Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
ff835aa7d1695ea9aafeb374b892d80e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff835aa7d1695ea9aafeb374b892d80e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff835aa7d1695ea9aafeb374b892d80e_JaffaCakes118.html
-
Size
23KB
-
MD5
ff835aa7d1695ea9aafeb374b892d80e
-
SHA1
b6deb1f10f7492689653ef4f01d365368e4b7834
-
SHA256
651324a27db1c710855d1587c7652c8d7ede7dedb9c40d45d011288d597e6325
-
SHA512
1ba111153fd617d293986d66003e7ee5facf166311a1fca3d0ca80944a7aed0d5a1a9c3d2ff7f3946f7a10d1efbba450cf9fea6678ddece10a12d7cf2585d9fb
-
SSDEEP
192:uwfib5nvGnQjxn5Q/2nQieNNnTnQOkEntiInQTbnJnQKdjxvMBtqnYnQ7tn0Y+nS:QQ/kOXw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f5ff89beb09715f0995d233fa3c5b290a0f6097cd075e72bad033761f7d8c036000000000e8000000002000020000000ccc131f446e4fa419ac1acace25e795a46410c68666eae87e3a1c2ce96566da420000000143075727263316f63ee174faf323a58e6fab33c037285bc162ac6c6058528e640000000aca4f536a1ff800d402b0ad0204884b6d459d5139369d9d6855c92b97efa2657f02d4d973216e96828a6688c3fbef1314c619309a837c34cf33e9b4a597b8475 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B226521-7EBC-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433815106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a072e80fc912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2740 2920 iexplore.exe 28 PID 2920 wrote to memory of 2740 2920 iexplore.exe 28 PID 2920 wrote to memory of 2740 2920 iexplore.exe 28 PID 2920 wrote to memory of 2740 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff835aa7d1695ea9aafeb374b892d80e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a3f9188549b7803c68295b98bdfb7f
SHA1bcd2295745490cafde85b27a38635795b53ff359
SHA2566454742553b8f9145a1288868f821d82f5ba53140d39ea6605befc3bab1533e7
SHA5124ac457c0bd1c86d9235c3b961d3f71e376d7bc6efe703ad3fe5e0c15ff67a410f826871aed5a50c83872b34dd0de0285d2d3bdd162235dbbd56bd513189b5cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15a5bd81f8ea91ca910fa471d588570
SHA1c0363af8ea1e437a128b0954ec2f2d765b5f9d80
SHA256ae3971ee6e60ee619b1f47e9521ac449eda721d387a367a86f70b3b8e4b85dc7
SHA512d91d92213ce26c01f80aeea1cde88784b93962c33f193a932604b32c169ef8923d0553b2b17be2e89b2eb56ff2201a7e9e53782ee34755fcf78d069a6b7631e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8de8055bdf11362ea51a5eba08b6f3
SHA1c4a3dd76738ffd88049be4d619cc6343eb8fb7d4
SHA256a89c1418bf87fe63b02035bd48339e5e7760f5f38da71dc58dfe858dbc44dcb4
SHA512fe69a461c17b73353d23151ff53f957149610c0617422aee3af98d9d10f0b3ccc7bc95daf26e90e5ea0d3adf9d3a3f723a2333aa2de6db152f6e76bb24be105f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f02f9d03ff4a9eb8b4a1d36df5518f
SHA1fd5b3baed63e4c40e51db0ea6544a66be493a870
SHA256aa8e346677e2794ffd19e4e73d48f4eda25071cd30607366314673f2d9eacb0b
SHA5121cb253ac21834a2c907c3720195cf5266e01319e87e79318c863e7e480abc82b9d13fc7f370c3c3fbc87b49245e6e3b42162d1ddc4c5c53f1a8fa666723aeb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c57c9d3ed4e45c8c50e3c9ceddd4a3
SHA10ac5567afc8661fc6db528f4b8268f681fbf6249
SHA256eeb4010269ff9b8059a8ac8cb7e080a65695eee9087836460ea95367105aaf5e
SHA5129bf34583649c0da49225f46910a50ae781ae2314d0504cc658b5fc24d7117a6411a1d5829ff06fea9e0d5c6c0087ab8561b730725c16596510b88d208cda06ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04a7fab7d7bce04e18e04f1308fe60f
SHA16b469f03803915889404bfc4a1df508fd2fb78a1
SHA256b20f37d3f484ed19f2ca8c5effa6777287ea3ce672fe943d4cc7a5f54cf5535a
SHA5120dbe200b1b99e83e6a883082614536a384e8539e357d2e3a08e8ff4a7b321339951a45924b65cb2a490156349ca005fd6d6e40eeb6caeece8832b92884f4b4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a51badaf3abb0c6738be3d7d7085bf
SHA1e42e0152bb4d340e67f30fae1994a367d8aa5ea6
SHA256c7b88bd621b383045892812a33465a906961fc59031cb5422b49d26e5ba65efd
SHA5121853642d7b4a50c99d749c2a380f6d712b6b4f0a61b0a502c77ac72eba7fac78b8a09323d5c957bae1b97b4329eafd10abab5c03b439dd4f94d8f7c848507440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fabb9d3ed75d908872eb7feba38eab8
