Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
75ad2da1b8b51f68f706919370f7eb28_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
75ad2da1b8b51f68f706919370f7eb28_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75ad2da1b8b51f68f706919370f7eb28_JaffaCakes118.html
-
Size
19KB
-
MD5
75ad2da1b8b51f68f706919370f7eb28
-
SHA1
6d30c5c4968324f017a7ad4a3b61102f971a4ba5
-
SHA256
46d5b17aa59656ef77a56ce15568bacfa6a81effb81334ec93e17dd6f8fa89ed
-
SHA512
f19692df25dc20e7869b915b2faa9d38f13a1cf4227d81117816b070672e9217c4f5be9349e7cc07360ef62b2fc9963fbd6a347408ba6995cebdeb8d34424f57
-
SSDEEP
384:4+QfPFd9QZBC7mOdM4StKfpC5IgSnbmFe7AcuD61uLDPd:Zcd9QZBC7mOdM43pC5I9nC4MPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A1840D1-4BF6-11EF-AB23-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428232640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000072fff5f3bc4b39141a211c24b9f8f902eb35f3073225e322b579e7e5df3faf0a000000000e8000000002000020000000ae00b97380824c3abcf84e8cfff6f127ec3310ddd1865e9da955ab69b738ef59200000006d7c267b1f19a729513bb88aa8f94ece1b7efc7e0636e172fca5b392c34c380040000000dfaf546c6723ef0575dabe7ae3d1c1c2f76677b9f7b88cf0da1a5010e3b071ba68a53cf2e9571f859fcfe523d6adc57ed8287309b686803969b690481e7423c0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407c2c6103e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000d4a2eae8f46e4e189d57b4e8b52dba48af1d0f295cf8301dc6680d77200e0144000000000e800000000200002000000003abdd1fb8b1b0b7265cc33058ad9ad3fc4b5c8762ee6c5ac16e5dd0c63f365c9000000053177bf21b0ae6ec8cd0f07d9720b72e2eb81b1b67efda2f17e91b8a97953fc153d4dee6d454d8b9636b3f434e1b4b4c166d5414f2bdb4555fc83852846ea48b934994dd14269e5209ce564b8453514f067e27f52c5c7a2ab5af8bab174837f8d02cd33db7e8d463ece879789929866d29ce6b4b115e502b11966e170e716e71cc356a0382088daa04165e9526e5998e400000004ac992e3bcca48192125e161b233c9a46048d1279c668598c906715952d0daabf84acf77e3c22811f5c26526c7c4c39fd7d3ec0ce4c4b2913649587f6ae94323 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1984 3016 iexplore.exe 30 PID 3016 wrote to memory of 1984 3016 iexplore.exe 30 PID 3016 wrote to memory of 1984 3016 iexplore.exe 30 PID 3016 wrote to memory of 1984 3016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75ad2da1b8b51f68f706919370f7eb28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b450c875c872ba322f923e458e8cbb10
SHA188d907e197e088e1486a8e1fffab788ac3e81827
SHA256eeaae826bce4c04df36df65f732cf39e4b26d23d86ffb382ffa8f21373957c7e
SHA512abe35a18b86786526348371f795f03a8277a606736bbc425a706e6e6d08e5b1c0ed1424b07815a72ae62eabe203b0464f06775d957600126b0403cf1fdd400b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56166504e82a71ad697278d9323720012
SHA1ecbd4e719beaeea8aaeb5d18a500fb084f9a5736
SHA256c6a335ca1b18b5c2c1b534043943d6c9a91f79f19f88c922b69586822c14e7a2
