Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
fbef3cfb6268ce2ee9101acc93243658_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbef3cfb6268ce2ee9101acc93243658_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbef3cfb6268ce2ee9101acc93243658_JaffaCakes118.html
-
Size
133KB
-
MD5
fbef3cfb6268ce2ee9101acc93243658
-
SHA1
042d9d6001f7cb748208408c6fcd81a8a63f516d
-
SHA256
985435e5e7b178dc93e4cfbfea282942deb9671819fd843866aa6d96626191a0
-
SHA512
5966394fcdca0b4413aec5c5c49c5738c24c22ad33d515d437658f8bf92dd6b4343112a529a50c4b8a04526210ff2cd83079c95bfb7cd4be60f87cfa262348f5
-
SSDEEP
1536:ShmyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:SMyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1011bed68311db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fe8692636b6562d7adb0055dd5f52f5d884498b47b2f35c22b4165bdd09ca89e000000000e8000000002000020000000808ba8e9f55d583aa6cddf40fde863ca08be2118e3e69d531e755e0e90cb6c7b20000000f6e4b0a30bab4fb673ab6b0271a2bee42102a05b586c63b2098054255cbecb7d40000000b00d563610764acd8e356a2356c7f81b134caa8ddb40916903717196eecf19cc88407ebe031f4a85630dbe615b8a40c121a6cb0855528cc239a6faad712cb6a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0231EFB1-7D77-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433675423" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3060 2588 iexplore.exe 30 PID 2588 wrote to memory of 3060 2588 iexplore.exe 30 PID 2588 wrote to memory of 3060 2588 iexplore.exe 30 PID 2588 wrote to memory of 3060 2588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbef3cfb6268ce2ee9101acc93243658_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc5dbc83caf753638856daad68bdb2f
SHA141fb72db9f09ebf4e6d1f07bf67a4231f7189c0c
SHA2562c4160c669521c3a9976056730218a13a42088ec99991c648af7c1236b721918
SHA512eb7dd82e34e5d16317cc950e9caeaa7aede0a7beb80318b7339dcae7798d1a189ae11ff588301600ea41e1194312e56e9f9f1e37ad6583b948c717924d27ee8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52579e7cb49dd2a288842ba1878365ab1
SHA107e02a2fbde765d41c64fdd6a4303462f3aff0e1
SHA2561398425366706a49e19756b714c676ba061359cb1099092cbeae2b6c8c754b31
SHA5123afc525406362a4852cbd70d6f1be8a009e212085e83096c0474ca817dd093d6f43fe231370a1f5bea8fb93eb4fb5fd49bfd379760e3650426375e52cda1df15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a5132488aa567bf63d384bcd549ca5
SHA19bdbb75108f139bc6c682b5609d2f20cf5922213
SHA256d79dce47961974b0fbf37a2311ad8a247feaf6a81675a7c79f63601a6a359eb0
SHA5122701259e91b384dfc3c894c48b2711501c0a5d792ef1d3c1a13e35b7e7e749a60de04e88b60e8d2da2c27027b5291d2045ca8b8cfe669238f26e288e2baaf9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d336d86d058694e49c0bfb2b8f7386d
SHA129246f677a7261e0053f9ca0b5eabf9bdd08ef35
SHA25695212025c09d972f026f218c4ecbbbe9bf8ee40e6f78c3a76e08a993feb507c1
SHA51227f060096900ed245713e6e7a964ef31449b1a3c6d8ef76bdcebc136cfb0befebbfb54827f763315a22aabe7ccd1e2e725494196d699ade6f8a43e98140effd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632caab1ccd8148b348ee63b6ee53177
SHA180210e66352c0e07cd058cac5a98a2a748aa5236
SHA2568b31c82a3f2de35dacf484045e02b5897a05ecb49b998f766e5eadec1f5d23ca
SHA51235e7254f9fa9eb6bec021866345c08e12b93e38f9c5ac4599cce876af4b9cbb5505f20518e0ceabfaf32e5a6fa06c180ba08517375b6dff9754ddb42293c5ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51801b27cb2af4c3b6e7e3033135fa70a
SHA15a12c32d41c92e5c178359ec36d07da50f7582ec
SHA256f97e4f0b5b600a19921f5d8df3ade62ab2deab8fdd6ff926fa9d248d96ea1be9
SHA5124a22d2c7bf08141924e8b85f4b2a6eb5588dd1373059e9dfba1e9e00710ca325327f42927e53c0998d492eb657e0d00e009dbca93cda7dc43f34921a74249cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a595a162794c519f275c4fabccfb1952
SHA178bbf9b3f069abe5c4d5077d39a376d874dbe017
SHA2563b7d963b6e01e9e01e5d826b75f6bae6d719a7f98ead73ea759cdc1b556bc349
SHA512da5e4b59c58008105504cf0beda80cd8023695e323d09c59671560b6d0b699d756acdbc7bada6dd09bc64acb45d236f1a0efd424e5471256a96457db3fffb3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554eb0a4d0474940402de9bae80f0adb6
