Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
71a1e048a0c6fa60bff24d72c3c708d3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71a1e048a0c6fa60bff24d72c3c708d3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71a1e048a0c6fa60bff24d72c3c708d3_JaffaCakes118.html
-
Size
22KB
-
MD5
71a1e048a0c6fa60bff24d72c3c708d3
-
SHA1
15cc0af412a3143c477dbfd992988547588ae79a
-
SHA256
47652d943c289d91e2a57c0572b3955b916ca9b459c5c1a089451b11cd27f120
-
SHA512
f9a1a127e94483282c82f25ce0433965adb8adfb8b5bdf6a1a65f007bbaf9e341cffe362024271ee53d02ac838007caf527c8ee157e782e9dd33624445ebd4cc
-
SSDEEP
384:KIV6J52sABXOeMNa3LYEFkBHzM4K7F9W+8eERgXy:K86J52sS3Vkm4KReeo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001b64e5ddb81154798889871ab76c7d93d2323d2e73253f60dd72cc9bf1134a74000000000e8000000002000020000000d38d819837ff84cf53327f49a2d3f6f4d689f5344f43c820d9ccca4fa87b5c5e20000000211431789ab0c683bc5715aeb23ac7ec7d5d519a74af68655e0ec26b1d9f3877400000006d5da887b39217fad907ca33020d00b85a50341357e9b895d03349ea69f4f7105e3c73a188bb30000011c74d3085971d1596b87bd82cacbe17b08cc6308854d7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80be0621e8deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428110982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47B5A2D1-4ADB-11EF-80D8-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1436 1624 iexplore.exe 30 PID 1624 wrote to memory of 1436 1624 iexplore.exe 30 PID 1624 wrote to memory of 1436 1624 iexplore.exe 30 PID 1624 wrote to memory of 1436 1624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71a1e048a0c6fa60bff24d72c3c708d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45b173a30552b40fc121b1563fc2e9f
SHA17a9b616059c0e6ece57ac840e673e8730ae4d83f
SHA2568d528541e5139868ea1d25c460ee037ab94c6018e597dba5deff1bacca1ce85b
SHA512e03237ec59a89a15fe6e54e0533fe7a3958c2dd19e9914aedf6a57cf2a9fb55ae46f304e07e76f8a650a27f1d290ee2ca3fac1c899b62bf13e06fdbe0cbf9419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f01234f3bd31336f25ad81420d5ebb
SHA130ff4ab08fc736e2bef6562d43b2520f7df95b45
SHA256f4f617611bee81501030219c19216fa009be0d71fe85b9c8f07afb97d24d3836
SHA512b71db221a2abafaed6614a6221db17b0e47dc810c26c4cc1bf185733ea1844381a62481e9ef0cdd1706d1d6e3739c875177ae69d9032e5a3c8a16a096136b452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b8891358040ddfd83dd804bd8e8fb7
SHA14b750366dae5c47a6762509f78a3cb7ebcfdd181
SHA25695dd82d7bd9bd3ed0d9daa532a15b81bc593ea42a5129531d1dabd20d3d498b7
SHA512ef6032a67f5cf0cbd8f1f472312387003db1ecf254280f747ee78ef881e7c46e03b0dc772db796084839da38ce72e73a74ec3d6794b49f1bfc140fba3c503fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382a0ade676620a85f74c0c986baffb2
SHA18bf3ce7a2643a6a6383eb670769f677b1be1639b
SHA256cb8e9fff3292759ce12e23063d7c7f1b92f8be33a11861ab2f527c3ccaf38fcf
SHA512e4b492a7a496b0fc65049df847bc53c0b183d25d50d88b2c871a6ab3251ebe81f58e41af03b5871e1b1d8588ca7d7f668c6625255b64bc7644a580ba44dddffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab6c85054f5dbcead2ae4fde67d8033
SHA1083b3d6781a533cdc59f5798fadd5388a047c9c7
SHA256543a433d8714afaba3a20bec4f2126be5fe2e33b564da41a50822dc53572cc76
SHA51263d9bf3b094dbfb4c86e379101bcfe4c146054b1bb6122488f33c06a35a7b1462a34eceed0e389512f01a5423cb6cc49f6f2d7d1056975fa0d51168030caf2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dc04e9a869a0f1925bba97c2877fe4
SHA102793448817a996137a460e19ee2db30b0922799
SHA256ad80e9c8f26d071bfe44fb080388238c959241cc6b6deefb96740910f8fbb6ea
SHA512d7282ad7f583752bd5a785db31efa85b4934313d15bb9ee2340e3f3881d1c36bd2f7d62f40f68fe759c2d96cf0f1517bf19ff9de2a851ca9c15bddaf0f301115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50209507930271243515cc7c8b7155fdc
SHA16fec2cc4ed79f4c061a63330c05fb329bc7fb340
SHA25654cfcf6869e80b6074132669e26138a9e58ee9a6eb9f7cc0cb84bb0f11de4616
SHA51227dc1661ea5b50dee5844bebdb315f286002f538992616796e354a078d69956e91d805d3c6a2e7aa21c9b91122d1fe6e7b95e9119d0d2e302fedad4b88952719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be21208d08649f86ddc97e01fe0255f
