Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
dbb793233a782d1fd6fabfedf03f57ae_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbb793233a782d1fd6fabfedf03f57ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbb793233a782d1fd6fabfedf03f57ae_JaffaCakes118.html
-
Size
23KB
-
MD5
dbb793233a782d1fd6fabfedf03f57ae
-
SHA1
abdb95829f58d62a1339d663204d36421c02dd18
-
SHA256
074f2e74171bcbfc707d227dd0c491daf3229f15cfbe1a77258bd0067c648b26
-
SHA512
7d381dfffd27f4b77d4ed26079f0b1abaea39822d5e3caffaae73bee11761ccf0ef736a19ce374498cc31a9ecb594ed00603339a223ab2e61a180c80f585d921
-
SSDEEP
192:uWbgb5n22nQjxn5Q/pnQie8Nn2gJnQOkEntTfnQTbn5nQCCnQtmwMBcqnYnQ7tn0:rQ/0g7W9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432272979" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70247084c204db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFCF0411-70B5-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003bc70ab153eac870a792e2be412cf499fc92c1e842b096dfe2a5f0d1ec8b1f45000000000e8000000002000020000000071d1b4a0729d925c7fcdc4b2453c391a141af9973369a5b8a0d72bb6e58df3a2000000019a9472a2a4c81e520233716fe37fc1f1d472690e91896822aa4c9f02fe41fac4000000006475c61af184ac267f54c1b4bf32d8903cc1626e25765b5a9b03ca25b6a4f429db681ab7b114c9e89c7c9dc27a65a0107126bd3cbf141a1d2f15000696c44cf iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2704 1628 iexplore.exe 30 PID 1628 wrote to memory of 2704 1628 iexplore.exe 30 PID 1628 wrote to memory of 2704 1628 iexplore.exe 30 PID 1628 wrote to memory of 2704 1628 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbb793233a782d1fd6fabfedf03f57ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301962d20418531220c2ffa57f939f63
SHA1f92471611ea25456d571876296749698d70d2bbf
SHA256a21306a17dce5d69f869af907707df07b5ac92ca0ac083934e6932179d4aa658
SHA512290fccf890a4d7fd89e2091e504d7ca829f58d2d6283171724fe1149f64b65316612cf10d264b8e6c1d394386209fc12fb9d10616f7f2b25bafd6b1a093c1fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58934c3aec7913e20d0205d38559e3d05
SHA1842f0a36fd44cb18c83e205d419065555022a555
SHA256a86135aa691faf884a247bc50279ba115cc519307102774d09d4a694a43e2258
SHA5127a42c595ae8e1d6ed2546d65dc3404ea517a9dd01ccca494cb945138e07033c48ad87a54ca6724c4722a0af39feb66044df3449d2b3b2558ab3feef74fcbd2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b921f263a531917c07f4ce1283e67eeb
SHA1b1e18324401c6d795cb41d3fdb98a2ece893a16d
SHA256035eb61ee413822ebe40fe022f69f51ae4643c2706070080c810a54a7d7617bc
SHA51231b4fc252cb888c23b57f92ae7bb27ca2e567fbed7d515d27cfdb20261d415395ff5b67909d828eaad66932bf3bee9a1d893bc2aedac6531bf04dbea18179375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570760c16a74710de2285af6d59c0fc22
SHA13b9363851eb0de80d18703fab3ae9fcd0ff301da
SHA2563ab8e78e220836a27ff8c638c5c0c059c0476c27602009e3146122ebb4bd3318
SHA512d6f1acaf733c459201d715058cb23d567cafb5c285d0c5ed7f1347042d1bc62b6954c8c2e396b0c2461439d73d8c8e1156c792973e972d33505dc33576c406c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7838dc1252316dedfa151cc7ea4b59
SHA17aa5e81a2feb4d6ce75a115cc9ebc2ce4c76b8a1
SHA256b21b7239f65fa623cd96ed37999d3a8f89fed48ac69657c4498b5ad879425318
SHA512d5e8c09593898d2bc0af33a8df887834025558757a075704bbdec83baf0eac1fce4bd327d273040d73d96d66fdcaf29130c9f85264d7bcd74c86473b47f28321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d1388f52cf4c632ad084c6d2c52fcd
SHA161726d9d9f59c56b3b257fe491a7390c08fc923b
SHA2562f8ceb0ab7b8b66ae8d63a6ee7bd9e598e244798dfc34965fb926a4f9529814f
SHA512ee1651da243351c2e83d5d552d57f9c7db7908fee716001eaa3e66e78683db9b1d20df84fe4fa2d4a7c88a18705fddd5cc5eb94cd511924e8558116450f6585b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ce288411e9ef2414abb67ff1595451
SHA1c43dedf7acd138ed2626b12c1cb1429e7982083e
SHA256eacd84b4dc30429e45166a1927cb3f4a1939396f9fea3369f1b94d24fc633e2f
SHA512492f3f52676ca73e5d2e4400d9775439487f64ba0382eb60f1622392ccd234a634aef54946131787430f6ce6709c4735ba2584800dc44ca6756611787ee2b7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ded32248b84b63a568eacd096582466
