Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
fbc7bc7d7fafac22500b85d8117a3471_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbc7bc7d7fafac22500b85d8117a3471_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbc7bc7d7fafac22500b85d8117a3471_JaffaCakes118.html
-
Size
228KB
-
MD5
fbc7bc7d7fafac22500b85d8117a3471
-
SHA1
c6d7507262360e28f7594abc1ca6a4aafb61c0bf
-
SHA256
9ad3417f985416a61e577fc1ecc7f347a1142c4bd82355fee1ea63f6fb2dfd9f
-
SHA512
df3ab2498c83138f80aca450c68c1853b9e5832f266301d2adc7ca66571aa5d7915b98f4f26bd48dcfcfc98f0b91e47aca3ffb7b4fe23c4ee0d70f86fe60e653
-
SSDEEP
3072:SHpyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:SHMsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433669854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0ACEC0B1-7D6A-11EF-B36A-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002d9efb95f0ed9fc49310494d03f1442c357bbaf4a78c8e8b71727e5b2327e9e6000000000e8000000002000020000000ddd65506e0fd8b75837ea246ab4a69338e4daf7d4ee61a38456ac2b2e1e2ecba200000005cebd6385131bea77da26d940f0139e5e0a57c8a44a1192081389fa709a41fd140000000dbf4ac84e26bfd496864b6f2555f41b66ebddd96b11ae81b5d760590eaccbcd10110013e8c07260b4342371f0d5014d75844153d5b955e6968e69a91280ec781 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60da67df7611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2276 1732 iexplore.exe 30 PID 1732 wrote to memory of 2276 1732 iexplore.exe 30 PID 1732 wrote to memory of 2276 1732 iexplore.exe 30 PID 1732 wrote to memory of 2276 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbc7bc7d7fafac22500b85d8117a3471_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831eeeed19c1702cac898e73fecb0bb3
SHA1326ed214c42c9755793aabce963f0d33751fd412
SHA25605ab7d14a3d2c08a1fa2f42ce02fcafab8b077d7fc0b82b4791fd39c74797b1f
SHA512712006c6cd7ac9c9153cf3c9df884c632415ff06b30b5abaa5cc396bf06cceb1faed960cabdda355d05b6d060f521ebc2b49e336e25dca3129d1834beab6a22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab39973548fe05c9e3787faedf6a6302
SHA13fafa56b1626341f296fefa6f6ed95deb88e0633
SHA2565e0aeb45ed0303ba684ee3bf0ee1558cdfbb9e86f12f3cdf476742906940f992
SHA5124e0595139cf78eacfcb3e6a5ef1612ac9e69c2378148cb59f604cd2c547ce2d51a0222a5564ef38eba68fc9596f4a7822771471926e3f300ae2b676974ce2963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b10d0e966e5782ed831be204eb84a04
SHA176aa39bcb509dad232758a4df7b4d0ee7a5c45d9
SHA2567b3377f9522fc792f1a919bbdc2105bb3d934ca1ead5e29c51877205d027a799
SHA512066ff8379bf709ae91ceb91a197d3d34bff53d99d426ffa529120ec3f72787917595d0c7a221ac899d3789f06d5a0769f0b11238fb6eb1bcc5544d07eeb2d0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec98052a3e3a3019534a38aded35c353
SHA120eaa1e630b09b97258f6a69f6ef85299f40c3f3
SHA256342e84a7dbb019609e41aa43690adab62ede0f769600f2fef9920fa059e12a72
SHA512b078f41a10917f6b1ce0f6fa5180956c971bfac48a0d8675bc2f55e07a2d5ef7eb701ed0729820b7a1392b0549e9e414eeaa17442d3886651b61c09398906645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e63bd8715ed3024608e15a01efc1f54
SHA1cc943401fe8a32190945f0d87919d02b3e2c8881
SHA2563b5ab03eb2a1815eacf768b410032159e74bd573e6e776088591ad4bd72e7aa0
SHA5124c989b8c55af95c7ae436eb570355c4ab6904703599e8c84451d69a501dfcc41f5d76592ff87f423f209f86ad9f2f10b80095287dde2d93bfb2b18104ee824fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ee59266bfe61ea8ee9d115899e8659
SHA1481d1b10c16004c9d47d058bba2bfe390e8df989
SHA25653f7866826217bc3e96b57777c1508adc266a1b4a5068b6bbae2a8172c31abae
SHA512b5d5a5d8e21cf8797cb54bb4e942838f1ff0ffbc4655da642243ba47f9a72ed7f6f9ed52927a56835d925fc43b54d696cebb0324c0dae96ba0f071fa3c5f3fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cecaf318424aabc45466021b2eb064b
SHA1861e0ab640ac08aec781a3d45713f9de94b2942d
SHA256776112eb851093680c23e39daee074263aec1a8aaa55c17e0e879e2d132a1a1f
SHA5125f575519e5cd1beda83bb606909090856961c60b9c70f3f5f0d45a7000e005425a0f8a71fe891728ad0ab761f63a0abdc93f6cb7fccf116e2d77e3a5520a4ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe18c4e86088d5c42aa2a0ec3d0d4f2
