Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
697b62fda20ea64c6bd9abafc67d1691_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
697b62fda20ea64c6bd9abafc67d1691_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
697b62fda20ea64c6bd9abafc67d1691_JaffaCakes118.html
-
Size
9KB
-
MD5
697b62fda20ea64c6bd9abafc67d1691
-
SHA1
7b7d1c42d47767f1d94f7fda9d9c37a85e56d368
-
SHA256
14fb91a8e3c89969f8f21298689604c5836734592ad748a8ce88963d4aca7c38
-
SHA512
910b850e0b810636ee063ab8675be9da82962b4c017e72b7f1ccd130bc8d23d2f35c7daa0cfe2e8adfe83ebddd90255fce38cf6610dbe13ece1ddf78d29f09ee
-
SSDEEP
96:uzVs+ux74hLLY1k9o84d12ef7CSTU3GT/kzipFHlVHcEZ7ru7f:csz74hAYS/G0dPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0abb7595cddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{831E8C21-494F-11EF-8328-EE88FE214989} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a925b85bd8dcfcf07b09408bd1519036d5a895d8dea22ff6389c6871b4a2e196000000000e800000000200002000000042d0076860936a99d3c9a52120a4bb97b9d0ae8deb44881cc6a7e7d287cd3b49200000001c7501bd824bbda987b8b483b99526006c8658c9d7881bef4d6720235fbd62564000000093b0535bb5e2df45bdabcfd9bcbba86709c0c97088d4a0b8f337f7d7cc692406e07bc4c9bdf059f200ea2229993a08cf39901925e49388cc29c9f31f45728000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427941000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000b9aaea7d531960619bddc2742ce2aeb0f8acfa6fc3f780ee4e80475192609751000000000e80000000020000200000000fd8651dfc88309ee06931ffbf4e99992a96b6f2b4b130d2999b3e5b25490dad900000005ef1ac68477674b69938f07979644981e5a3f1ef9af5e4b5ebaeea495bb08b7dfcbcf800b7b3af7791abd917beeb76d4fd382f6600a663c01804081648334de83b830647b4ba6ba2ac7a6c95880ae4391412b07dcd2646b61395518257e41fb825df77364d60a56c8488e9c61c19d1256c8a1039439d6aaeb54ee9f4247f3ad42b2dafbe3a3e8c34856dc284572ce3f740000000a39a75a3b9e65454b5b259fa35f5dac975d457b327e39b4757f366ff2e9a0a19c2f276f1757c65ba78c27407770543d504025eaeeeb0b7c52ed5b4fe16e7e818 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1800 2776 iexplore.exe 30 PID 2776 wrote to memory of 1800 2776 iexplore.exe 30 PID 2776 wrote to memory of 1800 2776 iexplore.exe 30 PID 2776 wrote to memory of 1800 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\697b62fda20ea64c6bd9abafc67d1691_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833cac59a63c329564d6195ccd8293ea
SHA1e3df1054d5ba7a1b78c01751bd686c4807dc245e
SHA256618c12873017f6cfc135d8162de8ea9a1e5df26a4fd09a2ac1fe5b89dcc51508
SHA512ade25ab106e8792da7983b3688939be028ce0eb18f27046309934e20021fd708dc3a4ad595cdc277b68354df4a8f2a31a20a46cfeada99240ab7f54ea219a76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8763b6fb2cc0d1bb8025fd83b829bae
SHA1aec6cd5f18ed711da9b02316d90bac66dd993ae0
SHA2568f3518c2b165f1083da68b25340e084c68886c59b607ae265de091c3255a66be