SHA512b4eccd3e1791082067fff066e16875013bf9920aa5498bcd4d38660280c170d178a5c168ec1984ff92d15b889cc0dbbd9a12d48377d4e16aeffd1c6145b5168a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b9eb180b82d2d4d861001a1ca5c27f
SHA140635cda297e85d2ab247e45c527d6076cfbe1a5
SHA256f785db5b3235f9d4bd040dea52fe3d212c43cb5c7ba9300701e9382b89bcdbb3
SHA5127dc808b1717cb1bd8239926f1968eb768c25000e116f184b18c581e479dd5b882d0e197cfd1bf3d05b4e8b5436cb893c68bcf1d9d3274eac57526911688ea7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c8cecb17c6222189ccf782d355615e
SHA175f8a965fa2d7476ad2c8e15ecd0ed493cd040f4
SHA256543b2e252b36536eb72f11be579caac42a3e94a1311c8ec80925979a97ba6429
SHA512f98739dab0ed0aaf00361b610281141e141a1e9b1b3278e05c0046e2bb80cb457e4247088d464400796f8d7076d2e2a99277ac8dc73af22b439cc3a2edc319dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeaae242405117245be48c7e5fecdbe1
SHA103fb5d1e50baaaf7be5a7885d8cdfa1fa0496237
SHA256be31892dc9be4f84385f9b9b8f338f378194766e2a8f9d69b8d3d2913a7f02cb
SHA512fd40085021140ced661fb68358f7e4d4b64b01b138a7af8668ee7037ccf6ebc4bc78c1bb2dc099a6bbc6239687bddb498fa85cd2eea6904eb7a4af4c6de2ee9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c017ae7a48b2f439203e85e457c79a4
SHA166f2d41e851c2066c1c1a3134e355216097edb14
SHA256c0f7585a9e86ed2ee00fc26cef4bc6ce92fa1dac806edccdaec56761e2da221a
SHA51203a2eac011de5cbb0b8f6b2844e9a99ff5914eaeaf64e72d4b5a2a97225f7bce0132b8557b9cd09b43e4aa6bd8b6969ff1425b0139080200bc5c2280a3c4c5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a339a55a1753688fde33d2359cab58b
SHA182e52888161a083f2e96d201756e14c150a4c906
SHA256d3abfe30c8bdfea149cdfff3ebcde0fe6e8bf1071e8e6e17d0b0dbbff9bc2036
SHA51271f9d0c74e1b7bd581aeaab95df1d712a46a4a0346c61cb98004cea3c2d9b134da4d67e215f0a4c95e6b81c38b7fee0036868cc49cf3bcca2030653a10f250a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d1418d7caf567e23527f7eb423b0d3
SHA1e929245dda91a7e5f3bb818f703730fe40861985
SHA256917858a21d63e0c9e66a8c40c6b3e73fa34effad029620735b5650c0883a5a34
SHA512590ea87a85064d6346ded23e911d55118f2b4a72390c41cd5a09b91cf9a73c01da3100b364f9bab720975199cea3dd75c29b43d671108f317e74088e61d939bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04922722bd84329f70a6b29a655e73a
SHA196f8c7568fe2beb217b606d3b02d7c823123de59
SHA2568d2eb009916130831b1f72ab0ea915a5fbad4ce336eb01150659697acbb7d23a
SHA512ed20383a47272bcf93ae47b81cc0ce083fc948ab0fcbeb0770397f5573525ab9d958de57813e6cdfd70c71cfd7f6c8c919a91c94438083ea5cb95e499d4db422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8f1033b1bfbb7b025b80f34748a02d
SHA106782ff84e8d7470ac757a1fe7babdbb3bd9a7aa
SHA256d6e5df2f5f686d63f4b4d154e332fa34c4915fdb38a4f7db9d6f2122b7a57bc7
SHA51297cb781e477780bc0c60fc9de3607dde439356f77bcbb6d1d1073b8f7d8073aa9679ff2170a991754619912328622159a549a95941fc254e9025fc8f5d4a7da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dd72e66e00d5220969d1ade932cfe7
SHA1f59effda2206c928cb8fa725a96acfed60c436a5
SHA256ded6d574234c74b1d0acce7a3db16beb8cb612bb98c2c9a0a648e56daca5221f
