Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
daa1e29e0079ad08b4a5753c6c4d9e38_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daa1e29e0079ad08b4a5753c6c4d9e38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daa1e29e0079ad08b4a5753c6c4d9e38_JaffaCakes118.html
-
Size
46KB
-
MD5
daa1e29e0079ad08b4a5753c6c4d9e38
-
SHA1
e879aec524e73d544eeba69f1696b776d0d3af7f
-
SHA256
266a2e14b8871816360b7c5796cf8f023102647c6178067ee0422fa85f784f0f
-
SHA512
b21ca479f60e4230c40ca1a2b6e0aa5db22a32d899911bab518a645278dc1433b14f52c87fd519c5e75e9107778701022fd1cb37b1d5116aa5fc09065b83aec1
-
SSDEEP
192:uw7kb5nhunQjxn5Q/RnQie8NnJnQOkEntD3nQTbnhnQmSfxqzEhERYZbQH/5Jrae:mQ/AkxYwEG6BYlc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d2c29c6c90fa3864095f1143a29d1cb286b58df58fcd1af9dce4e8f2f72ddb67000000000e80000000020000200000000d926e04d76de5a2c6619ba7463b6e664e042387c1ea22bcc08ec12ef9245a9820000000fe627d88600ad4fb1b40110e59e16ffa4ae41cfd446ca93afe0fb56994657863400000004d8bbbf956ab5e53143f860b6a299aa1ec554f5fb84363a842fd61b4b0c497a648d5f9c73d0b928826b9ccb47b1bd7225fddcf7307a6c4d657d33d704649311d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D87BA091-7050-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432229671" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ece9ad5d04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 280 iexplore.exe 280 iexplore.exe 756 IEXPLORE.EXE 756 IEXPLORE.EXE 756 IEXPLORE.EXE 756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 280 wrote to memory of 756 280 iexplore.exe 29 PID 280 wrote to memory of 756 280 iexplore.exe 29 PID 280 wrote to memory of 756 280 iexplore.exe 29 PID 280 wrote to memory of 756 280 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daa1e29e0079ad08b4a5753c6c4d9e38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5555fe9ea9599fb8553198c9b594a70
SHA18eeebb36fcff095a3f6f90ef4e9ce67990f4fb76
SHA256e0193e6c325319699a4055cec12318c2b3f6490cadf03fd62dbf6ef54a2aaac3
SHA512712844af0826ee47d03570e77adfa538573559f0675e3188f6ba8e77f45eaadf51543e59f8588300b48a589fbb608864eb05efb1f9dac91a84bac2225d7098fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa66f7bc5ad886dd5e4b3fc3bef8374
SHA1e1fbdaf1afe968629402d167a92e6d13378148eb
SHA25672b0cff05478343e0d5b01ce0543bec303c31b9b27ee9d6f87b97b960f65fb69
SHA512ca6903fac1aed8cd6dcf87a0f89e38ed7be30b8b970520d0947fbcfbcd9e1ac4f577e1888588866ecf4d670cc893514de3b01b1173bdcd1a48a35659b0782622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c36bd52f073723a1345924ed7386fbb
SHA1b8dc5e9e6b918281326abc93b7b0dc29ca62bb10
SHA2566600e018019e2451c71d853ba7985172b69dff079e9b33289c29f07b0ef69e0d
SHA512ae8650532cd738f4a490792b340c94541cdfe6ba60a2d4e7f04c35906951e5e6d6247a555ec36030c4da1f2a50a5394049ed15e72b6de9a3641a0a3abeee1263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54694aa40c99c7c4818cede145fd911
SHA121bb0117fe6143266b47bdef9f26027e8c3834ed
SHA256eaa0c393e065d5f042c1cb5d3bd62401d290ecb042e2cb6e8b456851a40b0d3c
SHA512467bc50497480b5a6e6d0441dba0c6a12dd18983a72bcdf04f081c44d82b8220d53e3a8b685e9d780d73688ea9e03e79d598594d01e7a33b97efc5cec0d11595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58eafb0faf36352f3583baed3f6487a
SHA10db44745a8ce87cc49ce04a48e40f0beca5f0bf5
SHA2564d469e7d16b7c66bf90b9077c52d73b736ec04398febd48b3fa10b77934d2d22
SHA512d3bb10d216b26effa5177ee450d9a046855a9056331f1cec4c8c2597007c232cf17be05fd297051320923a1cabbb343a750ac1f9faadefddb44d6d0a1efa32e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d237a98c5b19e03275ccecf1e8bce7cc
SHA1f902eb705b277ef618903b47adc344f24d82d350
SHA2569d670c5de559f788c6b750560b851c85464dbd6690656f878fe184f612566d08
SHA5127430817c4b1b44b6d70e02fbd0b6b276eeed562c07432613dcb8146140151afc20d015e356faa2a161be1d2024ab725800fde5cb1863e156b74da8b427af2b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bb61c1467b1ee006f8f6ae5c96f7c8
SHA1658bab7c5685bc05c323f13ac65467ecbcaba4f2
SHA2562efdb34c8f559b423ad80d805f0396e35219eb149d3b51bf435fa37bacbc7702
SHA5128207d49f3134c9a31c91f2c8fc7ba48fb25d5fe0f0a76e7aa9d861bbaa13f68fb8061a4bece8c7c8dfca829b70e7b9632aabb332e6b82b2a5df6c6ef054a9b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56180aec13d67e1b06dad6a45332b58dc
