Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
0ba7e4d77923f8bca58fcda49b3efc1c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ba7e4d77923f8bca58fcda49b3efc1c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ba7e4d77923f8bca58fcda49b3efc1c_JaffaCakes118.html
-
Size
26KB
-
MD5
0ba7e4d77923f8bca58fcda49b3efc1c
-
SHA1
abd09bd676b53d6e57af0147dc2a78a19ca0517a
-
SHA256
c9f16be0fd4d699c3ee720809d0b65b5dd582c2c8d6b807f8f4d1dfd41039333
-
SHA512
e40fc2e724aade97cf831e20fc48c98b077a9ccfca4c7870c1cd5e28a73da5600c3307f7208e06b6b825f9a6fbbbea6143a1f65f54dae87f3f9ff1ca085d6b73
-
SSDEEP
192:uqPff/b5n9WnQjxn5Q/MnQienNnjnQOkEnt0CnQTbnhnQ7CJVevo7Nt2Fo+NzQ44:n7Q/1ygcBpxv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD9E08E1-80DE-11EF-8B78-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408dcfa3eb14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e567ad6f33b409276b3bba814dedf6eec4d8345f3f268c6b6ff66a06ccb1c6e5000000000e8000000002000020000000a4256adec708f5cb11137188caa2600319815d4375f2c2dab1c62b63943bae9420000000ec787e76e5e0fa99c14a71766cd56df3f822820d6f6e7eb47bcf3cdb30a9f3dc40000000c2e9848a2c9a5fc168491f9f0ea8af309c67ff5d227c719bf5d46ea8429586fa1a1c6567a974b88ff745f303a0188de719cb2a7f5a981fbf5d240ecb4e09fd8d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434049857" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2488 2460 iexplore.exe 31 PID 2460 wrote to memory of 2488 2460 iexplore.exe 31 PID 2460 wrote to memory of 2488 2460 iexplore.exe 31 PID 2460 wrote to memory of 2488 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ba7e4d77923f8bca58fcda49b3efc1c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28df7c0a68e42d640300b662734bded
SHA10ff2d441cc2f045c2d3967cd73ab5306738633f7
SHA2569d701884b50aee099352cbea2d31777b879a4167cf0250f76c3fd247342c2965
SHA512f41b9eb7aaebec649619f0f4a17f1d7050e0d0df160acf2579f199550fefd4a94c3a1ac81543770126053cd6dc2d6293dc161dedd77e494f1225550c5b6b1784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d74c2461678699ea10fa68bb1ec4f19
SHA1cd948523901a1f170680ab9c67b9f1758b9a343b
SHA256d11183b2ce53615169277ca2d28fb1c0e043aa6548710a80eaddef4805e69d9e
SHA51287a0680728a092c45130455e9c9455c564e6f7252ad87e1d5e3134da7e7da16cf924131da9629c1417bbbb79fce0b102ba01189a6d0870c328e11c7b729ba2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489334b138d1ffacb3941b75b3b455c6
SHA1cd0b5f4566afbfb6db24ff945943a65a80758276
SHA25665b0ea4a851662a325e8e87e3604e4ceaa1de8bf4288f066ab85ae0189a2a485
SHA512646d5282628a13f0de084693452f643e53bd2126170b0765a6f9e78c659505e5d2d4fc39fdb82790099bf8187aa7c8f0963017515b052ae13ff54d210acf6249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a84adf9948bdb3d6d582ee7b9813ce3
SHA19d054c35f989d50cc6b9803375a2c639ce78f3c1
SHA256340c16a8b802fb4a44303be820e6a4530ad04683631e5e11037ff9d03b18f236
SHA5123040e169c575c7ec12926041db0160003e2360ed9b95bba11a20edaeaf74fb980dd25556a73f61474266cd1c62dabaf5f17f326e8cbda14db28fb8ca4263c69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e27fa908891a64656dc7a357dc048f
SHA1b44536ed1f39202a1f614dcfe3b53cc991224ab3
SHA25652e3c2b6c1521e09569bc482dfedd245f5da1a7eba5efc968b9dd9942b1c76cd
SHA512cce77a7d8fbf714d5d12f4493ddfeaf567eef742cc5fbc2e0b0cc9fc5adc09d90c9d081b7f886d7143bd7f7b85cfa782394c7e07253859a8111d5c6a913aca94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1a12bf47d38368799f526486ccb220
SHA16055f1d8d9d540f3452a1cd7a1af12a294bef1c5
SHA2568580a2df91756e39210dfdbbceb6ee03704414c1ae9e849147e6112bbff5ffde
SHA51263dd5e897af0b1df0dc9c8a4645b6efbeafa1f6990ba456cd92dd2350b096b1a0135f132aa2eb9bb046e84f14f26adde3ed7df6417fcdce397679923272a0370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140097809283a8dd36d9dbe7842be24a
SHA1dc13bc7a15b2d32fb8761491a057ce656a98991d
SHA2567e4fc72d770656aa3ee97a626a333bdfdd245beb0fc3c3991798d9cb592d403a
SHA512e9eccfaa92382769a8d6fd412c936b5816fb996c8efabfe459d43c07d89b22491c2b67df6385a679996fe96963f2b78ba7c3fbacbfa0290a8f934b0a3be128d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b52b64386f674011e16255b17d9e860
