Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
f9cf699811b0217e36487cea16bb2414_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9cf699811b0217e36487cea16bb2414_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9cf699811b0217e36487cea16bb2414_JaffaCakes118.html
-
Size
138KB
-
MD5
f9cf699811b0217e36487cea16bb2414
-
SHA1
b2488702c2138aea9ee85397f50cf61de7f30e19
-
SHA256
6fd31f22caba6a4aa4f01fd4df7aafb4e7cad8de4e1ab1a223a5939f3c779226
-
SHA512
80c8589e2e06ec52a661207b155ac286e0451c940c0d1c23225713e8957edc71f3b275e786895da3c88e199e7c328870a9f9a8b4cd009621c29964c60b21bab0
-
SSDEEP
1536:SIVaJ4alGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SI9hyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03D273C1-7C92-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433577072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000659785db336fd15de6b2aec8cb157e3f80291dda0e48a81e96cc14ed10926ad3000000000e8000000002000020000000e5125a28c817ca5bcc52b9f706a1236405bbfba6b929a81da63fe417ce627429200000008f564cfc77bc51f8387fab70964c3ea0baef862d0129d408cf0707c55fe5065f40000000b0b89e890efc1c7fb2861459b9343a0450b4c80ba6995d2f9946a8144fba565d973f28dd6a4d732a24bfc857ff2fc00fdcf7419531a2ae75fc605ab2fd3e6fc7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ce1d199f10db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2760 2364 iexplore.exe 30 PID 2364 wrote to memory of 2760 2364 iexplore.exe 30 PID 2364 wrote to memory of 2760 2364 iexplore.exe 30 PID 2364 wrote to memory of 2760 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9cf699811b0217e36487cea16bb2414_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b52c296cf377212569464830cd88ba
SHA11982a8b4b223a38d8f20ee36a96e8fb90a6061b1
SHA2569af49aa44b8af9937ad5a1ce51801044728ec1f0254830f3e3736472efc9f467
SHA51270687f8a843aeb42ea91f1f49046508998341a6729ec8923e0f8ed4dc4859360050f58d0b726e59b8f239e4c008265f0ba31703034e9dbb2d07e0347cb911c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd55701bab346a3fe1498183a481000b
SHA1518b25050e8e54477a78d524d22c64a55f86dea0
SHA2564b50fa543c48bf59b1d5debb8392c0ae954ebec584630a46f4d78a4bdcd43856
SHA51296a26e6c1325c5f49a87612f09230143ee78f2a39ef890f5b9aa2a9a9b2225b8d9f32a154f68193edb9859570a8547f18b656c0033c21329a618384182ca7d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537641c93a7a90a530995b215492db8ef
SHA138e22d93b52a20f33ba3e334afc0cb603f78cd14
SHA25628ef0df82d36b2b135c446d42e219c2404184104e62a59a162b89daede4a8019
SHA512e86873ee085327cbeada0141eb41210139e4b3224629792c919ec3d6095a26cb75179c410ab8eece048ab0ece685d91c55c33c3067a78863df4d172b7b6063dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25567151e2c01e62b03fdab91cb98cf
SHA16e6be5d52ccecc417e1a98c6ce5c637dbe5c368f
SHA2561590d11c55515e678055fa774894bdc499a0870d4a0a65e0eca4904abe46a731
SHA512029bb55fde641cbf87e86133374a3d01b0377065ffa5c4f7425776d855a1a7b82f536f89e87615a29de9b772183c988cdd98c912a55671f001de17ec2632e037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57433f278ad4311a319cf8e5289203d98
SHA13333e5726f1f6a82d416974d4fa89629e91a6679
SHA2562383f7ebc2e386ec065593c7490a37241e8183483044fc287ae4e8f48c0dc0f6
SHA5127a1eeee11a9a13d0979ffe29246d0b325d8bfc9dd906bf2aa6c58030ed49ccd1b0135fbb76a7e013ba100ad3d020bfeeb52e0c685918911939bff7a8d5a923b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa76645c6b658c5ae615ef5fa9a8c9e
SHA1aa857da9fc315c4f0250936ac68be3a3d75a7764
SHA256ecaa5f2b18913e2496d5bd168a143b85d93b8b1b47e6a84d59d360ab8c7a618d
SHA512605a5e91d0d01b21d44daa26cfeb05ed54a45626dee71123156cc723c5e189f4114bad9fa5efbc3d7ab83b03a62b0bdadc9f08ee43dc5262c05938c62f40d164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1a733493c4ae809dd338698347a347
SHA1acd66621467a1729b5c4ab73f1641c90c096b3c1
SHA25673d36cf924e46dc5588da2f85f759c850269e0127d575cf26288844d3e47fb4e
SHA512ec18fe90d88936a0f58c3522582f14a7585eedea2ea261d47f255bc3f93a0c9c3a031cb1662978facdbe63d1e3de5f401eaec6cbc8b4ca94e9fcd88e27ceb6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de3ab9030769711e10123a0b519c967
