Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
63e5e79b5e101ce4b05bb08df28d708c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63e5e79b5e101ce4b05bb08df28d708c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63e5e79b5e101ce4b05bb08df28d708c_JaffaCakes118.html
-
Size
23KB
-
MD5
63e5e79b5e101ce4b05bb08df28d708c
-
SHA1
4d870789f6b88c247ba344a91f52938e6d9fa008
-
SHA256
ba685d404fbcd8e9b42e984b236f4245de8d18e038c82eb1fd6f8468078065ca
-
SHA512
5f688aaa19639ad51124b8a18e01b6a4e7fdb25ea51ac6f96e63770bfd145ba376440e8c7d7b53b363471442baa98499d8d547ef6f37c87db516b51bda19ff94
-
SSDEEP
192:uwr2b5n4ynQjxn5Q/nnQieONnmnQOkEnth1nQTbn1nQFGLnLnQtwqMBuqnYnQ7tm:fQ/UGt87
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000069c8c13897b62427cb55610f2a33c783682805079999b283837d0a0e57169604000000000e80000000020000200000000b281f3da108fae9e56698c5fa31fa74c73a05971087198c75d5ce28794f92e320000000f49118eef946bee42e75887bea1e97b16addd1929f5c162d97a42be34eb10c60400000009a896ee7c537238faa17925ac7c7f3216af278bddf71d45cc70c9f8bee428c7a9ef6c5114c9e21ab0d77c74bc74b32ba9cbd625b6e58607e50cb5bfcbbfd3ca2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07be6d298abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE1F16B1-178B-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469418" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1708 iexplore.exe 1708 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1708 wrote to memory of 2052 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2052 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2052 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2052 1708 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e5e79b5e101ce4b05bb08df28d708c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c3c100c4e9982aa66149cba4bb78b0c
SHA172f3dbb6187ae1b47cfc4b4650398d7ce53a2ae0
SHA256d3494d22ca75b78eb1b91b5ce343b6fc7a3e4bffc813528a65237679659f925d
SHA51203362e6797d9b0aca151bf46b7e0da7ab3e23999b751b58f3c7fb0d39beab4e174265eaa2eda9c906d7a3ddd20782d2993eeb7f060acf040cfa4ed59b0338654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541665e3a71b1c29ac55343bb0ab59aa7
SHA1f91be1d5a47c9bc27d0207e3879846a2b433d264
SHA2562568a6df470e94c2177193fde205e7dd2a5fc154066a201b0bdb3055cba75448
SHA512121616807c741dd75e4eb70a111d3c69a0db20379b590a9c164872c7a7b55ef541b58c966c8e096498cb1c6fc022051d13896c406c7cc697251c7aebcba99e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dedfca57f587587f2cb226263de581b
SHA17e4acb7f33e4a3d3bac5c17fac6f3bd4a86399c7
SHA2566dc77054fe716bb408abcd47659ef581f2cb205257671bc42901d8e93a6ea2d0
SHA51277f35bab8514d071a3dfd032bb36538d2b6a0b952aa6981850cdddda99d55478760f96e8d6f4f4327164d3bc8f0a880bea12b1403aa9b2589c78a2a95f286dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff901074ecf8cf51d700bc44e1cf0216
SHA1b9b156c99be360e8345293257414e620e6da3ff7
SHA256aeb7e49a4adc1ff9026642aa51fb82768ffefa131d1e4eacb428db76f54e2624
SHA512ee9ce688c4c1322b87609ad125df889d2f810e4bf453c48f87b226d170c6ee712f250e12060d46d0cb0e0a6868de13d9212e4e21013073021ad956091f3dc9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20dfd81cfe32b56d5fa6b13cf438dba
SHA1c506678e18dc69ce244b08528026d1aa31f28e91
SHA2563d0f622a0add0013e57bb49a6f24a726dce41578ce8cf082373f3355b46b594b
SHA51209741b331c63936fd12cca3a67e9196f0caccd571c4ed858e3d5511135982d020a045187cdce2eb114e5db0eb53fe224e17263dd79a3b8a677904c7306a4ce71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136b4ed1978075a236a62e12f267fbfc
SHA1d5cfae672e14cb70c0536b4f11db7550ef511382
SHA25638f21bb2302cab9e65ef11478443c1d0f2a270837f3e2e642a566e4829af81cc
SHA5124933a0e5bed864855a0afe499b490c2274e2a2047a769c93a9964c412fba0a96681512a2697d63989fb8c214a2577c447053011482e619cf0a6b65b5ef317f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fccb6c0a81436e9181567e8c9c125aa
SHA162c1b7a95b421230550c7989b4162591e47d9534
SHA25606b3be89938a2821d905355535363ef4768b14ffe7f649bf8dad5f440e65f79f
SHA512739bb2cbd21edd49c22b419d065756e3aebe40d77f38baf59bdb32e990b07b948340535ba36ca7e4448257ef68c08abba6fdae505dae212b7408d9b7f764c2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566082aeb82feb9cd868e9d36a4288221
