Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
e23c1dae4bd24e93847a878cee0409bc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e23c1dae4bd24e93847a878cee0409bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e23c1dae4bd24e93847a878cee0409bc_JaffaCakes118.html
-
Size
213KB
-
MD5
e23c1dae4bd24e93847a878cee0409bc
-
SHA1
e4d912c1424fd60d231640620189de930fa47608
-
SHA256
9bbdc94861d9f215aad53944c98ef73ed28e400851a29c60c72a6401eb7fe53e
-
SHA512
140a3ee48a751f53d32e4811dfcf9a7c207e978c49e9bce9edd1c1e07052a9650c63990e5ae12ceed3bdc4c944c1366dd425677613f898781486723e32ee7df0
-
SSDEEP
3072:orhB9CyHxX7Be7iAvtLPbAwuBNKifXTJY:wz9VxLY7iAVLTBQJlY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAF7C971-734A-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432556894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000003f12922947ac981a11b22a086a0df584bb05be7b31bbb70808e88a1019fcf350000000000e80000000020000200000004fadb8d8c556b0176702b9c0f71f4b7105a88d03275c45fe567a70fc4c57043b200000003f0a5315a823da5983accf4071751437bd0efb2d3be592616dcb0100dde0f59e40000000e1c0c8b9231a2e6585204869d77268a5e64c45bafef8b868f8cabf372e19b5187c9c421d80f98b32f5a0f59cd011a72771713df3a0aef2e895323817ba6c6a0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10296a8f5707db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2060 2536 iexplore.exe 30 PID 2536 wrote to memory of 2060 2536 iexplore.exe 30 PID 2536 wrote to memory of 2060 2536 iexplore.exe 30 PID 2536 wrote to memory of 2060 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e23c1dae4bd24e93847a878cee0409bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53158e156cbd48d4d5e63ffb1f17ff82c
SHA151e81ada821030a0cc2cca5a567b6388816c8a75
SHA256c5b36c363f72c6767449fc393598fd299bb7a2a88f941caeebbf73bebf5bec37
SHA51279d50c4abe409b0d802bec5b275f2a295450b23dbda182eb1c6b1fa19afe26a4f1d03e10bf77988886bf4ede987ac4f0f61538df6aa9bbf6cb7e122de921c40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd1ff83933736998691f73301312b38
SHA18e7e2d66346e81ece3c7fec7309c155e564cf7fa
SHA256c5eef1787a352afcb6853706849e542347b24de8d388128da51fd5889caa2af2
SHA5127c7b9f29c8ed6eeadbaff880e4ea3329fb50bc5a153917cfc8ea292465c19cb75b32adac56f3b4f6d10b027f81583067c761782b60abc1299ca3ba8656170663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42886ff85be5166ec23cc53a5ea168c
SHA1ee7388285f9ee73b7a745b6bb0b4f999e4cc0089
SHA2562052d1bc8a065ef1bb5cb35b854b23315358957ecb4c5703b20891b3b2331284
SHA51236766282edcec40a7468afce8756356902c2810d96dbbef1edfad222e1075d4c12a9d4ff29117ca01b1db3253cbcabe19debbd4b75aafb6c266f34cf89a1564a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52892fca583c8b662f0c903be2402556e
SHA1902b8aa21eb8569c9c9adf4b6d1dc04247ca8cb9
SHA256da0504b7918a8562324f5ad844b089c7da6b08e670ad65198bcd302bde6c601e
SHA5120a48d6565f5933756a4fdbb1be4e2a0797e4eb3b8257cfda36d96be473b01a610baa5e8c994773a0ee042203b2038e576eaf5b529461aec99f64dd5f79300e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55960de76246138f9b84181ca4764760b
SHA1b3ee541d2a5981a2e0e79d0a69f570d3a55b90c7
SHA2569bab89e4b3dabb0cae5ec5034de39ee850fed624d3397756838dfcb91b6f13c8
SHA51281321a75a4bd52a4efc64ab2fce0f496e5afae8dc49d7b2135c54105d9c2570609eab453ac122acb65f333dae78198c8251f6fbb8936627d2f8fb1e57ce63e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f98b77e2c99f27c14a6b8b6f21d76cd
SHA1199eebf3f8899b76cd170f1b3e7293666489cb13
SHA2567a9ffa24efbd55bcbc3fc57971190507ad6b1b3b9d2a110f7327eafd4c9f1613
SHA51250becdb0ca5bf426d40224228a98b4d989167b94d6f4e4d2939f6326a7df5d0b604f9ceccfa3791fc7efff00faa4c0848285d68f9eb40e4389d3c5b86e5d4c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd4e1b456b5772ee1a8bcd4a76568d3
SHA19f91a37b67bbe64f910467ecd42031da07483f65
SHA256f7df0476f2e8421bfc3f9dfd88e778bcc47766538caf1f8a17629c67265a79c9
SHA512de19db1f3be34f9b9284c96f31405147c560a1d4bb49da95dad5a99db9c11679d47d2a14256971bd37f113bb14a059e110efe96ca0c34aa2d19728fca1b57599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea37e83f6d2ccc379a3e8412ab329c1
