Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
37a7c7714a9337d4d64f9099d8b63ac7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37a7c7714a9337d4d64f9099d8b63ac7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37a7c7714a9337d4d64f9099d8b63ac7_JaffaCakes118.html
-
Size
139KB
-
MD5
37a7c7714a9337d4d64f9099d8b63ac7
-
SHA1
fe8e7e2c149699c20f74af1ceca6ce7cac740e26
-
SHA256
3ddaa6b4179b4e5f1e9b5cca72607995bc4154666d508b3dd35f405172ec8b38
-
SHA512
6b6feca17e101b92985cdd86a5b37dc4e0f92833b117d8ff96f23e6bb628ac3a89ebb61da6697ec36c8b83878ecfb9764213872d49f63bc3888cb3c339a2d64a
-
SSDEEP
1536:ShLKXCBBsA3PT52CWrRlyzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:Sh/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{293058F1-8834-11EF-A059-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434856176" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0deee40411cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a0cea0257414551297bfbd3ad6764e76b6f4e2ce0f7c913e77948a9fa0705207000000000e80000000020000200000002eecb15b45f4cad0f390cd0710b1c755c1aa6c0b929f67bbca26ab7a98c51a5d20000000b406dc9d1ff9caf55b644059269e0b581f524dcce265e7e3fd0e98b299545227400000002af1b13df87e206ae5cbc23c0c6ec57746a0492c2c4f943acf1ededec5dfbf45eb8b9bd60ad925136c5b3aac3961d7780d8ed2832e46fe1f606fd8549f7d66d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2208 2196 iexplore.exe 31 PID 2196 wrote to memory of 2208 2196 iexplore.exe 31 PID 2196 wrote to memory of 2208 2196 iexplore.exe 31 PID 2196 wrote to memory of 2208 2196 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37a7c7714a9337d4d64f9099d8b63ac7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d75c8f57672d7bba67067702a337e8
SHA1318afea6d8a5767a5ebe854f65e4bf3e9775e95c
SHA256efc0a7b815ec5f1cc23ad0aaf3706f122db526ff84971ea09d3a08c8cc4ee177
SHA5128d2cdf58958dd564b38c268fc0cccedc4e566ad6cd89e90a01846ef9c30c814579b0b0ddee8539bd388aa5888d1ec2fdc0cf9c37ce70aeebb2cb1ab8545de430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d86669354f6156e281e3891766334e
SHA17e509f70dce89287b910ea253b40a4b8a97ef66d
SHA2569bbcf04683c6e994d1a235047810e65401285ec6cce27d6b797295d73a2322a0
SHA5125d245788c5526dcc229d77f6e961ac2ba60465f1a4ab8929ac393188a7d36d308e31351a0cf33528f7e91f7f19f9e0d2c07fd2c203cb39508f41cfbc7f8a7930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55815fa533baffd28d17656d93a98209b
SHA10511eb54e0310eccabd5fa7efe0dd457dd7cfc33
SHA256f49fddb565bab2ef022b37a2d9a0845ce4c121f32bc3b58b981b0713897d8093
SHA5125376868d75c7525ca43542a2d0fd5b9ab6f3aeccba3f6137332f3037200d916490cb576beab6d7e144a509c0fa7c18448b4df447ae1dbcc79f7605592ead5148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b63ca3b56da9b9c2ef9b0ff657331b
SHA15ae735faa914afe479c2cf87121335abdf9662a0
SHA25653c29f03eb19a0c81c1d77401e9737b58db8bfaf87c8aadd888aed9cd6b8ec5c
SHA5120c92875ad9fa448fed1edb71e67890f0d7c515f06c4a3104e3a98ccce0d17a31af5ac3e2a8298e07becaf5a97550a3b11b47ca97c4fa688b672637d396d1fc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efc5e06085807bfa88a259f3e1568ba
SHA169ec42b823ecebed5b1e56f2a2eb87f6148bb04e
SHA25634bd287ebd9c8f1c5080c5f2319f050c02c95e6cea02010c093ad13eabd9d196
SHA5126afe0e81ca3cddd9171bb3b054fd09cf09889d495738669d8fdbe675989bf3186b261907d0eb941ac085c1a84716fd96328be919999f7247f51796b644d52c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b9fc3248632ce368b5654f34389025
SHA15b64c6b4d38f6253e3e18365ce8f3ed128ed63d8
SHA256a5250d4fc6fcc6e4c3454c7256db4fbb850735afd0b20a1aef7c210913478400
SHA512d0af9171d2e6e75ae90ccd120959d554fdf695e3c890b1dda4f3e13812b541512d44d7da0fec9a172d46ea24faf70b2d4c68757632360d5ee032a3de9d225234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86752323dc0eb73329fa9583aa0ffe2
SHA1261e04779ef212c2633b5865c42e9e767bdb1a4f
SHA2568ae250ed6d73ca86d6f97b4365dea54efdf3a8fb98207e3728b4382b5dc90111
SHA512e019e8f7a979d4c5b547d1c6cc53a191359b918aa42a3b604ad068e9fe9d45a7a0d1d12a970d9cc14b9db57e51f6840592fe6c86093a384b7e4fce8d437a898f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd29e3c73f2f0fd1239dbe89c82d87da
