Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
efd6197f6869b30307e507d407f6fcaf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efd6197f6869b30307e507d407f6fcaf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efd6197f6869b30307e507d407f6fcaf_JaffaCakes118.html
-
Size
130KB
-
MD5
efd6197f6869b30307e507d407f6fcaf
-
SHA1
0c8e3ec5dab7874b06071c2590b8d347a685ba3e
-
SHA256
a47c6e9d626a6de1a86066a926c174d39161fb65176549c185fc8d3fe390e25f
-
SHA512
9917d4b6a9e6ab8bcb934c3cf4948d0268e9a83479cba32e445b4cdcd97381a4b59e756a24d9459c593e3eaf0d70290cbd96c3fd2a13ef2482cab532e0e7eb18
-
SSDEEP
1536:SQ/jzasaVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SUasaVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EF84B51-7818-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433084997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0467a64250cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ece374aa76cd6578a29c22693aa0dd4aa723b6eee67c2afcd28d4a941b697077000000000e8000000002000020000000bad0361bc5c30b03939347a57323e007cf2adbeca342a19b3c03f3c3d281a403200000007135883c57b72870e49dc89398fa33209de8184e4780557bf89a5d074d602481400000003e94a4c2c866fe702e4977bf404937307699a413bddba8e3e43d70fb0a5d6121225e8a41e2558a5b19400a24b5f176a7098be232e1872b62050772af8781fd5f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1680 2488 iexplore.exe 30 PID 2488 wrote to memory of 1680 2488 iexplore.exe 30 PID 2488 wrote to memory of 1680 2488 iexplore.exe 30 PID 2488 wrote to memory of 1680 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efd6197f6869b30307e507d407f6fcaf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550492825e24c9d569e646ebaaeed272
SHA1ebc01d99d87e7000b6cd6c7d8926bf0ddb49fd03
SHA2560d471d1ba058f80d6e27210422072252025e2628e45db50bd7cd97717ba8cef6
SHA512c68ea3ac8cf7fd93bb446c75ab37ec25fb74d6bd024805d6d85486fce3fb88a929ec259afd3eb0e0b7a48a825bb9ffc816c3610d2dbfc7993674f1215970a046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0a22e9507ee337a76eb3fa8f80931a
SHA1e03e33d49d6697bf281a338b6bf3592eeea54a86
SHA256884791c0aeba2767520b7cc7f5a1390c3eb83ec56ba95a4975611a33e423099d
SHA512820ccfc4dad68ca811edfb3453b728e33352ddbd555e179a563a4ac8184420e97dac833e2417a29dda48085f34c16ff2c448b91d867f52a1bb2abe7d3b082d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e38801381cdee89acdbef53fe3d44c0f
SHA1bba2708f77af9ff4c1aff54c40fb9c9929068eed
SHA256bd7a0c1eca99085e5dad91662a0efcf8a86ea3cff265e7d20c1717fa1f3308de
SHA5128a9101696163eacf11da80bb0262cfa0a1c5f7c32e4b70b8bdabe78ec710361d441926b83e4b630d5b77a82dab718a18ca4b71e0b052c0e5e5781fe9804332ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c7a1f86996c18b84e948be3e03cc88a
SHA137b972c29f41befd4ef416c2933b0c352a326438
SHA25613dae1afd83d274344ccb96d2c1f3a752a7aeb702b0c90c8220ce416eb257236
SHA5126709d46b8fb31a67301435aab88314723f621e6f49dcb8ef60216dfa065b4bf4b5b90193ec968d778272812d91987be9481af6c0306e5f033ca4f8490a12bb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50874c992699cfd6a95a75972c3e13b3d
SHA1221af97203744c972af5bfdfa264d9647fb13eae
SHA256610f08796fa19ef65adb6019eddb59eabaf820a56e3ce098a8664cd7fad4525d
SHA5126455d17e62bc6061f7f664cbebdc84de78c13d842c4fa3fa27c4aefa23c91011d47f6f14f0f7e805312e7e32f1583c020dd2f62034fed78e32a2640b54d3719a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaff6deb547b48d6e52f8f0977b84855
SHA183ccf6198b0b5fa6db77c662f63c800b5ec8e1b1
SHA2569e4aa7abcb898703ae2012f566c31e5fc83ccf51539a238e690cdcff349f93b4
SHA512390635949feff507320d5b60fe23652c9b77e6f318ed4559a5774bcd9e25f87b62a1beddb4237718132c5acc701b8965e8c780ba4a7f12e0a267ba269fc9ac9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe540ea2ce4780971df102dde1ddf25
SHA1df30effc24257010283194f13ee7e04bc8c36334
SHA256c7fd252d53c2d96ee5dde3d1730d079fb5f9c611efe9817bb05e340bced3fc85
SHA5127636cfa404eec65bb89e59edd165654c6604225323a393e7f4b27bb875ed30ab3662a56061ac34160f0ea231034e309adb24de7140f9ea8a4496e4e2fd4ff02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530de986ba9e6995577b120a7d34dbe15