SHA1611d81a679915e2c0fe2111f6a0f4afe7a744fd7
SHA2569b42ec9b9b7ad1409bedde634bae3d37497c05373368926a1254fb13fde7b64d
SHA512fdf47078718da27f65a0766253fd74fc9b03691b306db940f93f4acb299156abd4ea2c63152b2c6b17f541d76fa498b4a4673c5be5e7b6f19531eb37ea791435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52088894644e6b002ddc6ef804065b80a
SHA13029dda8183c51da0db8447cfe704116efae09c5
SHA256a2d71dd6161bf8766a7003ff430410a4672a2fe044008866584195f92a7d1a83
SHA512c0386bb617d662e5fdceb7aafc4d77a7e2dcc58ac9db40433844c2643067a912e17222376a39012ae081efdbd739cbbd11c1643eff222cfcefece133d2262ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5771b5ac7f847e51fae247287c909a4
SHA127b38853fc90e3d87d112aa84417c4d404900bea
SHA2568a53f5b57a25180fed534acb0b37389b104c7aff76a5966b114a309c78e66c70
SHA512a1a3526b0d01f48fad8ddefaa82650a4118fa0560dc3b1370e0f356e32e18e6815b62c14c7579efe8d977e01ff1c4f0abfcc6f01142b70dcae06756ffe94dba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e646e320a6f86eb30aff784814d60999
SHA1d9c2fd542b23c3e6d5ba7a090e2051bc5a23ce61
SHA256de0ad7ccf295ac2c8fc39f8e619fc7d764501f9845e1739adc12e9e6d0070e5d
SHA512ae4225d42b4cde0fe0c2ea5d78047ebcceb0e22f494a7ec50c18b91ee31e219fc59bdeed02835a4946fa97b320d2ea4d119b3c7db8cec65e10ddfead3253e42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502976df841b8375c61a1a725a8a4b82a
SHA13c2b467cdeefdf9f2f1e7fd4f5d411bfaff49fd9
SHA25624954bdaa3689e3b9ee1244cc99272d65a8f4fe242674a2c6ad8b6cfcbdd51c2
SHA512e7d4017e2cd1f332ad952ba3e8478ef481a96429e63487ea7a022a159053858b460e3aef5dffa0dcf40f93ae645769d2ae308f4558c8a8623f9ef0a7604f2733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234d930848ad4ae1b628e8c13fcd941f
SHA14615424db9b8da7f4a560a000b0cc63859676a25
SHA256b92c468fae2bc3aded0550b47c35547a358c3445aa741a8a536c5e0a099daa5a
SHA5123bc490cc26950fc9e10e6c51af98969711b445e43a031dbeb3d025076f0e085b7aff1df8473ed9be0c074fabbb0a53e997a7008a1ac26737f60f4153e26c3d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beaaf6eeed3639eb91ce955c5ba8b5df
SHA1e480f5305f96d25997e0e711419ff64879fe22ae
SHA256a81249a71fd43edb585ecdb64994b26e0da876b7b16eb4e10ab024b9d87325d4
SHA512c04b097d7d90f5ca3a1e645bda7e3a92fc71c353cdd2083d6fbe49c4f63d76a23a4b0a75e28b0995cf9e4d62907247fc32c1c6e0580f791ef26b96e68094604d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec7c1ceda6fe81ba852f8d35b95c471b
SHA1bba168a8bba7fd2fd8ee8007eb2f7edb173cffe2
SHA256b4131088979268b33d28b0ec4d8180964ab000e8ec97ba75c2f1f8549a49161b
SHA51255ef65f7a71809ffe99afb765003ed6700bbafdc73b263f7e93064dfcba445dc793203045ff26883f7920d6d4c56fdd681a3d1c03b3191f4ae3af2da424caed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046b6e20d21f7a375dedf4eff638f0ce
SHA1ca78d4bdf7185d10053f651b3773365ae452d01c
SHA256380fc219d71c865a0ae9b85402b0bba4379cc87112f362114f9ba0d98e01b349
SHA5128aadf6e078e494c35eaf0ed57e9d0c876cbc876191e44095f0ab34994f2179be16cf497bb296e69e64e14c6b3eba013d49ac85cbb275f2e6f4b9b33e4c7ab9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de806b357cac2ff455a20c491b30226
SHA1817f6f6c6e9e2849c909953a8c971436a8af20ef
SHA256c3020a03ed8e81463f50d8ca9a6aee2650399ca311235513928dd62ccdccf647
SHA5126c32068f5f383aadba30fd39ec08f86292e416292e398250e262197862265c45f4d9f8db0ec3843ab8f3e808d76ed685a819551776dacb470d1a95234a2a2a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3b464110c31d67987b30b8c04a24ed
SHA18c228c267c0616c2808c389f10780f9001f02cff
SHA25682ad1d2010a67f7da9b41348b3e542db2ad6bc84da1319d56c54b98e55937d22
SHA5125085ccdd402562f7c267ae38b3dcc4bb4f05585c4f029d2705b4db148fbe0e20314cc4812dd59829d2f2bf4a93d6ae5f06d12729ae594d1cae87872da41a10dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56056bc0994f2ab48d82c3cb980dca372
SHA1f0d9fb046bc2839eed45b3adc3820fef638697df
SHA256d58924055e339cc6acfc48fbf877893d1f96ef52b9dbe07a4954bece7ce200f0
SHA5129e920a109f9d1587ce896328ff2b5f59341c4e13ad58f68612a36bfcba5cf3179817447a6c33bc38349faa946f2d241abb6a86ec23ca58546d5290049e014f3d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b