SHA1bf48339e0e093e99c1811c8b365e7c1cf6bf81a5
SHA2564f71a0691a9b8fe998208a6b715ec7a7689a15d4bd9d51d9f1b560073a89fa73
SHA512841ff6da330fd94d102990e5c662c08a184d38e7d4afb770aaba4df2b9fb2f07f073d9edc360513dd403ae082dedf628d24976c6964afa7c64d5343928d09167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59173dc2cb2d6a041a6a707e444b0f02d
SHA15d028376346d5449e73c741d374d7c7f00db8560
SHA2560310ad589fcd87ad42fdc957b16220d0395cbcca84ab08252151979d3aeb893a
SHA5125541edc07daba991a13c48f9bac893148cc016c8a30b74915a2131dd2dd51da0da1da0c3d3c0ea120f9bc2e170a020c6a2b95c1d312b83b5219561d2635d3ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7da5a0bf53e1bed18ecda193f29ca9e
SHA194ee747b2ddfec69d547f4027c5fe34d545736ce
SHA25622f936e2c128809438a27964ef6a228da0ae53ade0f892507287696231d62bea
SHA5123d1557d2301f4b0d62ff34292bc424a5416b0721d4e97477031345f723c744e1d222ca125e54ef732f87761b529c28c005d3afe16cb32d144e82de567e8a7a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb0c3d95c8ad9eef2c6fb4cd1c51d00
SHA1b913f2d087cf1b11e5f3750c841a204a720c15e3
SHA2564aa0acf75e55128414cd46ec2c1e4a414ac6e4174f928610b9b1d3647f8fbd59
SHA5126b03f4c243faf09106382665f58c55f8be0a6d19b43b8e9ca2be744f96ceeae0cce256e6efc248c3855900962035acb356b1e5aca5c885e19d8a48a3a146b9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e244509914af9bf81de69db300ac77b
SHA12347485a2f6afd4b81dd6797d9b198b74f603b8d
SHA256a9a83c90efaf107a91c0742c95a97e1c64b0fb02fffacf30b95fbf77a3613bb0
SHA512387593d49f70f179d90c88ac66751edc8a1f33df5946876fa699f6c7929909b0d85580472e3d495faab3056b3c78254df4acecda3ed9229233d8f7bbf8243c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab65073d6bf92bb620677d75b538bb4
SHA182a4a282a004be50bca55d3a3a95c7affef6166f
SHA256600b00ce0a82beeb009aa552c9763871aa0fb1931ca592364266d503cf59b154
SHA512586588b242fc9473b7d2f07ed289120261bd341daf392760ed0e82e033184e991c2197714d073d9363af0b4afbaf31e50a272800140385648b8a323d23af47d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090761b41b463b841174ca25ca69dca4
SHA10e9fa197f06b4b657f8b09a707a05ba1363999d9
SHA256ac2145e11c0b4b7c0452480495bfa8579fe589b86b6f3bb9534b03d152f09c14
SHA51235fa07fde8b9bfb3ad08fab5f31f4aabd7c5c849c1d39d5d0bf9356e2647a69eea7bcaae1e6a6c51715acb3a3f2fa75427daef56156cf2b82e803ab286a7a2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53980b8407ce598cf446ce55f6f9e3458
SHA160a37a8cd8b69701fd0702e343fc87e03bacca3a
SHA256f2f3fa28d5820b86f4526a7416bde936228ccc9277836574df8d8093681a4d28
SHA5122c084cdb614f0b9bdd5bb4a07bb6ae705ffaa869ef0593ae75c2e88a9adbec9a78398b76ea97861e35c67903b14f299db19a202ab37debdc20d6807adcef5164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c06ecfa15e4425d4851bf920f4c2ac0
SHA115cd69685a78a582dd426b81434a9c2289fa592a
SHA256022422737652277f978b2877ce1174a765b79ab1b2acf2018e9881863d857167
SHA512accd0617c0ee57c187f41a4dce6d65134eec24435b4ffad0a8deca54bf30f7454614c9b894f85f4ac46b901e1c7891047385bea78ee4e0146e475a6398c3d7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04d465c7240460de830af9529715d1b
SHA1b0300ad8ddb61a1f7bf7184d7b2f4ac6f3a05ee5
SHA2566589b5e5defd2df005349b9d82d6953a9f99445421aff52ba5cbd1b0611829e8
SHA512a7cd5d468ed360d19c0459e8ce32237d5047e9eda227aa565b225039c69c480b3f7d8dc1e6541e6be27d422c88aabbc1f389f431ffad7bd618b73687164c699c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6906aa65c02a3e59758cd638e4a7bd1
SHA194db2ed0765ad839f5dcfc5b6af8a828418f3186
SHA256a7c3b9d3212994f95696ea11592058ab9de9128256da3e0a054ce1bb338257a0
SHA512589f4c49e00bf817c51e27e94d5f7627abf2385d5883f2cc058ad0f0bb94397a2e5cb7d44cdfa1e0ed1febd5dbccbb2d59e1ee82d09a88aada20a4a9b14e1db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d756b479853c424e78911a7a5f12775e
SHA1e56f3a270d300a76b86c3a44b195f3286d6f1cd5
SHA256bc1536db3a1dd1278e81a556ad04a7540e31e3ac138c18fb27133b52e963fc56
SHA51243e66e84268b6fb93d938a98e710a09582bc3dd1acc3d585b66fee3420707e2f651661069a1500981a19b5799ac4aaf63ff62970b34e66b890fd8b362c721d1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b