Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 00:35
Static task
static1
Behavioral task
behavioral1
Sample
111c1071177931decc123a0b6f81e6f7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
111c1071177931decc123a0b6f81e6f7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
111c1071177931decc123a0b6f81e6f7_JaffaCakes118.html
-
Size
111KB
-
MD5
111c1071177931decc123a0b6f81e6f7
-
SHA1
f0aaa2e00f0d1c1ba5a5cec65836641139a8c8bd
-
SHA256
eb9602d48201ee6ecb89ef0cab02f03464fac34ed77ccea4e819397cbea2391e
-
SHA512
750bdeb995d1fb4a55e2c4309c5baf20189669b408681fb05ea33abf7f19bb4efee54cdf87d22ff7ae47567b12afd6c44370a4d407d0f7880083585c90080bca
-
SSDEEP
1536:CxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:CxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434164013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a163164737cb9e9d8159dbd27b966a8d0084804018f971f5d76fad5fd3118eb5000000000e8000000002000020000000564d8cfe77f7a39cca94731409f1dc7531849a254cec24f81d711c0795aa74042000000035815adccb889e3e7b8a176183922582835016e4ba193f853636fb8141a2333740000000c8107356935bc2eb76554ef37bc4e7445f68a31c3d43d3a7d8785df66bcd4f456fb3cac47aeaa8bec4fd0bac5feb07b78484358eda7b20a7acc712f388d2aac1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e1066df515db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9882D6D1-81E8-11EF-AAC7-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1976 2012 iexplore.exe 30 PID 2012 wrote to memory of 1976 2012 iexplore.exe 30 PID 2012 wrote to memory of 1976 2012 iexplore.exe 30 PID 2012 wrote to memory of 1976 2012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\111c1071177931decc123a0b6f81e6f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc06366735066955c8910009bf2d55f
SHA1e54584997c772e81e6031b4ac08861f765cdad09
SHA256317c27c4488d309761ab37308acd5bdf3094042bb2d36daa24d4330114be1d48
SHA512a2aee4b234a3dfec856a1a10603ada2ac19d17d65e0c65541a2422ded69fc1098364fd73ef90e41d0b12e4969f64c1743a9962296c2f1a511b76a43a50cb1104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fad3c7f7d503e074fe357cc1e2494ad
SHA1f9dfba58b9061a82b1619dbbbec5bbc65647fc54
SHA25618b5f86d4a6996f21fec00a5babea27ac0d7ca77ca90c9a8a9e513f99307d74a
SHA5120a407ed20224bc08cfd86d00c7acdf33a3803cf53cc952d77e5452b0be42e1c7f07796c84f60d05075dca2ae750f6dcd61768e8d8b46e81a2ba7401d882113cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7d250f97f6495831dfec7ce48c9be0
SHA1e4e09d66b3d4e99b640854de9076c72139fbd771
SHA256d6cefc3603c0cf4989129cd0137a816aadd50f04448a37608b0f56bc6d160613
SHA512d4f6a39b5692b19c557db838d4a91bcbebe99a165ed44b63a5136db02af14f7a758ab1214251176d31998f8f6061a8d49dc289337755483ea90775a73a9dd210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab011589dfe377408123d822c423c111
SHA11a7d3d6bdbbfc3a03ed72fb005953011b9288753
SHA256688b5891caa859c65239ffeb2ebd1dca1db089ff4129789c5a9a219d9f2cefa0
SHA512be93942782313c2ff52a98b6838a09c2c78d3530ef5f2ad15a0dc9a2b1a6da5985522ad529d2bca683b90c3fbc89d49976103af4d825ef4193abce148c2415ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c23623bbe7f0cdeeee600c56d229110
SHA1207ffe7743395ff5ad897a4caa2ce4255a9f4c00
SHA256a01b035b71fe45ef0754df7901fd6356b7a3110a670b508354eb95de693af4c3
SHA51240b8e910b1ce76e06221a5f5ab9acf28e9e4368d79627a07784453505a033074243587341cfc5a0fb579658fbdb78c788a1042d8384a2a3d978213670751b065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a41c84ada4e31e5a4737591dcf5c7cd
SHA1f855a2fa098ef70664749b09eda6d3f406520af6
SHA256bc191f8b7fdd9726d20815ca8fd906e9d0abe6b57c9907eacc55ff5dae185a3b
SHA51279e28ba1f43339e56fc610001b47a8151a4871d755971f0d488880d8a22014d2e3a55f9696fe485917590afce200e2a90a34ed82f85f8f767611297ad501a038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afe6c61898ac60150a709f28feb0260
SHA18af8e91259bfb9766f11324b5366ce632b2df2e1
SHA25675af4843c4a4c9f7d2a8f86d2ebe962f5e5efdb66cdf646a45e41080008649a1
SHA51269aeabff64b4144b1ad6f154b261d76e52e2a5b12f9339b8cb5be2a7fc109a484716d613b226e672a311c9273bdbe7fe9455f8cd5b4136b210064b738ce71f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575bd1501c89cf31d1a6565948a6d31e2
