Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
66d230bfef39a4b57813464533cf9b8d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66d230bfef39a4b57813464533cf9b8d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66d230bfef39a4b57813464533cf9b8d_JaffaCakes118.html
-
Size
4KB
-
MD5
66d230bfef39a4b57813464533cf9b8d
-
SHA1
3e12f97e5bc47c9d5de4542f8ad37dafcc2b74db
-
SHA256
a11f19cc3eeff4fcc947eed83daf407418ace7bc2045cdb3beb62b7e9ee5302e
-
SHA512
19ac20657e3e6a7b281eb7d0f4dde4f5dd91833268f3a33f345304c0793c3176ae24c90e4f94516f94386760b9e8ce1854b1f876e0014ae7589f2c1b91c76b91
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8okx41zjR:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31630341-181F-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422532639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000002037a5787b9cb1c99cb229ec430c7c2ce89afa247ea33522fb4f5a6af179e008000000000e800000000200002000000008bb1d08fb20c8626e7fef1b3c976b830ea41676ddb8e64bf400065826a373f120000000d700a406a503f88706c8173896b3e5667e048fd9f981ba18298e2ca8808933f6400000009ddc362f13adbab366650ff051667d47c58c9ab88ea65beb7c0012aa726d27ab7f2e5ff1174d873c6746e79ae45d61d5bfcedd637c361d9891b925a14bfe8eae iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05beb052cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2932 2988 iexplore.exe 28 PID 2988 wrote to memory of 2932 2988 iexplore.exe 28 PID 2988 wrote to memory of 2932 2988 iexplore.exe 28 PID 2988 wrote to memory of 2932 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66d230bfef39a4b57813464533cf9b8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ee69ff9980e1d9aa5875d8d6850e3d
SHA178f547951537ff8ada012ce32c1574c8221e25c7
SHA25614576babcdb32a6e0d8714c2a21206aa01f222abcae30f1e52958739a23c09f5
SHA51290ede27d18dc08991be640f94b1731a26d8fbc0234b4ff2f9f296ce742f5ac3fc8668f42ae7c426d8310c8502026c2037cb853f5d2ff6ffee960106fe44e3e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97ce065fd87553784c6c064b504c39a
SHA17424de119bbeafc3cdc46c2f67b926ba07972467
SHA2560216064a36de7fc752646ad6ce59c9cb30e5f98a48ef2b7d0a55d42811e4f5fd
SHA512986654a57a40fccca0d26ee38ec13945bc8c4e7ecc8cc26b2f6d3aad7f982f150fc4fe44c556af9ab7fd2475bce32592c4992b324e07a18522c296a0af263bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520373d037813fcd8978796e8aa106c26
SHA1024417ed14419dbee71c6ef0f0f5778d750b4f2a
SHA256b3ae6f6789335f74cd0502739f61b1706b09e968bcd26546d3d09bcd5f5ea67f
SHA512b189f44c43ae5ff33384e416ac4b994fd513060c88a68396f57a7856959d5b9c17081bd06317358854564713f50e4f0b79a65027c28fa3abe03d24255ce2a0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b8a933124a97034d2ef2a04a3f9a3af
SHA1be309d95fc77be0a9b540c3fab8715c635d04121
SHA256a7e96c381c7366d4bce0381c3837d9f2a42a79c9e0a28bdc55a221d879bbf1f3
SHA512a31f0f928f9e76945267c88a71104dea7e2cbff0feb2f8bdbd4b07afb15d77f60a500488969c139d4a014eadcc3503587d2c927badc70cbadc791ffce91ac568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e9f909d01e995f124208a0ac3b8bf1
SHA123fe27013bf5d97390586008a842e82d6ebaa9bf
SHA2567e9699bb4d439c7020bfb64eb55637503a3aaf1162018c484276b0fa2b93f309
SHA5120c2cbdfc54cc5eb9d139be76be4beba7c5f00aa0a882507db06bb432c434d8d82ad45b1cf897ae60fb504e0dbc3d1d66756baaf12f941f09805c4fcb3ffe88e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5184815895019298a04d94743163c5f9a
SHA16267f0882699cfe5ec65d183941553e4990b6b5f
SHA25651594232e8aca7196463602bf2073803463e4966e27a1153ca4074c0628a3fb7
SHA5122418755599ed380db8b552c34bedae45c834039120d0ce2a1843bdbfd79c3e9777fe4ffdc40f44c3b74553687e70f2f9e2c418d258e3c0a9f6270e6f24beac74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f52f462085acb3a50c69aefec9b4ea
SHA18a2e6c842f08a71a18f79b90ea9d3b6a9bf8c759
SHA256a0907717cfa9c12106314130ab254c9808bfcc9c6fc4719fbb41aee0c72bfba7
SHA512f4586965a34da2893f18f1abc0463c037626c054e08284fe994b2152775e1bc3f758a519ca8cf78b2040b1ced573ea02711db77f0346cadefbc264cec99d91f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e79c68bbc2dd378a41e90993bdb7bb
SHA13e6a411cbc0240ca0fbd360c8017159dfb1e8a33
SHA256374701fe246becb14339b1be77df92073c46c8fff41478bc5706df9da5568edf
SHA5121218fcaf39697f8ba275c25c96bd0b58a0b39e8ed23edc7cf5c47e9fe03da60d8601f936a30c144487bae282c991d726d0caa8432b7048f0ea14e2bca03a6251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a689fbabb2a76fee1b18134d904f579