SHA512db8fb4e8e2335489f128def010a496db2ae165f04750475e6b6d9cccdf932c9c56c1390d0aad0c1749d7464950caef85313923b70f680b9f93146896245d5c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065ea2d99e72dbba1869f358c2198915
SHA194c7ed8b27926ae735ce55ce2b22c371b739492e
SHA256ee32971d5e48446244d9a022c08cc449e4e4653c4cd94f1222688caa23ffa332
SHA51281034551e453fab7d05cc5fb42b97633e3fe89f030dfe90543f868345e29956a19083f2500beae4ae096b7ca003a1cc0b9f690e308fb4a6b1f2dd65b9b2e0cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1fa5c7cc39067cbb53bbd41d2c7c05b
SHA131d9285ed1f483be75d9febaee621960ff8a4984
SHA25671539c646aa7f39a83bc85f6321c30947acc505d0c6ea68a923dc0bd52f61b1d
SHA512315c634e593e18c7b7fd140c9282c9fb1e641d62e2787d9b64f7e8eb541c7c4476b3893ec69dc582669e72b5d82bbae3c0cced600b484552fb9208cd7d9c751a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e587a9ad8c262e8a212f480b7dea71ad
SHA19c72fbece3e75397351a61fdfbfcae9f9c0a8006
SHA256780f07040b20d36331d2cc48b0b42cf59164d81c45e7278e3ad6b7254a53892c
SHA5125808b8d125a54d93e5f733d2051ae5ac46cd13bf5c9e92dddf6ea1d83e6b44290cec97f5558de5e727fe7666f8f93153c6cd781e94e9077b69ea4cad0a60a582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267caf9449402e0ddda3e62f6b34a8f4
SHA10a8440112110619a2e25c0e1631c8a12b489be2e
SHA2560fdf2b536c1125fd464656cbb8e1c0bd7e37a133ea32058b67b63e8f92dfe075
SHA512d24581671ffa1aa4fb32e8fce29b6f374f0aebb45ec926184c4400c40cdb6673cdd76164a32c9f8230a6f764f521ceceb48e0e5d5df22978e02cf25be49bd1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1945ab05b3e6e27c4fcd55135cb230
SHA140a734c52e822daccfacb71408456efb7e963b83
SHA25691166e988944f2d14f9c4184585350d8b93191b7137ca136949f5eb0e706a446
SHA512d787fe6d260e137d08b20f8bcae10f5b05fa01d8652714873e96982d5cfc40b1427875f82d8371165abb983f91ba6cf9c4a1f28db5307ba7204fa4e14af32c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eae0a6b7688b0d9740ba5604b600b86
SHA1835cda086b7f7dbdc6d90b8fff7215074c5144eb
SHA256c1a72b46fc0b4ce31718bac45e09fe05b2b902d88dce8764a85f19a590445e59
SHA512f118b2d7f8e9aae73795f2fe81c76bd89794e0d67e13c39cc0673c6008d00edd8351605cf29f46bb14cf1bb4898e992115ded86d3e41ae51e7509b8bfae8993f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d63b4a86c7f9d84eaff0d171bcdaf27
SHA12a82204317b3dcda9ef7b621d96efea1a92c5aa4
SHA2566e5d97a8ef6e090608bf3248618ac3df68d5e237e044e992c1bb9f1daa616860
SHA51237b92f63fd0adaf82a43d1b9fd79840ff139c6d13a944296889aae79fc2a06b333cd4298a555ebc8c0e5c1e6ce1ef7c15c13b94593ee295c8d7af1f4d3b91940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5786d4af5bc973c61d9fa05cd0f4056a5
SHA152e7457ead919a5708b3cc13180d34fb7d8151a0
SHA256a0984764cf89135e901fa16270a2d73f7c52a1b97f905ac9d0ab10951209e4bb
SHA5127d5ecffca182219caa751dc37a9c07a3a5ceb5202416e912800e48618a9d6693734cac2a9f87782a7f801ea5c8eeb0ddeea98794794631826a4d1a88cb824f24
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b