Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
0756f11646ef48b7bed88f4801f0fad7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0756f11646ef48b7bed88f4801f0fad7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0756f11646ef48b7bed88f4801f0fad7_JaffaCakes118.html
-
Size
26KB
-
MD5
0756f11646ef48b7bed88f4801f0fad7
-
SHA1
f9d69ceab54a541e02703459f1abddcd7e2f092f
-
SHA256
6dacf9cade80c66e6ffd454689e75bafa7c968fd551d5190f2e3a3f951eb3120
-
SHA512
b9739f541376bd0a9550e9e97d209a49b2bcd67e183f329d12a318c67f76badcf17edcd55e55c6c6e6e0d73f9f52050241576edf6989b785b586891d9761c88c
-
SSDEEP
384:38JFkW2eH4dxUnKu7UV0N8Tcux9VIbjhckc0ac8cucgcicUcncdc4c1czcicccPB:gkW2eH4bCmS1spstFLX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000092cb7390285d446fe6e878f2404db502b2702e37aa392e4443a57402f931135b000000000e8000000002000020000000176ce2c7066190fa8699b60b646155ade535cda7a5e2b7d2116ef5b47ba23404200000004a0a0d9b7eeab807f77f5567a25ac13d4beee4d68248549532645e20b96e62bd400000006fd506d0c0ce5cd2a1533a1f55c39710c06de2a3d7d0daf94884dbfde578226c9b8c1918807f5d8e3e81adc4fa2bb4331a6ed5f2cedcbcae9047a76f0f336567 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433977053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70aa9c384214db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48B28601-8035-11EF-8B74-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0756f11646ef48b7bed88f4801f0fad7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e62f57c988e7ddc544c4585d99250aee
SHA131227cb8e564fc735a23eedf06302bd7f65a5ea8
SHA256051c57b5a197a09c82fc2aa762cb8f6c3792a8d7240e29a6587bc5c0707f1828
SHA51272f5357f15defa1fc1376b62d63e18b038847941aa4ad9275c0f43b8c9c40af830a53fcef7bf5daae5e61dd00cd2d6ddc1d351d0053d39fe7c3ed3ee1aef7bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fe02244289159690701f1644f0267d
SHA15befcb132e61cbc8e5ebde9c0fcffda86018f18b
SHA256e5b7b60ce33ba0e27f3c6b9f6691972201bb1507a6d687f3ee12ab65dd97d914
SHA5122545d9541b31d3d927577cb8033e2928c4ab1a836293bcfcf07e45a21a142c24573658b9ce900ea34b52192ef671b67171a06cfda7a27f72337d0a4e88f8cffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790e8f4f47a1cc0e47885a753d1f311f
SHA10882cb62da957e86390a17abce0edf7110218900
SHA2560fa42b3553f812c8c88a17d2ddc6d101045c573bd540bc94db67b129d0df91e4
SHA512d4c222a51656bc0ae4162ef76f7853417125b2a38adb29790e41b5fdabf453a60ce42e6e47d5df018165d45932d4afffe0c7b52d69763c457a015ced8c700aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c7a8c55c27e06945d099f240e20dbd
SHA1d20e02cdf2b7cf2a0ccbb271b65b8bdc74252315
SHA2564e048655fa6bd56c48a48684441fdc6c36660c9840ce69efd8ca3d8e64ba27f6
SHA512125022803c022a3ae65916706d631902e35b843575c0f5babc8fc3fd6f0ae61f81d90d4635b44a38019b96efa0ca5f3b8027fc807e70ed002fcd46c2bd4e6305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97afd6fba2e0fddd8b0b6322d710ff9
SHA18c30978403a8cbb9a84fb64572e371a9aa447d7b
SHA256f3c75ce8f8dd5b93ac2e602ecac4c3cb4604b4097f7bad5fc593034bc13b4dcb
SHA5126137682ddaaf27ce4cb9db99d60e06f5a44074e948264c7f3f4215453fffe96802fb4f8c468ea9329a998600cf0bedc2987b851c8caf05dc7932c64d418a31c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323d9a314e46ca323f967b09b7d91838
SHA1877ac8cbc57d8533f5e610d5b764513f28e53c2a
SHA256e3636e9dd19c214f071d13dc838f60205a0f91d29034093b19c8666e4db6a970
SHA512606fe71a70c0248c9548eeede4b5e56d18aae24138074e60a3ef943f0267fc725f7606420f12f2903a6e674314b4f53b6178b2756c6e3e460f97485fc2bdfea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb313bcd01f0dc8b5dd6bc4538937e1
SHA1731b2c816f2c6653b62b44170fdf51106ecc2c7e
SHA256aa8e26f570e0bad7643959b562426709a6eca8615afe6f053c0244c662aca4ed
SHA51296c732d3536c9a3e21f39dd3aa8b1ab9f40f8a51966d93b3ed748071e5b29943865d6f2eab08b5ddd57a12838ac144afbbac09a951883684f5c1968fe9eb09c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f121e80737c2718c7f0289e2fce8ce6d
SHA1d646a31e680917d26dc3a9ef3433056b38f3cd35