SHA1328f02c8eef5cb411c1a699c91be93a4bf18e37b
SHA256484803881f0705359c598be4befdec40debf300b2af4fb58116171084b993fe4
SHA512080490f2da959e04329cbf8b38361e1204c685b0ed24312dec52a8c3849017670479f704377f37cae67329aa6939f8973adb03cec552a58a0aaa50d884e102dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9e42458c758c9c87237a221154836f
SHA1b61da13f0ac602854a34ccf35c52dbd45b0ebbda
SHA2564faa52ded6f7ab7e0bbf9198542b20b290f17a4208cc97ee94dd3d923974b6de
SHA512cf5a7745b08733353aaf51b989532c3961cb629f5e1eea86330d50f0457f0f5f085ccc99d83ff094b2bdc147c6e562fa5832c7bb84960274dd38df53f6ef64f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe241984cfb235b18c92a18c98deb6bc
SHA178fea0fef851f8150cb515e930b90f5a015313f3
SHA256f90af198b5b7d3784cf262ecec3f2770e450b51cba9453dd3e34644a89e6793c
SHA5124fb2be7d72dc760aac15b31d821bbe666944c3526817f8580d63d7dbd1c65265f36e480ea853fc90810741684778c99bcf4fbeab84bbe4967a05af22c0d27281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544beac64dd40f827756a7070b762ee14
SHA1abff967a8682c63f492b891b23a3e73d899fefc0
SHA2568b1ade0220406ae7acebcfe4f805d5f9a4b927e7980139b91165c6d0d99cee9c
SHA512f5217c9d31eb27d6a79e1e0074f66198eeb27260efb370d2150ff7835fd098fff2ebf76366b40c3bca3f1cff00fb4eb7bcfd4dafe5ab163bb0a112beb40d85a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4b5de1db5dd5b426e3484b3742dfc0
SHA1919ea095adfc08a5fb33f87273b6c16251a1bed8
SHA2560ec04801f95f6180251ceaf7ea959e150bd3344d406e6b876418a727151f8412
SHA512d5d83e4d4a3e51272087181961f1870250ecde067d3d674b0af23882176d29a40aebf03b3379aebdd92d599279b62646653751732485e0b7c38c1ac84e3e817f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566782de9fb3695bbc0b99c0528d35317
SHA153551e00fb8d305599ad20261a022c690a1d2a40
SHA256e5c1cf902aa39c6a95d78e9c8526b8d602c0b08e2d8e9f1c5a55651145117dde
SHA512987bd8d1e4af8b4450fb5621628246fc281bb399cbd0cd877359bafc8bd7a11b5a2df00fef36068411d9b4b4de97f3d29c97ec853e5cce3e3ff220ab65f04bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36ce15b5239b2a3759b2defb20dc029
SHA17b7ef1ac37bb6af84657532911bb2b7f1da55856
SHA2564b61dc8d60e352a8cf3119b32fa871d14785a572359e4965e7e8665393f034ca
SHA512d28944dafef84552b65515d443a567d8ec37998912abaa08e19a747e61bd877950b8114e009b6ef2d2d55c087a237caaab68e769bf56bfa33154415c1dd38d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beecbce093e3c459b843f85adab74c79
SHA1dd0c78ab754378d5ffa6a663cda4b8f2e4bd6814
SHA256a5c15033e0a92f98beec294c70fc755ebe51d9bc0c3de1dae5167ff6ab95d543
SHA5126df0f7f149a3464f76e4b936344d11c9d6509daa1ea4c9acc1acec74d393e4a65639595b128ac60e56bca18f35b4ed16928e44447404cba5e979024bad924c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342840306e463d12baa020e8590243ef
SHA191a12c9c9df98a30a8e7c1f851f38369647d981f
SHA25636304c6ca81f453bae99194a3a1e28a32e3ca319406aafdffe29630486b907df
SHA512dbcec60e5c9ce6bd89e3dc333472dd72930718963318f367c3c16f123839176a5d146a9cf7e6927c3deb4fc6257cd49d02f67f6fc0436756b65aabd93bbe9748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceda259bccdc2f54b5ff6ae99abd0441
SHA1ca72f0a46302747b3c0eb7a729e1192cfbaffc71
SHA256077029cc74c024b4204ad9501dac1ae101dcba54e8e6088ad0ed7ec6fcb8334f
SHA512caff2bde6271a32fb7c360ab3a5b67dc0022b3cb3b25f12b63d8dce9266aac53a9456c441961b9149c29572d2059699f876f38fefbb19f6d3804b9490e9c53cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff669ad9c2df72d21c186e8f89527e8d
SHA19e69900a5ec5ccc0d395636dcf7f824c0d1e69be
SHA2560a5844a3db14425697380a2f7c0f3cd267078c0510b59cf66b15ec43991b82e1
SHA51228bbbfdf4cd47b650de4dc7ea418921f9c5261dc7cf9c70ed300c75890aeb938741b7ac88de1876ea4baf958bb8edeecb5306749f1e503cf2784afe318720c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76b3f28b32fd67fc337d6bf3d95925d
SHA1a1b6e6191c42e70a5232a0e6bf1bae28608d1f40
SHA25686eb76145d99bb396ca5adf0f7f1caa74b1ac9aa84b6d6402e6114a61a4b7ee0
SHA5121a82f4826c672555b86d39600d449f53cca327c80ed2d846df183553d4113a00d72f23da190a205aaf4ba64466c2ba0c0478691c6b66d07be70d4a1e50a8214c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b