SHA185e9fc5ed5cb159434f364a1c527ef09031953b1
SHA2565ef4b6cb4a6f92591ecff8d808e91be792396460373004cfd7cd14a14907241e
SHA51238a0319f12bc0cd942df8231efe8edc5d5f918daa90f767ab709613d64709a8982f2cc46b982b56c836aed5781dafd700758b353105d484947586cb28a39d623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916318eae5603aa51c39f529bac69e94
SHA17cc403728df103269b68f36d396523e6579a3999
SHA256eef07757bf46b2dc9fb0aaf503af848498d99562cd77be03712258ae1457f882
SHA5120ec6872c55de628c709cb2b6bd41d7669428debb27988af363e79739c1a68c379c09d7b1415047a35b51a1d39b276d65c9d1c8dec47fec1fdde7afa09406b536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfd3aa8a33514ffdf7886327a676ad8
SHA1863d6b2f1d5b185ad9cf5c151eed0c5eabc423df
SHA2562bd78ecaa5cab1bfa4e940384aca2fb4d645fb0f29ccecb012d43a91f0ff0c79
SHA5123935da6400444b94699adf2a822cd091700fe5935e48c2d5384b2c64a4ed5ad707358e29fd6a88a129eacd3d377dc995acf0eccd3d8854ba25c263c628e94bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799746bf081e945b845fbb6905b7836f
SHA14a51e3de1d0262c01ff2da5e9b09d4b2ce9cfdb0
SHA256466349cb7ced5710a91a77a2c5d85054e64271701ffb9469d7f2a722801583cd
SHA512b183245c87a7ebf356c7ab626cb8c12ccf3e731ddc591229db588b5651182e6e7f30234156cae398722056ab8aaf044fe77628e3feaf46f28bf54b5bc7e894b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ce310475556383bb7e507c8a60e983
SHA1c855e3b8e898ce9b5e8180456a3d6d69d1f5b040
SHA256a1bb8b64ca943e7f62104e026f28aacab22c7254f1b0f9809eddb6b391dfd789
SHA5125881eb2816ef556a4de0e35d16ba47f4a38e977e7ab59f0b961774755fbf754312e44cddb0d7e323c9784fd88eb5ba54149701ca08e7c5053dc0e19a569b7703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a32f36946573d0891563904f669a154
SHA1af273cec33a49c2ea59cd50f08d3bfe015facd00
SHA256453d5c69447a0ec317f9dc30d4cb071a5ec0abe797d7d579a4285ce262d11163
SHA512d57abbb1f57533292113b89bd8fcd03a09876da1378773ef75add6af77a70b74e5e1046f1efc030cb29d94b8ed3198c889504a52097f1f21b786159b0e191382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b6d16ca4df3351cb72e30f3f821544
SHA1fbba4561868b63cfeaca3c6009df1d7f3a35412d
SHA256898a5b132e55e1b11fc696856344e118405bb99338a7e5e2aadf7a14998f5186
SHA512398b57d55583316598e9800b33b22599c074362ab53c4ef00c7b23b35c9e2a605e296d1b77626c1cd92eff840fd79bd5107b7e38f64540b6562d8d9eb0f6f506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0b182ddcf4badc26fb2844b92e406a6
SHA184c9bd0e037618e5cc0ca87a30899865965d80bc
SHA256a203191a63808cfabc6dc979cb005931c7f795c9b4c1ab7a434e6aa85f456861
SHA512d63ed278bcd1d5bebfa9d69c88c176c00546f491c52e9e3cdab54c84d91bc7ce9239e3c848e4f0cbf00022633c9e9800dde099e14137c02b3bd642da00379175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f89030e986ff9f356dfb86ee505981
SHA17357c5cfc6f7c76e60819f226183ef627f129fcb
SHA256ff4bea7e382716145d10a1aad333afc57560312322cf0081f31c793049696500
SHA51292b1c5380a8ab4f37cd6288effacc361878b0dc221172231fa0070ec1a46afe4a102bb78bfbfa0b1a2ad81a30b747bbf519cafd66be44132ba2469c5174a9b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a66eab8022f378162d0db9ab5789af
SHA1d081b30967739b347ca7a43041ff85f3a18e7586
SHA2561b797711e5432967c54987898a8b14b15e33d2b9094bd3aeba0f7b1c6b150b05
SHA512598659bce4f55f0236e029fff9a3c8b7e50aa9d5226ce9cd0f137175336f4eecadc55445499362926833eb3109ce26c5e78811a3518f3e44b163265dd2fc3160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56760b21328e022c037b7e4fdcaf65587
SHA1d6a56f2ca4ebca125069f932c7268639283e02e5
SHA256d518d30fd95881f85bffe8b9a0491c701eb6447e10c64e0885d17cb5b70d45bb
SHA512af051df147038dc309b76af033cac78b31ce398e9a825202f0d9ae517fa4a1b997d8156b164cdedf2e19184099ae29d3a29e5fe7eea29602b7a7e26644df6eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0701dce53d332d4ba273612975704f
SHA1b2841e59db6d19a502935852658c0b23cf8dcef8
SHA256c4a11b3f27d710ad74d83901c8a2c305d5dc71d47e9ecc7c3f0e81f096b038f3
SHA512ee897a154fbb2a20a8a8dac8f57ada17b9d8c4a9d78b12369a147f1baba934963d691a85c60a774304a3a6b959f603670981195c3a2db99c75fa0939750547ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b