SHA1449ad1f17e3f0a316af6d9f7703419e1991618aa
SHA256a50ed3e02d5d3eddea00b277ea7e91c8ffc484d81126864fe897cdab95b96cff
SHA512d2b30a191cf3169b5a2dbba7c4f4bc03dffeee6c0965acbd51d39e01b50afa15534223c4d04f3d16c48c08d3063d7cf514151961d6f25a25a3492e68a2e00cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd413ed38782e2961f400f15bc473c42
SHA17f26809d41ebfd18cfdfd314ec2c1448b5f49f5c
SHA256576e1becad5def5d0c9b0a8bca988f760c4e8f5cb64a448778eaeb28d1e9474f
SHA5121947589360c2ebc374aaf8233c61bfdd7ec74d858b826357b7b317e620e31775413256c2bff941fc79a9ca60eac5822eed011cd593b8ad46291bb41b9005d127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551406bb0ac55e64c804f80b435156c3a
SHA1218d4b367a0f3731c8ce5ebfe32ab5c8ee02851e
SHA2562bb393872231c26655c534d6934b7ab6793c85693d88e7448d6428d2810cadfa
SHA5123671da5c8704746c452cc1fcffcc263394a2de6009def935dcb4124210e51f5d934cbae39b2e03b77d9be827c05f824f97d21b25d885481aed12fccb20602679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590ef85318a38a5deba02ab90ef8f4dd
SHA1bae4a3d89ba92bf0fd5341f1870545b6e87debbc
SHA256006788a193ebd072dde3f0a5af009eafa0c07a4ad421c5f5e9dbc98243ed37e0
SHA5127955bb4f0281dfbbeda45515233b56ad0d127cece1b7b96ce89a033568fab472163c5888c1df0ef2be797d4e5ca7b4a9e7474e00a8902297432825bac44a64fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58793240db050307093fa1cbe8dfc6d27
SHA1582f241ee7fb7a089392fa20f72d82a683827185
SHA256299003bda500b96437686fb3d172c55420999e246377c4a7fc9fb7fe01027842
SHA5122fe30da378ff8b7bf97c17c98fe954737aaff7c4ee8dbf7460e9393c0e7fc0f74a3626642cd1974bf28d7f9bb16372268d286f9ab11f71d2a6a9d16846551f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500bae7f33c75b84cb2022418db28856
SHA1e0cc488c3d576f8653b1f8ee4bcd539b34b9fbb7
SHA2564a8bf4000420a315163cd30fa598fc4d7c1019e3f3b63a49b689968d78625b65
SHA512850d9641d93a948f1aab5a2cad30fbf9a92dfefdae4806895770c1aa445c43c7dd2fba9b3c6cf1e38f3d6ad958daf8b3847a9ffabf039a0c3722ba2c8fad18b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6ecaf2e284ff0956fa8333caa6ae9b
SHA15c1364d008963ed3558849872747593aec19db2a
SHA2561f5321ddb1b9db29ceee8d136c00368d598a2645778d576260bc472554ff74d2
SHA512d8f90eef82fa83d3397dd3cb02cd876addf7a53fceea3e26a23ad0745ea4b627edbf29c852cc2ed373ce7b2ffc03967092e2241ff07262276e6841516b891b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50330b2339b798e0bc548016cac8ac150
SHA1380a9588f37e3226ae683ef84224b6dc895ae89a
SHA2565e9226ae640613947ee92ffe4f1a030235d8772ec15a82fad63eaeba1b9d981a
SHA512761bea83ba1fbc1029dc797bf803423bb45946f9c0a2cb739fa8d22b8ae5877d5775d128b2f36afba7bf2772628f556cb7193f6f62f4b1f03c49d136a3fbb39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ce05aaed3c1f3e12a76e5797e3dd6b
SHA13106bf857a0292af4b95c6883e8c8f7f239ce399
SHA2567715d98c25ace7af15604fd38b953648aaddd5db5ae8690d207f01d5de1da593
SHA51248aeb27082bf56145e2f8b5a67681abb5bb51767297752a5db972059bf0c2b3015c3bf9f9401013ede2cc765ebbacf434a29ad528e22fad4123ed736272ca345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53f6b26cc607e43a51cc8f20e947fb6
SHA104e78daed58f46dcf2770f6a4383514816496f89
SHA256754d25e822b2b32c2d0953b5093735bfd001e0277b1c6b799aea8ea2adb1a1f3
SHA512a609a2984f212b30201397e9dcd9291b761949902101f57d0febec7a3d0bb7c950c5b265112ce48f78833aac2fd2fac6a3655a776d20a67cff6baf8e2443ed5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8054e2fa722db9e4734071793cb5f48
SHA1674690c0103188c7bfe39470646d6d11dd560bd4
SHA256f36b2e7b57d5db8cbfc58315b44a53a279363a1e3eeda29a146d2ac2d86879c3
SHA512f65113340c40ea5480dbe3c07cff27bc5492bdcc842451869886bf2a80261c30398eea47474f9bb28fe8ed874225c6aa1e11ddd01204e5a0e4ef65a1372c4718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579adb77572e05fd56b6117f9b8e48ced
SHA1ff80f87acf59c701ba15e4c46e3afa03bec65d6f
SHA2569517a036b42bda4f7fb7677fd5cbc8dbb443f4ef3cbf2f5e74a1ebb7635e6876
SHA51236313aa2243dd17b8c4778ac1da2258163358291a44b4b840b4db9c04e7af96751a45ca80a106e500894d9ed91e04a707f6b285f2499b9a9028115afc1280aa4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b