Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
3e45021c6bab3747a54e0093ed230a05_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3e45021c6bab3747a54e0093ed230a05_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e45021c6bab3747a54e0093ed230a05_JaffaCakes118.html
-
Size
26KB
-
MD5
3e45021c6bab3747a54e0093ed230a05
-
SHA1
2fc71d5e191bfe2899918fadb62b13ac4697f6db
-
SHA256
72777614dd8b46cc0040e86f21ce42b62a3ab3aefe9c4eff4f184b4c9774320b
-
SHA512
60d30d15ef7438445d9c5ea93adcf76d0111d49adc4fc4e518313a5ca04c4a5acfd16990628b5de03de90c139f8e0e3a7fa9b4eb00f4bab8d6e547b3e6e54983
-
SSDEEP
768:SU2dtDo0tgnkudcce+K+VHK6I9o4IQkNlbCjTiB:SU2dtDo0tgnTdcce+K+VHK6I9o4IQkNR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434962280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3420F1A1-892B-11EF-8F4E-52AA2C275983} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000e4ad9049898ea64f8b2d3b6cf0aed5b40eb6db6019725c8637c8a5505c3398b7000000000e8000000002000020000000a5f66332b6dca6efaa3178980fa41d78037798c30e29580b46b17cc0ddc8f83020000000f03b3b54274acd35003709afdc67e6f4e16fe6a1bf5a16df12df76df406fcad54000000013a32ff1eda642fd3fc4dba39c2b83b4a2f475efb642d951ddf9f337357715378ac14dfe313f6c7e610ecaf774ec141d854b62196aebab90bd5a37f87753c44d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0748d0d381ddb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2328 2604 iexplore.exe 31 PID 2604 wrote to memory of 2328 2604 iexplore.exe 31 PID 2604 wrote to memory of 2328 2604 iexplore.exe 31 PID 2604 wrote to memory of 2328 2604 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e45021c6bab3747a54e0093ed230a05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57713ed7347113109e25649ac38f50a3d
SHA1de5fcb739db1d754672125b60581efe0552e0cea
SHA256cd11c26968908c09de4319b8ede813354c3fa8954dd5562f54ffccaed6e1012c
SHA51294bec884f1bb7c2098e2befcaef5acb2dcbf15f0c9959778b1598c8a6af1a46bee3b0c1e94d3608c6996c84fb2e967b48c3f37de155cf11b73b6aee99fbd4d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3a86eae0583f54b26744106d069235
SHA192b4bb3de07c97e5a34462040880ba9c06056768
SHA256e2be9433f38239412a1ae39f4ae5957a2ca348968f8af02350ba405e446a9e88
SHA5122b16296c7b82e31e105090fb4445a17ae434d8c6836cc90c5e6999474892c449cf9e8498ca63b68d3fed04bb9f1e838f1e526803326d13d159b1ff1df58faf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd047a63ce93209f35978e197c87d9e9
SHA169ff2bf31ea3c7f881b2e94a093cafb480a8fe80
SHA2561496e2ee928eeef477a626e8401b42dd91824e1b39a5940fdd41b9de30666ead
SHA5126ead705e1fdf07e6b9ab95fccbea502301e5e683bd60cdcf8ca8288e29774e37b5a208de60d6819f2ab074d7674453aa330f4632def2ce1b2426b00917717688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc0a74be0ffe7bbce6d08ca22b2e385
SHA10ec862a9ba742a3967e017d83797823e491b0a39
SHA2567159749cdb467e46edfc650f317cfe5c9f777a5be78b450d505d1c3965b9e661
SHA51203ac8a21dc4236c4c4995a710a2ac3aaf0c57fe864f7b18bbd30104e008e93ceb40e430fcfb668fc263cf2c7be39d01d04ad752fd8bc86cd4e24769a1447638a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598009c6266361439b422c5ea11d602b1
SHA14a0cb272552adcbb5c817d5f5b6dcd7a13597487
SHA2564e6c299fa4897ac6dddd04ef491003c45e8229e04d98d7cf4423bf3581c41f90
SHA5128523a96c2ed32972ec55efd4374f236c0d753ecec1407b6310508701bb0b46674cc72c9b17aa730bb8556781837d944c787c80bac8685360da4c9d0b0dbda8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6de99ebf030aee620b76fcc0d2e93c4
SHA1765b844fbad4b6deca78050cf5b16d1c9d96183f
SHA25631543846c9c5082b22d82b561254c8ee612ab71c62e65e7c5651fe8fea76a948
SHA5124a49c48fcd5385ee99253a0365293611fc10c78263aacb5845f8660f28bc10b19c4cc0184dcf9c8f1974c30bc28dfc7d9f034d5ca94d9aced9d0c2a0c2517189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef20cd8069079f7c1c44516b23af0f62
SHA107246d2a64b76956b9316c2249a4eb4a0bcf5bdb
SHA2563a14eb5c21a6120eb00fafdd1db768bf48362743e4498c9bc25c6240f7520985
SHA512e60fdaa0da253a5eba2d101c4d188f4bc0e0fa29eb3e579928fd41a74e12ae8f5a673946db50186730d375d2b6b71f483de531a8e4c55dd38ed2c15af9561e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576de8e52d45d2691a6e32d094bc8b0b6