SHA178187b755c78153dfd9d124f026e0922c66536c7
SHA25688a67a532427afd3757374b0af656347ad971a73aaa07b84f6177a7a77b0c1c7
SHA512e79c6fb82a806ca905c4ae83a0737301bb617a761d8b4a1e56a4046944c2351f1e1978be65fbb570fd78be877ae1329d691db4fc72fbd8dc1ac1119f8f88a1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86b4b91402258262650d4c59668c84c
SHA1bba8c31ed23814e8ea3cf9972d4d5b041df32ea6
SHA256500f9e19fa1267ff8586fefd53d2ef6249b160a9f7cb96187021096f8505c702
SHA5127702520fdd65ac999bd521b2b68ded4cd3edbc995a8d618d3631fc26652a44c5e1403b8d0e1954fcafdeb7bb6b5df4f79d2c6edcc5cd975dd72e5147aa851cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbce889c157ea50bb22081486986af92
SHA1972a2788fa53d54b2cca19717608132218f36ee3
SHA2565056de6867a5f24ca4a0cd09e83431c6eed2bbec3e58b374b4e7f0b7ef3a1429
SHA512954bc28cc6f7d2c8a6f3188f29083ce1c0614cf811c983e6823cd335dbeeeea093a6797304dd9b80e35a44504b2ad85ef5731359e037fbb0d853dbb19ead27db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ec7fd95a80434d95aed5867135f8668
SHA1aeed2255edf91790337def0aa5d7338e786bf479
SHA25600fe4e96a88abf5c07b761dad3587550702d7b764fc1fa4c166dd0bffe0c0136
SHA5120aadcea0f73b58dcac9a719497d81080b697208ac255cb982be40064cf959029c1e99fb78ce642ef9c723469157b519d0c3664e8404ede1a042097e09807c04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0a772b6199c48bfa94dc1c2f1eb2e7
SHA1554fa35f3fa24ee0bc4bf6c03f2abe4f73c846b2
SHA2560850e25295c4cda47b8afa2372e262d2c97d52e8fbdf4a24d01ff91f4ff276ee
SHA51264bb1c3cf95fa9f9a88182d4ece6face26433d78f3b7c9e5703d237516e469dbe1b5ec1112c1ff5eb836c03fac26990d0c2d9ecb76658bba9eafa4392640d45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0ef1e97d3b4165ea23067ab8a53054
SHA1f4ae7302fbb9f488f880c8f6bf0e6f8224a09243
SHA25668242824ba4a61ed9f15af54641fcdf3cc411dfa41e6c6b4d567c48198a38c56
SHA5128ed1b960ba16214b15fc77c98bf35e1a4efc6ad1f219f602174f0bd89c1b398fe20a6b7d518cdecf9e7493b29f2a0b2f16ea5bab526bb89987868db472c5b9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed174817b5c5a5bcec3f79db6daf38e
SHA1828a93a65601d97c528f5e61105528d7ea926c36
SHA256cc70765ebf1c0bc5953c1ca4bc68f7c5a36a82521e68ce211a39316f156fabd4
SHA512ef5ccabf8403c4a3da39b93d480ca430b7a05eefc0c0253aed8387c0bda31eba6f64c8e7ce0c27435b1fea96d71e1cb635448064e2dcc268ab0aedc97fd2d026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9565178ce492d4f592bfe7c2fc3962
SHA16a02a3c130e95268e4834903f2871456948c99be
SHA256d59518b5746ee28ee66f79001016db0857691c5a62ffe66a3eeb548d34748f0b
SHA5128f5c609884877e6ff1ae5cc5cd583bfe269b354427c1acb36b353570b9583383ad38197053e8b4a1a360d94d4875cd16dcd65e0da836f879b89a1fedbadab6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028a34b4f092f14624fa939d1c4fa196
SHA1b9132132bee5ea06ca0f504925c41e6b090da5dc
SHA2566441c9a43e67c268b3585d78cf410b907d8148fc128053f0bb86e4c112d99b61
SHA512b043994fc988d9635bedb88e95e0f4208591f62bd3ac03ec8aa5eae85412ce0e58d9a90fbdd2f2a61cc62987c73f7e00a4b49f1feefafe493d70e6ed8cc3b4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540dcb2dc09f365e87e7c00173a252813
SHA19a713625575865924462e706221bbe6da7e8733b
SHA256548b0e31cc07875ad84f816aa462334b68ee869e8592d77aee88741e55424a33
SHA512d8558f085345d8f1874a893834f5c3129cdd7416de50577af2d4e7bc3ad3b81b3d9f259cea3d275cd815a3651ce46c976739450fa6eeed191bf80c95beda00b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a891ed9fe398570e748ee4985a09310e
SHA1a5b2915e24cbe7908c77124fcd45c7c7c413b2ad
SHA256b2ac7e45632eb24890c66542fb4a9dcc5cfc890ff26b400f16accede68e182ab
SHA5126b29142357f0fabcd5ee96b144c776e7efacdf0a1ae956524e87a3788f0526bea89feaa1a929576b20e1530de2d409d20d1fa565ec4a7e2fc48c499a72862038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5109e2e68603a668d023696f19d5718e3
SHA1ea0e645ea624210b3dc93ac49b89437537afebce
SHA2563ecae35066ca288f03b9914ea710d1b5704658df062d37ccbdb9ccdb4e0fb594
SHA512e8b949c39ef9a7f38cf32d9942000384fc3c5ddb478b8b72002505fa51433216efbb37b16d973c8e04a0cdedbd12a2209c2ce791c8e3922713a08e65c31ed14a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a