SHA1ef3e65ae8e600ea608e1665be1f1b5fb7f69cf4f
SHA256dbe967b98d8daf0f2eb37adcb9f42f8b8f90131253c1d314b35fc82046bea8c8
SHA51277d2eafdfc74af1aa95dece64aa5c347f354f3194f9da92777f298e7d05f00165a56872a2c1f27fc0087291a8aaab4b25be3eacde666b082e1500fae5cead29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548da3083658f666a5cf07cb58dada768
SHA170c7987a55b42ca16f7ff197acb1137c317ad8ad
SHA256b7fed56686e9a7807eac9e6be709c01b08533faaaa44ce435b69e25117185dc7
SHA512f149d2f6d5598fdd8f9676a2cdd18ae7aa6c31badcbd20fc64c26a942ef7b95d954651218f0de342d9e93327adcda003eba96ede438c1d81308f4f6ec54ddb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae54f6c221aa0242cc9aa15f69dd087c
SHA1ade590c79c2b6e608f68b49eaf4c0565d20ac71c
SHA256f1534a6b50768b9093136a11ca0d411cd7eef77e25eb0e5898c8c2683c4a31fb
SHA512268daa14daf125232bce179826969cd986a9118dffb4cfae50518e55e1d909d5c316d0d0f318947389258a5cca9b10133adea5df141b46300f3c46264137be1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb5125ebbb6406d6ecfdd782fa44fd2
SHA1e75fae3eaa26a9429961f1c9fdb39591c4abc2d7
SHA256ffd859485b3b4176ac03df2491d022970651498d51feede48c008df3e419db93
SHA5127452b56c7efbb3607bcc7b1e6b936d58f66fb48c5c9305f63438d78ed6f9f1d96ffefeb73344a626641de6a6fa07062b68fb0aa76768346ffd4397ceb008e5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6157a059f30ef4f94719ff51125b01
SHA1603179579577128c8236319455e6505bcebde076
SHA2565903d8dc972e1086f23855d78738bcf998efef9939aa99a170ef42308722b9dd
SHA5129ce947acf4aa35fbb3a969349aa04349df87e7385d3c0c4a8565712c5fa3d2ec4c0fa9654aca7bd53c648f7b3f17a8599f23ceed46fd9ebef33ac7adb7e5551e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d01aadba3a2039c52dd7f2431197945
SHA1fddbc3c24bf56981f6b6d634dcf44fe816fd313c
SHA2560f01e1ad1e9978cd37615304cca3b5b6914bd0c97f737b491c349dd42befe018
SHA5121bb463a819519d446e4e1ede0189287272d886b19a37d49f424a1f7144b15afc102b9dbcc9db191b1a9b3485db162c3c1f2007707f00bbe911f3355580fbae9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af51de2df1a388304c7b76c63e7fd7f9
SHA1ac24125b8b57d4cc90b4fe03f4833ff0c20a8a12
SHA2568941de38ee5b494276e57a4fb5299cc8a30fef467c90bc3140667dcef6b27464
SHA51289a1cf8d11ee448e32ed10b1cdd0f4604b7bda8ba1dc68cc5366cdfa769227481288078595eef24bfd4b2ca0e9e1babee8a7b27070bbe3c07994bdc183092463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6991f7999dce8595e706de795d12f3
SHA1e85b4f6e252e84277f23840fadc1335a80504ac7
SHA256e73ee688a295f182b81061688da56feefcdcb3ea46199debbee2bec50fcb3a46
SHA51232db99b164d151bb2cb880e4a9a601d6ecf3396447637961cb4d9546f89183dc93ce3e157b65377009b714ca8638565d3fda0fb612b2ded0d7bb1f21909b1d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69a7336cd8f722dba1b5c08f6c2a784
SHA17296812269e97204f4b19f906ebd8e9a2b7fe66b
SHA256003b4fd4a13271e75711cbfdeba9e3b3474901a28e7922e80f6bc9975adeddd5
SHA512d4e27b12db7ffbf2caddb4c25f4ebbcb84bb92c1eb6031a3ae9c9c94ac8c88a0ec1507dd872b3a933dd2259d21f9bae4c6043aea1834599b9522b853d6b3660c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec4b28afa8fb255ec00ab196244f3a6
SHA16038193e26b38d2e82ba422dc62de98cd38675a7
SHA25648dabe3f6e1e54467a912478be9165d545255150630d4b576616da5f7a81e84a
SHA512ef6bfdd1d67e60c10ed4e27daa293336a267019c05f702c6c2bf0e8ad2edece6dbd461f1153f4dfce88820a061097dac85451787e37116e4743c1dc0ed6951e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2384d446afd832824f526390151b5ec
SHA15509182a0deb76010d88a84f0417779a896c6ede
SHA25657658efc009914c7a43d8a95940666b6f75824b0aa2f1db8df7d21f19891a1f9
SHA512da49cc3e25f1c70cd2969790d2c7ba4989465edff7c37e872ebb3d05b7b45fef49c770a064da4645c95a64faac3fa8b49b77ecf8d9ef778a8681c5845f0783f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6a7caec0634b786aacce176b1c9141
SHA19183352a9a5d76d0e99ed027b626cef373b92f2e
SHA25654a7ba952a9229549b662a505f376c474c88dda51af596fe4ea25c78fe4c7008
SHA512a261948ccd0444fd714e2c1b631ed3b7cc270c9b4b9cd11cbcacdd4e137ac9aadac6948d8c328c8e49d92c2aab7eea20025971dd95f48e152ef7b12e387b438e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b