SHA1c61d34545caa536d3c39a7e3f1d1ad37754b5cd8
SHA256d2a01a59ecb54f2c71aa8dbc0ea04bd6ee6fb50216c74f2ae27681d174de9cc7
SHA5120315024e6aa377e9dd12b5d05ef387031abf67c3e1997fa8a5f6a9bdb4685a841204be3defe2e5093bc6d3bfdf435987c5d8a237275e6d20108f738874c07df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f52063dc9309fab0d06c5418e598fe
SHA1508591eff04d1822bb53c696d7ad3b3a0eccd298
SHA256f608487273f71150f7886befcdcc6b3e26da50cc0babdad5adc45ce2c5bd450e
SHA512d94be3fa3118b5994ada022291087dc22d4e2f8185bd2e352b087905b40d7bccdad9faad823be7ba88e9d8c00c96d895f704e53f3cbfc221f5bf764a9bb8919b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b840d248962600e11afb11a8d9f1c6
SHA16d2cb1a0d7a480a2d2027d815b9f0a8dfeb8e254
SHA256c41201f397c3e53d08da3be92773e1ead162d26b5c0d67817352280d019c7678
SHA51253e9695c3ac4f94ad0aafb16e227d2ed19b28c0bdfd82b560ce8062dc5e45950dd4721fed9cdf257c2a6f4ad379db2f8ee66417beef508d6ffb9029d66d12c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a0672d0b2ced234465b3a2faf00f3bb
SHA1fa32119594cea5bfe280d992aa04adaf73a67461
SHA2564068f7cdbad4f8564916e8ea9cdb55af8b0a38b2d2d4146c02ebbd7324d245dc
SHA5127b58d8972fd60fc2315d4723f2b776a8f29502c003ed58ef1f1d4826233e5c7142fee4e1698afe3ace6a0e3feb89130f6b63e9c1ef8cf673618b996bd9761c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa97f2fb5c2a1fa87aaf2cd48d3c7a8
SHA1d09358bdac9646010927d19ae34963b7388b60f7
SHA256b50c9f5cb88cb6eda2752c659ca8de71fd969248fce2acffb5fc2f1c1a78e699
SHA5125050117d87cb569622c00dd9f69edca6046f9f937a29b6093f928aa7d0a91f27f88eb5ce73a5d2c4b3620ae412e12bc0c021105abb866e429ace9fe12b41bdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fbcb97642395e7aca52db670cabf86
SHA157018bf75fe8655541c1217e2d7454c1eca57bae
SHA256ab6e8e195b4b29c58d412b10361afc6d22f3e0bc03161ac79a41bfc38c98222c
SHA512bbbca5c4d763229ceef902e21d298b620f1d59a02f5718440a4169ea381b033381883300c5bb83ed24a8b1f558b62a52da262e65a115b8eaf8de1bf8eaeba2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4cc6a001188604aac889a20394efaf
SHA12fe1ef7f982398a7790b9ac9445fae031eaa94ab
SHA25643636d1b301897e326154a40797162ed24e5db0f26405a9bf9a1aa326c241548
SHA512b13355aa2e29260b620c9a61aa8957392134c787acd622f5cc3d3079df489814ddc34cb90d8da10cce4d45d151a933c80ffa929aa5ce9449d6ddeef4364b1b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f8baf22bc9ffb228307364038b4870
SHA1ff3b774ba1c6ed1b2bb842ad2795c09c95e7022f
SHA256ddcc008a0e874f6ebc8b766c02060d763b4f1daf650434647e37d8c2f2f60342
SHA5124358b905005ebcac9361e84f332fe54f1a82e945a5f501e4c38058a9d9c7335d3f29e09018535ad7aa1ec59e37b2f40356d7f64bc0ae1300ad8137279cc15240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb4600df839ea0010b8d20e5ace41f6
SHA18ebe245da5634493ca21ef69dfaf1624ea2fb821
SHA256cbc2da03608c8a6c604a775d7ff1a141a30341b85eeef00970f93ed42fb72cfb
SHA51288017f9b6cd3dbf8bcec7fd31ed79a5834202cdd1a36ab3efc42bba70dfa27eed6cfbc545fc8cac6a6fce9dc051d5b7e789b547750775b56c1afaa5ef065c76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62bc963ebbf2dde72cbdac7493775d3
SHA15be73adfde9c25922793f3ee06cc7cf44d9ea06a
SHA256327b8dc209773e19bfda0b350ddf1b9801757a68d2c7999293760bd41056f903
SHA5123616f73a150666b052c1f45bddba0273f8f691c862cd7ffaf17d1adf7849699abeeff329c455b5c6baeac90391c442d47bb08423d2bf3b303e39b570eff2e1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a7ea566e699306c35701a9b4e4e25f
SHA1fb0ed51b0f94918be7bf94fe03d7c93f61a35d2d
SHA256a0bb02159ddaab9fbcda4749c6f698769a2e9a78ec64a2955feac00f9fe6e48a
SHA51254f0750dcc73f91cd4eb7b604d8c53f8ea2264b7e043346cc0511286bf71ec93581d6c1b4ef0e436e0a56da98f09dccdb6ddedd412130f9e5eb1e1d6982d128f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e7c5269bb3084bfe3f77e4edc89a60
SHA1bc42463c380aeed6bb3bd5d3a474fda3dc68f2d5
SHA25677e68a7abcb13684b09d7d31ac69d76a22c7e869005c12116b91c1e5f87e6a5a
SHA512cfb3798957f66a24fa1fda46f5d887d54dd7d528da69fd78440a61a78d66c2256ad6f4b7526bfe4b1af5dee4315522cf07e3e64827d6db105bdb4860d57e2ff9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b