SHA256eedf325aca1bcd5f67140a82a2065305cbc26297da4324d2ca6aa29c35605fd4
SHA51217c05fd33588b41a10a03c25f7b1f14210b06f00d901e9fca8e1546b83f74c524eede22b2052fd17bf71a69966d6b772481e9d21e34b0b3798897bd0e1a231cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b01b9035097fc92568f79e2d9d1a7bd
SHA126849656501640a9f945871fd283b928f4208764
SHA2568753d14b2a03c8a49de18e6ce7dec5ecd6acc0c387472feeab43462c07e0962b
SHA512691e57e9e7bd290a8d7808e06bf4225dfb83ddae315409e71d804e285f42385144fbff6cffaeb6d09c8ed374de8e2d0d7a96f5e0cc1fd83b3b970c1bccea0e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b4bf50ef99f32744d6bef55adba9c0
SHA12831ade34a3098b72d7e3f94a846b5daa6e7d2c7
SHA25697c5774595dbcc44c074e00055e2c0c6e5080aa10d4aad5796a0e87fcb873438
SHA512c329d2679905e88462d440f648f99645b82f8b16571ff05f42d309ce631683d9d0b756360beedd28b653462761df4d641c7e4931883ef51e82f6365bb983756f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c97bf762f46025c79366758a234a13
SHA1a25bdf215b8123207e2ddf808265a6df6d14ebd5
SHA2568056a9f94327d9cbf02d903910ca89bde579ac98eec3efb88221a9ad3e6794a5
SHA5122be051e41ca9720b2e090a3b5b029194a0c9ae926f894eda6c28553cf9c5a99de0a272ee18637c41208d40d828f3f1597427a818b82f9a8c36a0d2e73462d724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f734688b6f68ea31e7f9d4beff6d47
SHA1db8c7360bf4e83aff8b246f4c66274e0c2c0000b
SHA25649a3bbf268de10fb562eaae0f2bcfcfc201e6cf6722fd4fe998859b3cde07d49
SHA5121bb647955125cf6aea4535190c8e6efe4e7d35468eb48a1ecaf00716ff75e8a2e48305129e8bdabf536ba782b86d1d6517d16c83ba32b7ed8daf248fd8dfd455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67a7f69ea1d106abcc0babb3fa9d792
SHA1f36b68f842ca4aa2650c8c0ebf3573706f91e355
SHA256d483f76dcc9d52a9497f94fa70c9b908e58f1426094fda6eee6c8414c0a08ce9
SHA512c42020bfba786ec7f82673776f5c613999f09eb1f19fa3090ad62e8f76f7af8f739c191b7524fe94ae7d2f356474ca784363bd4c307913f8b0a95173e740c235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ef7db889f40c803e51b672ec5b32bb
SHA1d2e6d63e25ed8192ce3590cbaaf65eb109ac6148
SHA256794ac3864b6fa2cbcb742afb0f859a49ab1ee245ae648d391c8232e9fd86a9ff
SHA512e77eb0c0246f59738de3ffd99a69f5e827ef10b8a5623fbc9c24ea6c26468ec3f10493e8fe39a6ea66ada0ea43019400de7699cbf13474a05343ed78bb109195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e67c225908565d87e3e22d7f3c52b0
SHA116a0a2b58ccd7e2d92a8f9e9603146419d4fdad0
SHA25618492a2b60e49316db4a4582439286056a37fbd8aff4fe6d43d93c0f9804a262
SHA512b4a914fa66d41713256c65b37c2ef831423d7ca20cc5a25686fdc461ef83c4bf8c4298f7a685b4a11e50c303a12b086b5ed24b87241aef6c5e2ca133f837e10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f671b151a85827fc9482d414eb59ac66
SHA1c221844873e05a05991766d082564cfd6638650a
SHA256a3dde50b61dbdbef9cc42a67102a94030b8bc129ec403f98ffe982457d188bbc
SHA512a8db7915c54f4f9bb6b844220f5cad0b80489039cf02bb89b603d1a4d83245133c78d3a7e563880c72356bd99588c3f4d0bff8cd5b90701cc4e019b3031a5189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57768ea6287d657741e543dc116272828
SHA17334ba6afc2380c082f8e3851266833712df7aa4
SHA256fbe06cf9d17d828d254d69a0feb7e39528a6ec30291ab51e2d16883748b77862
SHA512fb5b7e6f86d4b59986a97b52a3f2cdf83699212029ad3e5c823ef2fd368d3460b0dc54b4728d71420304f3928bdf98a0f2acf2cddd12f41167d8346364dddce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bd061593250668bafec75cc391e49f32
SHA1c83847523e13cef859b4f59b94b778a6050c227c
SHA2563199b23e378bd7482ed632b6cba0895e27174e33850d74b0acedbfa2162b0d04
SHA5125c979d073cbe18a01efea0cfe94f9e2914e312bb9998465b37bd225f442cda0f81e0e5b42e828ce6aa9bfc6d699f81d3300f129643e866c480655805c928851e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54d42aaeca67ef00fa2225dcf810dd215
SHA1135c79faa2aa7079eee138cd2064d22b653687a8
SHA256db063e32aff9d68b8525b90706d597d7c5f2973155e7adf03d2f0f5ec1abfea6
SHA512531795d6228139a7c02caf637d34c8c15b924c79e50f7479a59b73972ede4ab5f0c9b81c434daf781a2deb9f1f80148678da4188ae2d145122bd0529d67ceb36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b