Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe
-
Size
252KB
-
MD5
17096d9515845d24ca55bd5f87de48e9
-
SHA1
dc52b1a05818047b88df8834eac9516a084bcc00
-
SHA256
424577a54a1bf5a3fbb7130c9cb9ff7f7bae41ce9bdeb07b737602d2b1b78db4
-
SHA512
c27a9f9e27db779246bb4c4995be6d29be02d0cb2a0159a1c44682b5ef27be90011da3fbc9f49239e10e67fa3595b61cd834c284a80b98fcb1f5d4497dac2204
-
SSDEEP
6144:91OgDPdkBAFZWjadD4spxuSRoPenvKC1KH/H57Mj:91OgLdaIwSRVnvKsKfHpMj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4652 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 4652 setup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DCE80D87-B746-4EDB-750F-6888FAC66023} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DCE80D87-B746-4EDB-750F-6888FAC66023} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DCE80D87-B746-4EDB-750F-6888FAC66023}\ = "ADDICT-THING" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DCE80D87-B746-4EDB-750F-6888FAC66023}\NoExplorer = "1" setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023467-23.dat nsis_installer_1 behavioral2/files/0x0007000000023467-23.dat nsis_installer_2 behavioral2/files/0x000700000002347d-80.dat nsis_installer_1 behavioral2/files/0x000700000002347d-80.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\ADDICT-THING\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\ = "ADDICT-THING Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\ADDICT-THING" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{DCE80D87-B746-4EDB-750F-6888FAC66023}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\InprocServer32\ = "C:\\ProgramData\\ADDICT-THING\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "ADDICT-THING" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "ADDICT-THING" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{DCE80D87-B746-4EDB-750F-6888FAC66023}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023} setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4652 1444 17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe 82 PID 1444 wrote to memory of 4652 1444 17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe 82 PID 1444 wrote to memory of 4652 1444 17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe 82 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{DCE80D87-B746-4EDB-750F-6888FAC66023} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17096d9515845d24ca55bd5f87de48e9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:4652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD58be20144dbd200c6de0c9430ed9280cf
SHA1b81e3aacaaedd66ef0896acabc6983c94758e2b4
SHA256634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6
SHA512fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e
-
C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5f0ded83c97e0190109bc35e59c3a86a3
SHA18ba0d099b3ae07ed479f45000f422f78a579254f
SHA2569301e5cd5c9018835f5656cdbc01e62968d2cdc305f4230fdd2b12e256463484
SHA5126a437fc06c2db07568606e8a9561f51e6d038d8afb2c05608167e42c5c134290d96a8be80851b01175e579f07685dc49ac1921f497f2f384670ccb24a1cbbb52
-
C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\chrome.manifest
Filesize116B
MD56a5652948be7ed87ea37a8d00df3213c
SHA10dc7d1a739b5ccce7b278a863a637fa49cc19b6f
SHA256d0c5ebeec5135a621320fdc091293faf8cfd6dbbb0091a35f4b3a85d82227fe3
SHA51218dc3f9751befb3d7f2510a30757d8d2da24fa512f4cee82679088e65c687acfad2ee19d03b2153323d539a4186064ee4ee7f69d9cd1da53e6732a7fa40a92df
-
C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\content\bg.js
Filesize8KB
MD5959271a23d5b8342dffe9b67bd644c5b
SHA188ccb9d1fc8c42e5e6ecefade2f74c6ae9e81888
SHA25644b982773417a9b19fa50351ef5e447fa742bfd25bc3486824452ba9cad557cb
SHA512026ea01b90a3502728342c59fb9a6ea8e69f56c98d746b8cfee5beaa97855f6deeda83ba2a171087d0f8c6bbb460839ca945a899f4bb4737bb9211ea6c4180dd
-
C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\content\zy.xul
Filesize225B
MD566a87fc4758566ca2681ca4c2cef55c4
SHA1b506e622eee0323667a1634659bcf93f92c7fd28
SHA25614fcad83cebe3e8898c49a98660952378f356cdbbf6dca73230fbf87969773f3
SHA512434ecefbf536c3a305cec4713df4d45059180b8cfc4cdc51c55a0c26434810cff89a28eca1dc8d5707fae4788b7a2b3b599fa499cda451e7a2a2de72550f0822
-
C:\Users\Admin\AppData\Local\Temp\7zS84B1.tmp\[email protected]\install.rdf
Filesize714B
MD5b758729808f90eae171ce4e1054ed606
SHA1807724d934afaea2d1c6693ffcee09172b874052
SHA256a7cbdbf3cf2868597b1ec8e1a7740e1edd63c36df9d997f51fc44cbb69c13c19
SHA5124830813c29effcdefc0b6cce27f7d29baeb243b9c13234bfa5cf56ce3748c4cbebc0f2468f8563418748130b26b04ab066ce2018daead5b1c1cf78df20aa16e9
-
Filesize
5KB
MD5e1ce9e85bbc0762aced267ce8971b8a9
SHA10492f606f5c0f873e8952510291b7c2c86c07509
SHA25618ff0bd6c8a299229684f1e421b05655f8b029a0fffef17d3be00f6515f1a263
SHA512017ebc5a187e073dfe189cc994ab8def2ebd3eba97d2c4e750fc1d8a7dff8d2656760e4e66b95b9d6ccf8f8a42aeec738cdf86e6514072c21e3815bf25bd8d25
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
389B
MD5fc98025b810ac34725c989c3914f9320
SHA1d3b6e58f115e851fb27e853e27250cd389fc58d1
SHA2566836608d7af11c3f6f8abc0ebb1d355ae35a74589be4c81c2c12c47df37f9d1b
SHA512d969abf1c2ee4a03420e44a18e314cf823bad24b012ada4013741c3707f92b9867da92f3c251c606e8ebed698d05726dad28af93190a1d35e3ca6851e3319537
-
Filesize
3KB
MD5524eb21c292194e2c3b1548ee0a32694
SHA1a56563ce9231f5d0fb2cdf08615e5cbaf28f07e4
SHA25680cfaa195d3a4c84396b33d5e52c37f7d0cbeaebfb6f432356281eb4e2392778
SHA512384f861f94ba7a902d5ae848361c1222504e0f36b07b257d019a14e399b20ed2bcf116217c7eb41f4f0a0783eb49df2f38f576f18a1dc9a61781b728dff6fb5e
-
Filesize
667B
MD5bf576bd6bf604c5b77eaf96803b99840
SHA11b607fdc5c5f44b75962d9df7bd27b765c7ba649
SHA25667aa79d13c73dbaf36d0c10a0812b3b1588b7967c27c060abba6066e6c83d504
SHA5129df5250de98f620061cbec6a147751f9ae8ad034b9d3d5220e224c1ad9f2009fcf1ddf47d9a0269837e576122fe19e577697fa679848874eb4ce88c0f4d1f6a9
-
Filesize
61KB
MD516ef6e914973925977cdc5ef6b8b2565
SHA14815da2815975b33f5dc94d482e6dbc02588afa6
SHA2566b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f
SHA512c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059