Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
eab9ecf77935bd19361275cdb2da7990_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab9ecf77935bd19361275cdb2da7990_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab9ecf77935bd19361275cdb2da7990_JaffaCakes118.html
-
Size
10KB
-
MD5
eab9ecf77935bd19361275cdb2da7990
-
SHA1
c5bab840dac9f29665894d8510d0d6c891a52eab
-
SHA256
791c9f357667ed4fe88deeadc9748e11d36a60bb8f6efc25605b9605bd771670
-
SHA512
cb9cc58d3cecc2e864c5ba3cbcac458b226dfb3bf1039678121f2f1e49f7ab9f9230afc25e52c9f01150bf9a95e71231cbe223273ec490e67efa64b8ebcfd8b0
-
SSDEEP
192:SIwb6LVEQezcuNwSF1BCv84Ffc5it7xNc9rhaoClnl:SIw0EQezLqSF1B484pc5it7SrhaV/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902bd9155a0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{415668A1-764D-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ef24f65d7bf945f1e0139d17edef9533c4513bc37d3e5653e415f86d1baa789a000000000e800000000200002000000080c1cd8d58f1e18359243bcdec40cd0ba0fb0076b3c5d4b5ea497f6f8efa24ae20000000fcb35c78d8ef6a8f5c3239bbc3fd3463dcf1db50a28ef71339b7fe7bd6f79f2040000000e73f8150161825b360e2d519efc7532310fd11554af1e88ec519e08ad5a354b660dabe9fdbcf00d898e32e5fac3c78166476ec4e8f26c30718a2f6a4dc1a94e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab9ecf77935bd19361275cdb2da7990_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae4eb4e9f280d58523d92b45a652463
SHA1004f44875aac4a8fbdce4963b45bf8492c438fdf
SHA2563b5d75faac54c4dfb6b96f1a6e3daa6b9abe94f7c037ab6b41cfd2a5d3af4556
SHA512e542326e5404625fbf67cab0576ee127dc2daeb43e89d1fbbabc34edf282e8f921ab9ff44f4dbff5413c2422c683855ba845e7241029096b370a051e21512455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6c25d5c7437f0a1fe1d7b0b84d2f33
SHA14ee28de2d38447dedc93674378531a93e0b8c7a8
SHA25667b5040294e96725d7bb36e26741910690f107313b46a6421d8c590c4f468838
SHA512ac8ea97ea674c62ba3929dbc7722c313bcb946f0b3c89e1986a7af1c9ce68d1a55befa036be3deb5ba357559d5421990fed295afd68b35a90f5e9fafd8704d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda88eed946f1e0f811dbb81f543dc8f
SHA1ee5936c489919a2fe5d4965f501128973f0a60e2
SHA256d1f0a4b23092b0ae31f6d23300d32a0afc7d2c4589f713ca1e9ee74157f43c96
SHA512b4c2eedb346ac1957d87c36d30f42da5b59d1a6d3d2dbf9b75186697a6f8f766b6deda30fe7ce792a93b09fcecea594b60cc9487c3d285b3527a07465b5463c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1dd7c2ccfc7fd520848ea6c6cdd5d9
SHA11243cdfae157f6dd879919fc653055cf446bd784
SHA2568df46662b4937a482a5ac8edb92bb82634e56ad7e8c929c195420f042d21ee10
SHA5122509f86d93498b3c38b3f96fd6cd0a5c65384bab3d4322ffc1ffe779f90de1b8423922005b040ac8c7dac6756abda982741a353d694bc44108544a07200da7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd4df2ab9d626ea20306d0f59b10d3eb
SHA137339f9922eb924811e7b95370ad5a18618b1d10
SHA25620908321acd45d380725e67088fea42d0ab8d5a335c30f4eb6269fcea3dc0104
SHA512a93a13ed35cdb41d97ec9b07e265fc079e90a098d94282d25a5dd13d1f1211091dac806636c4a0fb9d5f1a40021450952a5b4d0893178a5804dedd859f4db6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1661b343009f6cd070c2b201add10b8
SHA16dec454eb050a04e100b0fb285f95ff602c483c6
SHA2561ac510b144daa771fa584425ad90a36b487a9e0daffe55f038d3bd7d3b9eedc8
SHA512ccdbe114e46c957da82258d8b90860ee1440402e46023f157ba34de7f30862344e7748c40a0c46f5bc94f16ab8a698008e7b8b725a597693d83bdf33f9c2f1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f8807a4c62031a17ddfa48978d80fe
SHA1fc18de999db44f74abd9c6ead8855941847a05d5
SHA256043a80b62d06cbe5c8e62edae4301c8cd6892867eaec23d2bff8fce575bd4b35
SHA5126eb049dfd39cb477dc47ffe40c99bf426aedc675714906e1f9330b0093df5436f7a266285201748dd1d2016043beee0e7744bbd171db87cc81d0b6e8d3069ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e2431703d7173c5e888b4cdb70cc51
SHA1ff9dd1adf9c365729d95db33a2c09d3352b0d0b2
SHA256119d3b45a52f983f582d3bec0cf87f06e120cdc8094f2f7a48af60499f8437e5