SHA1328ef2f1a225192ec26d94919a445113cdb8a08f
SHA2569b829d42abb309218c371b9727c60bfdecb78adf99d0b4b647889b9369da7c4c
SHA512795ed3645b384f18c05da59d5aafce7cbe7af77c804c9ee9de31b3c771746ecac7d3e95ed618ea036853e294495503bbf73802fce671bf17c6a16b8a8369ea1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c759a93a6dd26e404ec04f635bc4da
SHA1b79d0deba972aae3be6a036137716e32fe66b35a
SHA2569ce112ecc018fbd1498060021b9db1a1057c16b39f811b96fbeb7d02acc6be4f
SHA512bcd3277b857c5ef8fb8588a568f1fb5d60aed25a73d9939626871de0ca0784d855ab09536a997cb2239cbc9a80ce0f9231702cdc609d59f51028e3d55f8212e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2a2a5ed9ba8f7b624a2a3bfe84d7b5
SHA1141d7425a21718cabb1cfaf85722cc44224637bc
SHA25679badd264e246a18e35cc6ed88332e797d2e5641560cb74ebb63dda87b9d40ae
SHA512e7119b7d81a94e9c34bac6dc6996cf720caf975954c4be2b60925474292138032b34ccf86e6361960727f76ab9bb90ed5870a434114d717b0e1422f87fae9d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e45b43591f10689e5b9dccb542251d2
SHA172740b6a51604967fb203ba2cf9c1400bb0ce48d
SHA256a71f02a9f792d0433aea5f49729b7aa6bd142c446816d99437f366556ef9eeff
SHA5121e82f983d4837c4e02ee5722ebb50f8cae037d4e33a7ad8309640905713d161b1cc10acc9c010e6c0f2b650833bdf66e16d7f4e650749933fc134d4ba39ca517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452c734831a10032ad538f399eb8a583
SHA1bfbf0576f4d04d5692e0eab8446f8087015a820d
SHA256021a0b748f7657d400dd67ca965675617052e890a67be59fc6e3f4c76b715693
SHA5125089f2adf7fcad209bebebbcef4e4dfc3830f324d80d130b4487a486ec6b595ac48a07975ed1d74db3584d245241e5ed3d5e46c87ad8bd58c8d27ff4b11176ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d072e7401e3da2f90d1a425955d61a9b
SHA13d0bd61a40f0a9898a152950795b2b90ea7d8cfc
SHA25658a85f0e2c859b566104cfee4b3396e2870b887a0868a29f4a701d19f9251bf0
SHA5125054edbd49623bcc6f66bd31640151e2e7be843760bf68276b6981608c6c9abb5cd79ca89265fcf1514dc49b06995971544052a01b9cc3296a300960dd3eed11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596445da27772f268fe51a7aea0c96ef0
SHA16392a5386fe7f132e2ba896a9c70999e8ad1adf5
SHA256be2d214e82246cc1c34b7a7714b9ca417d2bf6e15e4a389e9af317cab36906d1
SHA512832ae0723eec442e83b15b35f8705303a19b10da1342fdcbe93c07dfc7be2f963277ebdd0f762cd25e05ccacba7afc0ebfe1a8277f6746f1f8b7f3b5873884a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd13bde9eaba58779950855fc328a33e
SHA186c63cf381133f638317cc570bdd9bceac9ba3fe
SHA25629c6636bf5b899d640a11a9d0fb71c6abe28447f408c5f7684649c71cde5615b
SHA512a49e60a5d57f0234329019fc74078f0f2adf0fd3aa63df8f2ff8f93df789cb31f65cc9be1b57e91a55978e11a38392e682e2f23634b40cdfe81a64d01ccccefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701c83ac75b88a830e75f455b8dba991
SHA1392c73a63623e53b8552d4e7bcd43a678871ace6
SHA2566b42692f2adc84698bd1177d177c02dbeb40d2e1b73bae6551b5dd9f883bb470
SHA5127139a6ecd55e8e5f45ab1897c06f71fb9f9ab3703f41ec62dabcdfbe5a7f957e22fce9ee4ac9f5f41157e773351fe1048692d968721b36cc32d1597b237c547d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56943f80f3c7246a3e59cda70051154d7
SHA14366db469dd74fd5f87e7949df0e1286cecfe1f5
SHA256bf5b0b1da655858ae479d34e3bafc068a1d8dbe643aec11bc071aa8c8b5dd226
SHA51202a3f078209ad0178948358661a0ecf699d756314ccb7dfe8b48259bd430861e2ddc19e7babf4da17ccd4c6f75383de75bb50a1a2df79635f25ae85515c290a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a884ae83391a7182d2bca44e8b37ced0
SHA1a938357108ccfda7f1f7370c2ea41237019dc181
SHA2569609dd1c6ed8240b2ab82a7219884d5934210e99e2c903965c663a51f865d3e2
SHA512af27f7cdd74ae1d9b7c3aadc6232c9f8b48c5a2974360b4ddcc6c628d74add7dc96247f428c2a5a283be616157cbabcccf6969ef3c67ccf6bae97018458baac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37da2bc363bc7dbde3db0d00318cf52
SHA142ea5c76b6a5a5d8a075ae48666a0de6732b5f4b
SHA2561331788c86747e72d70b4c433cf1c69807d6433764f74f6bb747f29f5d920a8b
SHA512b08b536cbed6108e9fedcb24ffd143e8e3a246cfb2590b05655046b6ebcc123c26c1c9fcac2c2fedac5f6fc3204b70dd579b52d5d323292a6c71505beece1f5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b