SHA5124faea7de9ed0b5d88264d0bb873ae523611548be9db01fae3528da16805dcaf1ecf83f21b9d62cd7569aaf5b1fc2d192937b71f6ff8d6819169a5fd02453aeeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e940e57c98864919ded74d6687c5bd
SHA1510754663b3e39cf46bbfa3fa26b583b547485a2
SHA256d2e202d5c745bb032e63c4eb2e188815dffa3f940126f0310334902a6082de70
SHA51225903760f2cfa4a301ad92d6bc50bae4ad2e589bc266a6e68e1e5fcf08d73dcad5c22a31964ba3e82b09ec2f63daee6aab30f70bdae4235e1ab96ebc01c98794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5857147f8754a8333bfe01da6881bb9ef
SHA194dee4fee813bcaa9c0aa3e2442b9c61a17e0bd5
SHA2561edfd3829da4c95bc894b998f25504e8cae55d819d9060041e52eaf0e68672fa
SHA512a65fef65f8858b6191ddeb72ca9a4b1f954ab4ab43f10f6562997977b62a5bd9e61d3142f65cd2d1cf8588a8a6fed0948ed4869f811bb8168b5cae91594ad0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58252d0328f7700c57a4cd08c99da2a48
SHA15c6321179e999a95e144c58f160f1a2835d201a6
SHA2561546ae3ea88c315fdf19cf25f32281832cb65902dcf529d76015f0fe244b073c
SHA5127941236714e7cd9550275aa4a0773eca0cd71ee8896dacca37b05b6c7c0c940eb93a93713502925d0ac9725e384b9ade5d7f2f886c84b5a6c6d378b7b429aca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3b57fd4ad54e4a16101a6d7f1523c3
SHA14ee24776847c18bc2a1bfcea93a97e6b4d21a9bd
SHA256a088a1867b544eec587f2cd433dca099d049a8a5e2661f321c0ab46ee9e49a55
SHA512ed27a28e2a53d9a173e47b7e1d2297d3cc09e929a66bacadd60213e96e7ef8897b370c3fc5d544eef36f42fee69fa4311e11376b11a85db9e9a5057eb8e8e14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eccf3485b495bfb8c983d7ddb2b57f
SHA1578d90adab5f00ed7c0307fc10e106b4b4c724b0
SHA25650e9468666d6c7c0336762f78272cff3c7957251305c7988ef605cfca99d25c9
SHA512f9b409c635b8fdbcbea3bdf627238808d119ffb4dd1db719fc16b7d256846de063f9a3e1daf4c68905be9a0a80d3ac26ecdf41d3692c6a1aa090bf447f324bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58583e27cbdf4d21371cb73b3d025523a
SHA1b4de0c3470392a1a0981d4997c0e82eba108ab48
SHA25623143155498db460f44615200f800208df9dc5f590a9b1c010b96dd418047516
SHA5128451f24d65bd68cc70db92b03e274bafff5ceda13215abe8728b9fb4e850cefd86b586de1de2b2d4e00001f120a2a9e7c611ed9fbb4fee16c90308eda72340d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f492eac3b86610032550499a2b5554
SHA18f5b6625320b42f594e340f4988723e5458d5451
SHA2566c8be1c11f1295a98b052422b448de31589d0c735831bff7a3ac9af3e5768d21
SHA512e1615d6d03c2edfa4c770b64e02ac30352fc58c4ecbf98e7954a8f694daa529c1f2703a8cced6daadaf556251c2dc843d1b8e64aee53126590c0f45878926509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f3b89d591b93f7be34b499646baa62
SHA16b5e1320275904db7b2636ba8f9653d02c2a38cc
SHA256bc58b39fbcfb072a39505f9bb33091fe2a6ef6779e53117651491ceb6125c9a3
SHA512b8631b71eab111d64a0745e0613ed87378f821c51057b5da0b4001d14594e84f9e8c5e694c709b13bccacfadbef4299c235397105221e71646320b86175b0eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51f5e5a30a36fa909fa90ebe3b4f30c
SHA1912426e5ca788d7cc4f44907df4214c03cb99c4e
SHA2561bb3cdbeeaaeebc66b7115ec81ac0c187d6e182a1ce7da2c6880be98a93cd748