SHA1dfcc5e0afd5ba3375ef2f353bbe808b1d2d3b39c
SHA256d827096d9491014f060e0e3633ff402f1142e06f61864d6cb17eb7a21f5ec202
SHA51281571503b53f5c075c0826dc9f2b7921cbe27bab3c7899be471b878f231cd54005944401553da18cea30af5be296595ef8462d17be9448cd24111cee7b3f2369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe4c6f13881ad94b9eb2b352aae053d
SHA1714ada1d3a5840dcc77c86ea27ef85e18adcd356
SHA2563e4882dd99aa898ffd92c28d289a53fda8b0710c5d32fe16eb38cd6f49349a38
SHA5123d9a56de5d8cca1f366a3c249e5a2f330360004872cf680715d1dca0c5c6463f1c3a6a9ceb5fcd7a698d903d9570ab2ce91dc834a09b4c1076932e6d33af15ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29eb303d12ac06af83752519aa343dc
SHA19dda0fbb77a7b441b0b28ec360c15028e8c362f6
SHA256eae63afeacb493def18d1f83ca213a5720c0f7daa513b6877ee8f3406512071a
SHA5129e85afec2b2deb2c0a8fb410dd4ce9bab38397c2d8332a133b789421ad09240d00d232b7c5e51142c967a1c9848ca94685968c1d0b30f2a2f0392e77d1229b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d187d179d32600b1699e3318673f22fc
SHA17262c82394a81e87a2a71ea266900bacd344542d
SHA256cf27561f2e587eb157338d67a2cb54fa00f8bcfc22f308cafba8ad98c043dc16
SHA5121867f919e10560109e11f6e7266f59055c450abf7eb584f5a284a704d6cc3b3c95d73bd927c5d33326ca2e3a4cda099b9aa761c1e16003c83b4d7349b59dea4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3d0d1cadfe83bf4d4baf50d508c092
SHA15ac1f5750033e9c92f899dc41bf06c8bda603298
SHA2569f689a410acb562a22d043396ae026d911bf980c491685c7da3414b41a5c824b
SHA5121c3695bba9835eddcdc8df5b837ffc4cfeab58560a35485a9c7abf7568072afc7b98f38df803e61e1aaa00c36dbc1c41c1e407463dd54f2f179e71e801a0e0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9db0b62ac4e864f73475fd655f5015
SHA130e20f987b902a27162a734229ef95e7b51116c8
SHA256f3817f7b515d62726fd9cb5b0bb7c5f7b1ba8663f136e82d878487be1270491f
SHA5129b06e3ece8e5fdf3d4bfec4e9170916a371a5279c6d8d6a9bbd87a76842a0a3cf7bbea902e826f717a28bcd6e2b078e072ddb10e88aef960dd5ce2fe8b651dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fb2f343a639fe34c571c89d31c0cab
SHA1a6f8713357d65a1cd63e05a19634cd7570647c57
SHA2563dd8778d6113a5dec9cda2bae80fac2ab0877fd827d1c858e1e4605211cbf795
SHA512091af72ed257619987771fe68964dd836d32e485406090c03acdabf655846a9498b68d73631315ded76c919c2f157ba5037f833bc23125685589feafd3af20d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad6262423cdc497f50a0de89672c26a
SHA1bce6f7a9c14c8569258aa1c2bf4a16fc845b8f44
SHA2561361dd86292febe7925f476e935dd2f93422e9b47ab67960606f3ef8ac67b66c
SHA51299fe29e564b2b1860e1b1991f2c5d66b7156865ed5821620b27c659e554f0fdd9a2acfcdbba14bd6297c253fb1f83c39c2f6615546c8092f414e2addca5db2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d77d7f35584cafd15dda45bcc4d7788
SHA106f1cf3e04e05c22acaa429e6fccbf030e8cc634
SHA256c139a39467148d752dfb6a1f9e41a62eb99fde717560a5e773f4243333636217
SHA5125fb872040576ae155c27af4b43a4ff20640a2f3282f2cb630f06540f59c6be62c75f42aa28a271e56aada61f93f990e590dd03689307bafa384dc80cda212a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c3aeaaddfa85cb3e271a95fc076eb6
SHA1afb553798bfeb62e495c7667430207eccfccc6f0
SHA256ae9f43c68a101c0b78881fc0874b423dd5a23752102bb676d5534596973b1fb0
SHA512b72f993320cc0fcb7aa2c595ccf664852d6a3b81e3c542334650ea02ff355c19a7d4a33dc50726a182c2aad53d9091eb42d56282f3bb385e776ae63e1a8e7f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd70b6a721ecc328a5eec1207acb37d8
SHA175d56b2d4b399ecce49f04c51b8722c4761ce0cc
SHA256c58746db7a5573fe4ab671c49eac58d424931a832ff21eefd2d5c5df6186a247
SHA512f1b95a415e61a83fdbac4527b8278c3b6abec07249c6a592b39ac5a3a51c221eabef11406a946d540468eda635d7a103c6b081d91816c3b1af20712b3730b2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c04e1fb4dfe6ea4de3a880e5f5c98f7
SHA1c92cd0947a524a49a5cf11c3557cb2586e30c46b
SHA2561677e15a5020469ffbb0e30d4a4e7333a2300f1e074365eead2a87173d0bcd69
SHA51221d391339f5d1941df0c30a8b34762feb58c5ca51ee9fb037e010b1b0b5ac43b31db1704aa1ac0c5feed2cd1c3aafe87de49775830a2189549d317325adf1a5d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b