SHA17063496d80b899b9e5d5ba8b20d09addff836364
SHA2560ab870062f52674d741799e7375411a869012d4727c23674f56ccb51d44d4772
SHA51201b70dea0bcb7864e47a32171f8e383bec7bf192ea8c78bba4e165af43056c69c4afb6ea19e1b4e73f7a74aeca72014c5de6a7dee53531f0d0aa00cab4d5cab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5361f8e50e1ce4c67502cddc249400c73
SHA17eb65a0455525bcd8e418345332a6686c0e492b3
SHA25650118e7a8282284eaf578d95ac660c799abac3094a54fa9db934cc82815a53b8
SHA5127da0b32857eb2cf0ae335adc1534c5b7fe0ad4f71ca3697876e4df3d4a221010b13ed2b34c9b259d001a77a0f464b9cf7b0bef9d730e016711961ae775ed8282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2bce2a71fd33a2d1da2dfe4672aa914
SHA10cc37eac8593b79fd92473574a30b93953a8c17a
SHA25633b26292d35197b2ebe15ba449eaf583b1fcf607d1dff0a826728506bc8b7bf9
SHA5124ac9605e2620a5e9ce24c527eb76f7a79061d03546fc7c6bcce0182a0a4fc547276973acab63815359dc7d1b3882a5460376e5090143e0a3d7ef561bd3e39808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54593d5232f17c0ef6e214b23fe648f8f
SHA1dc14b88c6ca211b2eec4ed62da428b6e0d4b7c1b
SHA2568880382e2e684f89f10c326d2c23b39464408252e3b99a961caf3f069aff7092
SHA5124292d8a3d0e15f3af2949c10590463e25472179690658ed02d89c5ddbaf3390da5396a8b23727c4c4be950d88d9c76235429e696b8a4764c6797f4ab1ad9d73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590f279db79f31e590eeaebdb86c24beb
SHA1791c0109f3d60d20ec73ba8c7922f007e08ee665
SHA2560fdf34f4eaef501d938d2160e0b121a6b325a46bf7dcf62903ad271969f48a9f
SHA51289e48223a884657252775003691519e0c5461f707cf93ccf06c24dfa88c59387820c180e63f861ae956491bc971fc5722683ea5ba58fb513a0d681f426c1c77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e91ecdb427e13c0a1c52d35fac73119
SHA1b2bf24e08c046ab7b9ef3babf859b67034966eeb
SHA25690dac33b744ef1fd6c86cbca6f6cab7db4c99e0cb7d86c6186a6c3e42565b1e7
SHA512277e37959382cf9c8a06ffd85e6a891fe9f5a5c9bba8bfa957696692d70c716666a4d0a8aed64bd8284434b182843bced41ffe34e5de060a4b00ed013ee7acd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4bf1fee8756babf3f6b94f1f4f8d332
SHA1fa0b7cb4ee96d244c08ce951113a7d989b95736a
SHA25644be55ce899db27cdda323f9211aef3f70d67466ca7f97578b39d1ede97650c7
SHA512537d768ab05ca438b8392e72888917820230a988179fa79b367c1bda9849328a9080c5f224c7b76e6823aaf74ee41a1e8586ab1789be62f966e55b88e6aa6fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d9a40eeb1f820b5d00ead72654c6e9f
SHA1eb284b653303a50017af43a33c062a0d401fdb3c
SHA25655e36af9d8c1f4cb514314d6e9bb759bcfe40a0015f7013641187737e47723c5
SHA512f7f552486f506db02bc934eceb939cff40242c56e87bed194a3fd50aa80767aaa0132ebcffa12438d24485ce91466505a28a8c0c8c63a2037ec5abd31b91a863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fa25405c2b2fddc244c1ae8994eb6ea
SHA1ddfc3637630fccfb598263c7c3a289605789af4b
SHA25640100302a18cb1cfdef4e5e13d7b7dff9242dea83a11dca1ef7fa15fa51b2047
SHA512a7b1681084d6477315a5c836fd0607b532e36bc85e5c53fbaa09780610a4eb8c399974bee8c0a37c205f9ab7a81e47c259c7d0b949f19eb9591454e1f933ee3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3b157cd908073a2408f8c5cf2f3f3cc
SHA13fc7ad8cf2c029a288d932ee2a5a72f47a298034
SHA25628624f51a3041e124f7b0ac6f3df4be1596c54c90fc5de3f84cc2a870978c8e2
SHA5120741e9375ae14c12cb0b40ae99d2f229e8f05a41f3c4e8f3ea61690767cebef0afa9ccc2a68906557f7fdb50246f39aaddcbaf90798440a9c7daa8a0d76b8652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5791028c9c8940fcd2e44066e62ec8e89
SHA1e181f0eebbd68fda90b3fd2380797cb6a89b8720
SHA2563344d21a8815e8d643d90c89faf104b5e77c1a115cef39c69c7dcd9460db34aa
SHA51236ce92112394a6c3d4cbc39580c7fd526d4de850e690894dfdb8767ba00f548f369b74aace5f1dd5a94c7bb0f730837047a4d5cfd5bbdfb3331514acddf175ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54981c0450ef897af1afde9884054e70a
SHA13dcf600129aac199bc286b5f4ffba4a68bdc8f7a
SHA25617ca5b6fab4a85c8b1dad01371bece44e43698b76ca2525c5359646f3cef25d8
SHA51209bc3a62fe8715250549fd43168fd32f9c1f7e3b3b50e7e5aec011383536a7cd12b3e01c1b1efd5d8239849380e1294f75bcd9f6d08f644d7469d1a342a92442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d0691cfefc1a70453c1e6d741aac17
SHA1ad05222c9bebb3d92d2497fc87e2db6ee5a4ed1b
SHA25673bf6a2c771c888f0e572ab0957a3070327d9fc15c7d7bc6b4c705b0bfd84e50
SHA512cfb50827223d3304bc0ae5078c3c2b2ae19679117987ed77497e0da6e32f73e4b373ed76a8db975e6d127ceb0d18f8174b78d3afff43c106fe753cd9beaf0d22
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a