea41d1d86cb6da5d21d93a7d
SHA256e4f393bdb6f62dd7f591bcb508d7f23d0b1c1b3f973c7026251704fa15031a75
SHA512191eb3652f1f4c8229eba8ab1546345bc8d5d637fac6bee9aa0e13af01173089c6b97d1dd78080ec83273ccd155237a2acc4d8411143c5e2f6d1d6797f67111e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c84464ad99006bcd1260ae808f0bbdd
SHA13ac832338d39cf4674d9a5e4b98c7263d44ad3da
SHA2561e195f2059f4711413a1ec58f93cc18cae05fc33cf9f80d7e8c5522503794098
SHA51240017d32035d07e2336f7267e0f6b3241f20ed79ce44c8b5347375c100ffb881e3583856742029a0efeb026793d40c4322d8958291e8488cd3c7a271121d1102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bac20a7bdcb92c38b3d68f576db0a8d
SHA1e48da585c718984133c65a3adc219c887048ea83
SHA2564bed303e4d4fee20ba51a3313945d133085fcc4641921bee09676451111a698f
SHA5123df5868ce5320c186f05b5a9788e6412395901e35f7aa25c55c4c5a8c6d2859e40d05bc8ea5a7cb19e4ac83a9a9607636eadd597fa8ae7a251b8b8e0fcb13c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54040b627d7289a99e2ca3e31db28f53b
SHA17889042c89ddbb45ce370026aac165dbbc326f69
SHA256b482a6871f79d72a5548f2d5a98ec90bcbc7c3c003d2658549ac7f270474584d
SHA512acd384a1e264dcbdbe8d71f44ab1a477f42059e70e377ede0810634ae330829197d9167b859b01d732718e09df50ff99aaa6ae5793938aa6cbc3222cfa1ca172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe458719b9bcde04f22f33415c9109cb
SHA13ab51b4888d9a3f8357c2d6ac502d61ffabb4a62
SHA256ff7bc7ccd59c5f2056401589d285e312ffac2ea6deb5998334c71421832f9135
SHA5128a8ed0f00f90b4fc8c861a4b6241a55852a0e31185a94aff6700900933fc419b9dcdcafb5cb0c2edb0506c7a84c09571239a73104e566a3132ad3894cdcd0dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5914e263a6cc8ad0538dc907308874231
SHA1da902612d6ca3e2c720f911bb5c67fb6141d61e9
SHA256fe548d9379f0baf0f6d45a5fea5a2f7c96f6decf206023b5e449dedff6b1b2c0
SHA512943243d8fc5a088236198f408049193337a42dd401245e9182bc63f4c21062f49a6c1cf2cfb28e3ce2e4cec1e69530ff45747cf58d89ad04f51b8d57386fe820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553fb34727c8c6e0ffc04c4db8e1f1787
SHA1ff136a94c44d650bfd4362b0919e0bea28e5c0ef
SHA2562b736ac02ecc462b64d6481590f934ba3e0da966757d228bbb26f0e5d708e645
SHA51200b23edf3ef4199046c00fb4cc618593b015c61a5916823cc3c4151a7f577c7ec47c69ac16d345eb4818d84b7a7f84663cb36ae156d394b8ce99b3fed1de1f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa16048604a4ae137050f7753fdd1818
SHA10a588a4cd602817bc219efe4bccbf5ac510f9f66
SHA2565e4296b2a47be6d768882d15e73aed2605e79d40fecf214640c486e980469df6
SHA5121a0b915851f37304cbe4c981a153b0888cff8edb78afd43d26e9fa22cbab7c0c870a2bf495099415e9e76c0aaaf5776198c542422abbffd7e968503d8da2678a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad280bc130d23d10fbe36246ca7cb8d0
SHA1b383320b8cc465df65a56941b044de333ffe8f92
SHA256499fd8930b0aeaad86d50926f0714b3f7482f489619509f030fd0bc71057f3df
SHA5122b2ef99f3220a3a93446e88886c1d7369d54478dc6f727bb31719ad15502e282ea88c4592ee05a54b430c5ea9467fa17ddc7531c66d593f3c55ad00a2aad580b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b3362fe2103e5956042556ca30a35cc
SHA1cb740522efaa41917dff555b06b98a42617b5376
SHA2560bb72f44b1297ccf1506315ac1f9bc5c25fb36bf298579bf9d0b573e170662e3
SHA5121803cfe995d104d40fcb1718fb22fcfe73c0fce0b9a3e21a6d4b977c2602ee11d789b65840c69fd3ced36b1f283811bd934da24614aff6b1c5ef17a6efe95c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b3fb723bad0a96f82a438f9d30110a4
SHA1fe2baf9b444a0c27cca2600001efb6e46c292bf6
SHA25648960a03409b13138e33eaadef1363eb243c1451ccbd721a25b70c4f2e8b6956
SHA512925fd777d31695e18280c726c0146900c2c215cc3903a4162015dbcfc3fa40044cc688d35716c0b547acb1c090a3bd299c26f5116715c675706616ed4a29baf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ea2392dcb64b23c6f1d3ed06853601
SHA1274a80905a13d2421a2ad3084d01e96562d914e9
SHA2563a9a26d82ee78a83ca0eb5c317a6184708a992c0dcf114f9ed34ad7f253fea59
SHA512466ed40ddb6ea40984abacf000a9921e641935233e7fabe20cb46610f75bcfd268b8761c14d3d8f4858435f834ae7a1a0506e00f84ba9883013e9e5cdb77eb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b07560eff5cb356b4f0b041561d419
SHA1aa08354ff9855a3f06a16e75eadd975a8846f5f0
SHA256af5cf35f23e85672da3d0ac3dc5992cb4d28c7ce7d441593ac1890f946f33521
SHA5124dbbc3042415e30ad17fa56c3ac7283232858fa57fec2ff5a7443540c62f92265ae81a6d04d0b80f2eb680ad531f4d4fb2db9cea1a95b136c91f10d51effefd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599212caa801a047919466c749626d1ec
SHA19af5dba8308c96aff806100d88f0d4761b3094ac
SHA25694d48ab4f4c590c29fcf60ce1fa90476dbbd09a393b496791b7b5eef6da224e8
SHA512b184f99494245d127ed16894c365833981cb47bb99c4b0bb6c3deca3952455d511753f99f70c564c8d43a4b7fb1165088b3b294001fc6260c4ff9f30ddf554c5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a