SHA1c9555262ae35bfe5d8762639860a27d41b294cfe
SHA256ce98c5d4881e98d9d15eac35f75474751e511cd07ebab0c78311f8d88dacae6c
SHA51250b35484eb885de5c47aeb47b90f8edc3107190a7c4c542aa6d6429592051a4dcd529325d6482c17efd38019590e13a1c66d0ac09d4e74330bede70e894ed642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c370fe541d8e0228ea0cd75b0c7e0a
SHA1dd173c95563d31517a52925d6e82457a31904c3f
SHA256250cb12b845f0a773eeb1b39fef8be433875bee93bdda1d28b20ca6814987720
SHA512cb168b37662c3ff689e61cb9fd852d85b6255836ded2720c7ba3194b21b24200bb89df8f4b840e2c0835934e7db64cec08bd2db0f488ce9a2d6fe39ed51d1e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534965066a9a9618db7e003e26f30b7ba
SHA18485fdfd91d558e9626f5be94a60704435bd0b65
SHA256f6f71f2011d80b62270bfc117799cbcfc857690d3058d6e83861924f21b343de
SHA512e8bac4554d1c7a79788cd31deb4fb6aabf1c08bedfc09d58d0daa390128f942ba03922ca49527cfaf7117fc0d5b729a508c979e6ef796a49e15ad9f27cbdb48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505189c550a137c6090b482f0844bf4c7
SHA1b6bc0860fe7c9e94eaf39d7273f46304bef0de52
SHA25670978cb18eebdce793e3e93e8ecde2bd60c0f66df9bcb9cfe684f20872c00e37
SHA5126a949262f8a96a4bef2f113daf6319583d4171fc3e7db1fbd19010a4501cf8188f6580b55b7e0f4e266db18429dbb3fbf7f7ef6100267356c09090640c039fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a1ec536a7a5c950ffa4c5db6da603d
SHA17e9079772332981a57bb17a0f70dc02cad716e77
SHA256dc1a201ac5324fc6348cf9e8bd957f56afa6a59d5beb67394b62ea0f1f8410d1
SHA51271e3a084924f01634517f478085ae9c7e66bb584d01752402d31576794dbb97cb78d11c217cf6905cef729775d657b6469fb17daf5d5779a9e0fbeb908883742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885b7e70106e5d8b06b39a9da16df497
SHA10408bd48e8359780e37170d69cfaac0bb8904dfe
SHA25620dbe7e354300cc581bfad04dbc9625112fbf53bb875f06938dcc3b3cf70317e
SHA512eaeae51ae53a313279b8bfbdd2724722284a2381c1f8946064ff63e8810f32e0f895b663dd0decc50b3e9b0ff9bcdd36f21b7aa1dc45e8ea7a61a428da88f6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593aca0f9ade2234d2493bc514cb59db8
SHA1af0cf765248cc343a98bde06cd3b21df9864f97e
SHA256bf6d239a2d25dfa7158aa93a5e5d5ffda060cb25464e84c081da51b59d6c5562
SHA512c1f373d65fee3809b026f2857e84ab8b7e449861507f17e259f05f93bf678c806534c26cd72fd2a39e555f132f9a347b063206fb071c519dc070f3e816446728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50841cee59c996a4fb8054cd4abf1509a
SHA175a8dd5a1259cb7db002922762f9efa9ee21bd0a
SHA256e8eb2e14fdf72531b6d4dbb9d1b5ff8e6cc2cba1f72a406603e9b0de2ae2e930
SHA51276138cb6082fdc5e0d572f1072befe9441d302b2f7aa8f69243987dbb2980e718b692206184f6973f4fe4893248cd1d8fd158c968f054686e156e2ffbc6416dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6b22a63fa32973e96a2ccdecd0e054
SHA125c54efeddf68e8e7d9d26945b1aed4d3d6ff8c2
SHA2566f24854abd821f19e5279cede2bc3d752eb190197d12fbf88b7986079e83a50d
SHA51277dbaf5445412b53b27515235008e1cb368eadd0e204311227124e2714eb159ac0a7344dd4eaca8ba982058f0b5b7e3c0cc8db7ff2d40ad531e323f337754cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254dcce331494136a2f749a26c3bff7f
SHA1c7c9bce86a4d1c8122f7275c1d5c97cf9451ca0c
SHA256a7de547d71efce841b4db79691d3ef9c4602a391a4e8879fdd372ea70ea6c536
SHA5125529195f7e7de36c9c96ce3eba10897a589bcbe4673044364b60ab8c46117b1f0c149721a58cf8688c213a5f9d80ea13d24d7b67077a802870e70f5d4d40c5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afa161b5f797c84ac3759fa78cf5216
SHA1031229b0a1cb957d52c8bf1e0344a7cdf87e41be
SHA256ec48120a3d33d38b79cf0df8b836f2c2bdd692a4e8f279396b7d3358cacbbd71
SHA51290940c09573fb801063107001c4671cd294ea0d56c7cc4b88cae597ab016323891ca29552189106a5cded26de7c5ebe1d5c7cb38ae19155b4de5c660844ed934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbb76460933e6d1cb2ab1ff27f68b03
SHA126723680dbb6272f68b20b574b9927f89a11fe4f
SHA2566a732d16e96173916117c381cbc0f62e4ce1ef4839ffd46bc6939975da56ce58
SHA5124ae80675d6ab9619001f3872dfe1daaee5186ff88b897c03bbef17c7ca88cde2f9470022ac5ca5e67974934dbd375e27bed2dd6346722d3b46782c5bee6ef3bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b