SHA51240f1dca909baf8ef9662939ad24f6b1c92ad014d820b2a9672f4d3db8af14ed43a6935a7e5bba0174d9e8213e7113001f6dae1aa35bd1f0ca394f041ba4b25a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb6cdc13bf1c51a7862c89ad87e36c6
SHA170f42012a8a41438b7d52af6dfc40d642d6f0804
SHA256ec8804d0ff03e9f9726d3406f825e7a53c798b29b804d72e61485dd5843f8b22
SHA512f23100ad9232970de2ee33b6860fe6d7d1b84a59dc872b5ad8c90b2c4166eca46b15d90f1bc79aa2be1c0fbda99508aee18712302943ab49a1c54eeaafdd29b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776adae96145d2c761a5615f14113c12
SHA1f8450ce3527815f07060cc045c40afde6b17e204
SHA256cc311819217ca62091b3b9a7a619e41156d17d6446c519e59dd0ae3224d49eba
SHA51230e7f1585a24e70723436b20715c75e04a843f8e5d2131ece2cb448fd6fb192ae7a15f743631c18bc18b38c7455d4dae0f93a91fc692664e04007fcf8a43d177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd495f70681c759a676f5b251806647a
SHA12a93cc817f426c1ec266c4bfeea505bd05c3edc5
SHA256a5687e0cf83363b6586aa1b32f2cff430588e8ba91a04598f955a702e0135343
SHA5120f1151bdf882bc8f4aaad8fd7cf5d12b33fcf4bb7bb3c31c273cca5d2635a4b32c484574dcdfdd34b1715d08e017b273c100bb51024ee1f892feadbc82956e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2368211bbd9c13776645784b40ab96f
SHA1379bfc450d05ef9202ef3cdc4d96373761e23c80
SHA2569bacb027fe76eec8ba4fed3e05baed6031955f9b705109a27b0e1fff80da7d39
SHA51226c3e6ffd6f0e4fbe5f30a915a9cce10ca9357d027e2db5c32b790f88ddccf59d9df79819f5ec5e47165ee78507e2d7d9d3351f04dde45f6a62ff6a037791ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743171083b68d1a96a85caf09b95a9a1
SHA15ee3c6b2f953e227cbcb5b406366b0dc13e27dd6
SHA256e9e9c068d1ea9459d79d4c0c4ab631075214a33d735512e5767fce3013271bae
SHA512ab8b20e19d22ec7375151782f553dc9326cec50f8ca545b8112bb4f6d3280f1e9d76c42392bf4d836e374b4e7e94bb59920f29a9dd49cecd1d51db51c2db26c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc482616d6c86e2f99f9851e4690e95
SHA148dd53451289f42888d578c86dd077ee59633aeb
SHA256a14f729fd3d41c4f3f2bd4a87a38912ba46124910bc79b414368a0e09bd95904
SHA51273635097eb45a17516692d4e8ed5cae9b17356f488468cb9cef976faa3fe022bac270bd389e75729ac890852bc9cca911fa2f442c1d387d0565794b33400ae68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9b048271723136aa4cd556e7aae068
SHA19d6aef030d342f8a485899b6cfbe3e02fc200946
SHA256cb454511e28890a6c89936aae5f4dbda7c7af2b93bd75da39863dc59978a67eb
SHA5121cf54eb0fb34b685a353b6e6883f85c61d3aa9167603fe156a64e7bf79045a7dd75853a0ce3a118965442c61a0dbf4733ac6badc22f3c3bbdefa29adfe2ec3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f38f71797e287d6b92155888241c5d9
SHA1d6819adca930d983e0d89092dcc183db4a62d4f8
SHA256d5e85b45913afbb3468156fd1e0cf66999692ea4543062a1a29780a27b4aa895
SHA5126995548b981e81925e139df97d0509c53de49732a0fb6b7ef39921b944ba2d6e08f9d52755a88c98969c382a88cd601a35e8d8e2af6eafff7c4309623fd285e7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b