SHA19cd77882a5a02c31194b96c037011b1996ae3940
SHA2567bb91bae2fb441bc2a87e2c26b9c1e6ce27e3f866ee8639febc47d3ac8fafc61
SHA5121fe936964cc82dd9d4822b8535a91667cc19e58c221edd89c873bb4c27ccc0ea69172d3a9f36092b1f2a3c40f6b212b82603cd155138f81203f10b7c65165314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2b0bd77502683250d8542aaf17c457
SHA10237b178c60c63ad4385fd8affe13f2887bd6926
SHA2569dc9ffa535736b1deb84da42eef927d2882c79fb6ad7b4247cd67e8396ce5594
SHA5124617115d81bd00edb5b576c2c15984fd36f1dbb8edb05361c0ba8ef91f705c91bbbd1b30501302f630063b3ebd57697710217c25bc3098efb95a7efe94555494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59437f4f2616d7d2cf3dceeba6125f93f
SHA113bf79e9adc0438d2ca605a9bbaa04e9231b2211
SHA25630bdb0f709fc6fc6fc70e5fc59268cd73dd221829d31eb916bc4656a13e67968
SHA512e60c03620368ba95b2fb46853c2f330751a240a481bc21b03e920b21773642bdfdec3a1183202fa10a364aeebdd2a1144a349f74ef7d5464c8ca6f032467eb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619e65d9f4aaab0cd3e22b9f955b95dd
SHA14c9041a8c2bf73f2c49e92997ec92c5cbab9524a
SHA256c288928d92af0986633ff7071c95f5e2a9fb7c7736055d0ccb0a9537aaa7b0e8
SHA5120d20ed3eb5eded56f3f8c4954ba50f7c1ff0d7c30e809ade0a1a96deb23745e67b03b1c90dc595ff3edee842c309f15764b647897cbf480716f0771e222d50fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745feafec950c6d149d31b0d1768680b
SHA11f24f93ad5f24d543829ec0f3d6e4f79ff92f7e9
SHA2561e79fb2068382f8ad6d88b7be3608a45e8ff999b23c1dd1338687389a43912bb
SHA51204e7e422cd51262347ca07c3b8a6dfd5983b69704069dd10943648ae250f2eca40446b0d18dabaf365f376c05cba41c828031ad20ce668498e24df1c6632fb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82b45259a3b8a4d042031b3c4239b85
SHA1e9373e6e5d058bcbb3bf789d83eea8c21dd8438f
SHA256df189f977499957c47da645498d09f28f6f85a2032b76ff68376825eecba1a77
SHA5120e50fc24752697b60c66ca7aec2435546393d39d0e2ca4452a5193d85f35ec5332bd2413b4fafdf1826763d3c75857ff434ce1378500b699795e1eea17e7b93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b37ea954dbbdab4570f942564d9f886
SHA137bfff9dc8ddb34dd6b195d2cdf376a37935ffdb
SHA256c77b957a14f30dc33d2adf3f558a71bc4b57feb90a4c7738086d36e5b5a5cd38
SHA5129d65c96b5526d4a0c1b7d58225d4bda40ac47108a4025cb55505cb040a08fa9a7f165ab748760e2436d9a68c1e1757ffdd50c6d7df4f58ecb0c3d1d5187779c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55741091e6ebe50cd15340156b48600c6
SHA1a26fda8b81007693c16ee1baa95d7e7908de0b76
SHA2561a4b49847dd6032dfd37d3c44bc2ca8d013604a5d4e58d7ef44bcbb9c3dc7832
SHA512c9907b106961f1e4969b7f876bcf1ba5be90c6c1849166cffc5ed5b29b600c58cf5e0cb2773c83344f6dd94cee7a8e5a0f616792ff49d2dfe10c8bf124db74b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874ccf4190bce19c6e6cf45eac7baeda
SHA178b860f7ae154eb3a4c7ea7ba120d2ca3150028a
SHA2561ee0e3e66d5c2a16df810c93eb77fb2282e280df47bc9ee4bae02126d5d07029
SHA512853eda9505a2d5658a5cd450731839d5de16ace83d4d1410c32f515ab8184e6b458f395b0c001a4cdb9008a30d0dc6785261c9c5fde149033a44899789a6fe36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d0ee218f4bf12925798d0062002bb4
SHA12ef2b15f969b6bee5f775fb69861d9bac53eecf7
SHA256c8bddecaebdabb2f4e1f870e5ebc904cbd2f76179e57dbd74514efda5ab66330
SHA512c4bd06641a02240ca63a1bd98985411ad72c10e77519a9eee9b2da97d720f74a25f61e71d8759188c9b0c1124b5de64337e538a51328fb00e88d6fda84638891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4126ee2cf1785d9d87d68ce8f12c3b
SHA1d0bb756289a5860648245c3f3f8ce1a22816d9e5
SHA2560fb28df3abc26bb7d8b1abd1e0fd95404e936478ad6ca430519b897a8c6e96fd
SHA512f6f933bce6ee86334c390767ad19a891ba496de9ec7ea35c76745120021a9521dd4a624450fafc7115a9aa313376079f00abf2f5210b472e179ed3b3bbdb9a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540adbf9531005d95e198f228990d9d68
SHA18c6e6976c53ed4b579e88a4e980ab43a4558c052
SHA256917392e6ec65a1136431699a6ad3ddd14cdb371a9004100548387be1fa4e7cb5
SHA51260c8a3b80296268fb1da9c6a89b043646f3aced53a9de17872b9a231d48bfeab789a6d9b13869d6e4d98f6bf013eb59cbcd23def7aa75c1fcbe2c47c5f1531e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b