SHA1fdaa34ab57906760079c6589bdb63e35aa682c5a
SHA256a6a900ad3566bd9b7ca2eb44212426c56906481bfcaf66963f788d09908ff87f
SHA5129c2f989db480d8d97cf695b4511824a7a73d8f44ee21c9192118d5edec6eae6d5acb81e25f9a4db957cb7401d4fcf8de52d6fb40d58951dfb5d251356a56e4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59304570fcbaa621105ecec9d5ae1d24d
SHA1d0c01f082bb9d554f48b61d55494ceb4a086b965
SHA2561aa6c406adb13229d69f8660a8c956fa24f1cf8cc06f86a92d8cb0842a39a6d7
SHA5122fb45eb2f4efdaf58a8c9708e22adb904434859fe3f6f322f48931f9c4c8860c02d81e982e0405ec445959609c628fbd51fe31ca5eaaa1c10e911005bd4ef783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339a56fe1570dc2b169d58f2b7784e88
SHA1afeed3a18dd59aa9e37c89970685f14001b5a206
SHA256baf33fe89f204141ad76a77e6ac014aef2d2351905e25ef491e0896222946c3f
SHA512ca059ee3bee41ea9f128c8c86abf8c1da6da5e5d0c2a1d82956688b8f6d959020d486b5dfc17d9fd5adfcb497078e9f5fbeba01d3fdc09fdb7d4f4ceccab399c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835e663c34e77661758f065d83a0e0e5
SHA13d718074ec884a9b06d1fe40da894f16120ecd0b
SHA2564f0de0a6962fd098849fc9b4d523e23a176184d34f3fe62b4236e2a26d8babfc
SHA5128223afbf5f049ee88cd455ba9a8d43bc46363757cc3a0ace1c451cda9afd1c9e92537dabe28ba1369c053fb997105fe17d6be5d6fedde9be42089802f38310a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590fbe3226d030e8d02f3ba58b882ae47
SHA1861fa734aca00296da00bac599d673d2f90208ca
SHA2566505a489eb6f2b1eab8aa602528cb4e6f7189ae66249704eb61fa9c00298e105
SHA512740aef01c6e51394673eb4ca342c6688d26e286641b2543a2e78f77b89a7cb27cc823999db431ea229317b5ce694b06aa297a41797a5f27c89208dede17b24a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123175c20822cace1e180cb842782e70
SHA1411a239ffcd3454dc46006fbe107e43a5ff8f16c
SHA256efda20f1149a44c40d1cab4a02708f130de62bd69ca7e36e2c1928593f7a03fc
SHA512dfe2855ee9b954595fcedc9d526d1fc8d5742ef425654f9bcaf6c76f0233dc53fcfd8feace6f652157f564c50f424667043541f64896d59c6540b00964bf136b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55169bea96d3ae3d6e28b14807ac1fed5
SHA128b0891c956f532202d96c19ad98a7a3b73cf2c0
SHA25645261ef4eda49d1e165627a7759901466f8c64a2be693bece28ec98bc97d9559
SHA512adb2fde5b35eaa3bd70bd0bf3046ecafb90db635b9789d61c897b0c7fc81c50a5b4b185df308c944ead9e5a701b9db8c2a5862635db2155dafe3933e31f86352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22cc5098897cb7ddb61e3c31bafe669
SHA1a92b949ced9bf0d4abb5d8d51720ecbea69020c4
SHA2566884ea394016d8190dd29c35923abdc0ff55bb14ae73c675236bc016e32f835e
SHA512258dbe3b9fab4e232385880afa70f9a1c8b701b89410349813cc8080c633e5201d21a0f3e1c7c75e1aa0d96f3299f94447f8f56679020ac93dcfae8a258be63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d4f3172fe4a9465b9001d6cf6bf13c
SHA1977989dfb15e2843211e7cda5683f72913f3750f
SHA256c3c586e98626110435f1589ec40bcfe6112a779d836f39f7152e047a8df1351d
SHA51242ec1518a7fd6b59928aab7a1a5fdbbc66566d510ebf1ebfd37337b6d7d3901898e38deeb77bec33c97eaeeb7b3e76423f5eed69fa1ea1551e1c3a23d6ed218b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e3356e73cb0f390c270699bbefcefd
SHA1ac9b46de61c1b631251a3234425e3aed27e46a2d
SHA256985e3dade8e9a3af57de9fd763804d3ed57bf51d811f1ff00c4469f77b634cb8
SHA512777793ced8b343a2309f5c1ffe00fce9980e764f4f0d22c183376bb90ce2047958d36648b0a158037d87235c78c1a6037170e5337075e92a0e46e881b7c0815e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76927a7b7e4662ec91ec534f062f237
SHA12db294f0aa9710f02b187c236ad2ecbf20fb54bb
SHA256ef2a61eae699f308f35a6184403c4e4fa354af5b485c1d5a3f17b8c56cadda97
SHA512c54a23c291d25a1c5976d5961ec9f1018e14d0a5089cdd46e10d6ca470c74fa9e1c20e4ca65e09f3a608b2418a1a7f04a8f9b391363e0d9f2bdcdbb1591800d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d58c25d05d93de3c1bb0a44ad692b1
SHA136a0a48708e1e9c2a0f759d3b07d09eebd7aa00b
SHA2562d8860588933c8491bb082f5dda1dd38ff4d1f1712ff3565c7cba559d8571565
SHA5120aed8b03099a4ebd94e86d43195fcb1f2903f05dbaaeb9843f7b48dc4ed43e31c9269a3ae0ab5f3829e736e85870b47487bc17836eab2663a843dbf99f04de47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b