SHA1df1a9c2548d886cceaf57928494b22e22eb870df
SHA256d705e9290af3d224f827a077a5173e96edccdb657c6ff2c3bde184956a13d2b5
SHA51242c67ee4df8eeec4b2c128ae16bd348a688e419233d701a5ba105e99f63b2056f786e87793371f993cdfb8473aad15a2f46dbe8f8496ecbf037a76edd608c2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a2cc9b88772c5b2f0014565cfb3559
SHA15c72709ae550127589f688fd7aa6c875d05dd9b7
SHA256ad203a446b2fc8a52292eaa5901e4faa644f615a4947c277612c5c1a633707e8
SHA5120b71e7d42c73749c317a5a608bfdaf7ebb6310d563e88c7f0e462a57f134b6563fa5ba3e77d739b6f28959fe33aaa258201c552ed8155bf408c06bb22f88fa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648c6455d56d90ef3f55744222d4134e
SHA1f7d029d68e4b3b4a903d6ebc92cc8eb311b436bc
SHA256395653798834bc9892c7fcdf044ba8f6968ef75cbb69fb18649711664b24a882
SHA5120df1b1ba2771feba86ea5c4a1cd347c451f4915dbdd4eb42bef9467efd7f59a420ca23d645255ccc48771f871e1fd433e06b6177787e2ee48899478c5ff7bc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb96299ed3f8bbfb94806b7473121bc7
SHA1efd8d2720815713dec0c6c14754a51e65da42e55
SHA256d94c43ab39e994ece7a351476b54e1b153c8360e0c3bc2c680f6d719a41bc06b
SHA512a6db21a7e6761f5a8f51dff7b5ce5f3e2cc98b3d5c0b9c73138170304912d5aff59dee7887c9a38f03ed653111667832f4381445c991f4e0e5a3cdafb521a726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a8dab9771a2b91441a6e3b096d78174
SHA1f36ac4f59aa9c1fb2e0675142733b709ba02e823
SHA256a0424db7e1579e7e4af9bff17f3eca22f785490102c7a1e3bc6a253e9324e46b
SHA51275e1349d72ffec1ea2be4002c23f5153ef1cfd1d9fdc8390195489f19a3c42b3165eba8585b21b9cd198819a0a9bd1fa15e41d1da87fc81c0ac7c110bb7bb9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478b80cb525ee47c2ae6725446033d81
SHA1dc9edf31faeb96a796a4251f135d7b2e147b1bb1
SHA256637071c97bb71386e937d15958203fdd062e6522042b117d10946c66f8462bf8
SHA512ebd05c04872bded15af99003b4714c38f6a566930487d2ad7fe18734e7838c3cf42af6064dc748a12b01b41ddbcd55c131d15bcdbc789139a1ca054888da4514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4edb16c673f121c7132863a1893525b
SHA149eff7c86b5056d942e91b8c97d88f58cbc4298b
SHA256d33e0cca6b8f136d39f96d8314831ef978e615306ea69bdb1a81ac425a090e82
SHA5125e40d086422a43d695dce4e6822cd03629e76869e691eaccbf516fbda00c24a79c7b5bfddcaf8f51efe596ada89cb0f91211eadf6e31b272f8c44994d1d77a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56184a84a0332e3709e72f1dca31add38
SHA1128c88e254eed686a86e763582e5106a2f742802
SHA256d3cba2e332fc16690ef714f8d330410799b6463c4759b61b44d6a87ac13f8caa
SHA512ebdf07ac758576dd8421436d0e3f1b7b225db76bce9f9886cc881a4f73ab96d29dad59f064299d1a8220a095328a8cb957046e30bf19b8bde594e487f3f1392a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ce186df6b091edbc416f235c3c92b8
SHA1598edee6f1756443383fcfae8c4f7ed9f8f3bebb
SHA2565f88133ea54f2fe104c5af0dda9c0722b97e2ae356819bab5f64ef43ffcb87f2
SHA5126ee6d97d98d01648f445051d8573d1649790dd2ad8d34f493e64c5861236dc11b6d106402f40fc53ec3281bf48419a0500c16e993e9bd2169cd9b1417ec4e9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd728429a0a3537ce847d1cf26fbc9cd
SHA1d947921a883553141202ee0cefadd543f6a2d52b
SHA25613fc302d7ccf11e6cc37819c19a75d693221fcd84e2e4c196d3118b497ef46e1
SHA512f4123430ee8b66f74705e3d218067fcea781605d6af9398d1bf8521f5b0691d06ded50ed2b94e5d916dcc70cf173a3e92ba25b3aff693696f905a2586efe5145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6f8bdad9efe4feb2986bb40de38fc7
SHA1a3e2b7f1119253d43eefdd234d8ac7462fff316f
SHA256740dc316edd32bc3637b7e04164964b98a430eb2362ddd0017645df5cafb46ef
SHA512be1180184576e4c8f836aed653ef25c782e22d25f5bd5a6baa783694f5f1747529ea79d8801652d93233e58924dfd0e62905b36bbfd870b2453e1ee2891e0ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5c5918dea7d939182fccc82c9ae653
SHA11e2b321e535feb503cb6288fa7f44faab9f7c3bf
SHA256a38b03770bdb98cbd7cd154b0af058b5639167c53110a7b149689c08f1655e7c
SHA5122f8db7bea7fa27232b21d88647c3e6ba31298d5d9b60ddedbb40db150e6e611847e552fd5bc54c4823ad06bf0af8e49c1df7d657fa975545e5b4f03acee3c8e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b