SHA5124a8a1a6eb2137f7466e3a9a0999903274ea098949bf0ebfd8a3f10910342272f26c377e8870262578115449008a6f5355af96d719e0410dc499252af47ff1790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3860de90766005afa1ff2015450743
SHA17f73489553fcec2ac7f49ffaf830868a3f3b331e
SHA25611d08278d17f1f4b60efd9db28a8c9b00473d8732a82c6e372e9442390a22d4a
SHA512caf9c19aa51e45fc5a37211c8f665550629850c97b9f87f7a6ee919dfb871fdbec4abdcbce7873b9c582afd2d9434732ed467f1b638cda314b85180ddca9e79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968daf6b8ecd3850ec5275a92032fd73
SHA188bfb7534bbc8c5e9bf65904ccee65aafc9661f8
SHA25619c4c84a6b338b8f35a38936b72f36c445fea40e128c4962ee9d0baeeb843f4c
SHA5124d96f09d4f7b778972c89677cb483b68a29388bd29ba25b354c0bf31d8853bf2f7d447b28bd87664e1001ae3eca0814fcadfc92a0072d5fa11a6ca639cbd0ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019285379143ad3369a0f360091fb840
SHA1f9f38681a53306fa0e3648dc8261bd45d21c8207
SHA2569a9265841cc0e00a8c93cd38e0daf43be37da415c92d1352b249f3e8be117549
SHA512dad31b0a0528e4b32cb4b6cd7585c29b542dc9912aefd1cc8b245865f4554ae3b2971376e2d64c8f7413e5161533a64598d72427c1bd1ee09bdf74449239d053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1db54096f06459e22b0acce0b696404
SHA18a29fc92f9ed4d71ce0f3d0513942fa4844e1e2f
SHA256cd248fbe8558675a078153cdeeb5bdb61f5ddcb57f2a18706271386b452362aa
SHA512fbaa4354957a68612c6c33ea299e89b24f5062209c0d986fb2e01f464c5124e397d34d5fb70125c39e283dde30f7cb6504545f51efc1a4e916b98af61822b315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9edad56918c688aac1fdeae1c531de
SHA14911f08e81b54fcb2e05362ddd50bab573d35a93
SHA256d0f4692231d33b9683e367a131438d87946f525df70a15996bbfeaeb8b7d8a3c
SHA512fed69c8d14eb5a47cf2032bc3bb90c0a842a6519012a0f208e4b520bbf6e0fe4ba25289dae09a20c17c1890712b467ec6b418f11eddc3f9418b063c44a9c5396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a9a695cbe30dda4784016be2d33b22
SHA1e31a627593f1febd330cc4e25fca082d73564ed7
SHA256b09690c01d27de7ae07db3f5a381ff7e5305a0ce86cfaebadb25fc8df3635cac
SHA5122b06b1d31a581e1ec3e2d5f251bef15784d694fb615ab78e1f1dbce4c27f99f1fa8933273b2edda3249174125cff5e97bfc5ff540bda2330954c3a76ae9ef15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa95ed17ef1f4927cc2059d6456b37d1
SHA13a72710591e2852b5abad0f8f7919f2a2e967a4a
SHA256c196549ef942ba79894239e7239286b0f4608d5600536e083c1bfc4b605acfec
SHA5120724767ab72a2802dbf1b962d9d7331c0c1df69be91cc44dc5b8c1efd63eb0b9079a68d1e1af9543426c65af42d2ce2c8b99e1b8ebf27f448a9685e9395f719e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586baf28fe70da5bbc8028c4790f74a34
SHA117a3201a8a4d1975ff248fc97c389a3f96d56046
SHA256fead21f01932d2e94df623139c7f9263f4aa7fe171f70b8068dc3edb16e60f96
SHA51261950d2fc2dca3ebeb3aca368ba477117d2a47a9c2f77a157703004368e66bfa975c13457e6f9585c39d481a08940a2decd98506cb427ed4b47e632c6c71bfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baac5dfea1b9c7dd918f3dd4b3047ce0
SHA133439f80354b63792a9ee8a2b8c8351ace4eeda8
SHA2566d3c6f78694f76a42944ec7ae14f07fad7f2348a8f9a7d296c3cc91df9cb7be0
SHA5125133ba8a4a1a7878f41b66c213e60cb6780630390a7ed2f37063d83effba83136ea9ead62e2590f3fa80fe06d7fd39bf70dabe735bb8f15301d8f5f5ff67f195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c037e5b68ec6a447dcde7d6cc8e255
SHA18699fca17e05fef3ad35d19d1cce066ecf9b2e27
SHA256ccc080d99b20b437f20b66acf48d1b2c1aee4e4ae16490fe9cf5e4b68dffc204
SHA5129b6f32eb06df3e81aae2d12c24a1f5335d4f4247034a265011cb5b9287b40c10d062919631da0efd6f214eb86de3295721ae7ebb2ee99a3863f0e8521c5298b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c1675afa6f9ff378e85dde916e3b87
SHA1d94f503f9bb11b8aca0ce9972c31d7188e764c8d
SHA2567058ab802704271ec3680439597f8a1a18d2c610d3e8a13f62d69e18d3656cb0
SHA512a02eefec458467e8f6135f20202126df71c4fa9f0da7075144f33cc773424b9bb201db617c59ccf09d559c66eefd67bc142c1a4673a53baf8f901204212b3bf3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b