Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
431d427dd1c3a02849e278f27b509a51_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
431d427dd1c3a02849e278f27b509a51_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
431d427dd1c3a02849e278f27b509a51_JaffaCakes118.html
-
Size
139KB
-
MD5
431d427dd1c3a02849e278f27b509a51
-
SHA1
8d5fcdd5fd125c9d9b6ce9f8ee4bd128724f1a0f
-
SHA256
cb2cdeb0ab3ada2108ccd5d681abacf46c4be696361eecca33bf9d8c2842018d
-
SHA512
9c8735fa2776d245775c2ad9254514a3466c29b8009163036a624166ced8704f2bb9c06d3557481226ad41e7156930e85d72325b2c1db57a85470327e3327e45
-
SSDEEP
1536:SU7p3eQKWnlwTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SU78WSTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005a3ea3bb30b0f5455857f9adb4e0bcb822bd3486ef0b59415f79ace06f9fbe0b000000000e80000000020000200000006b4db54fdc11ea6f8dfc43ef86489fb384ab69245f30c24e749f06816e861e5120000000c4fa4f2b1f76c396ca2b2878e32b7c2505acb9cfc0cb70c1f3fd950d781471a7400000004fe0366e4e2c2c769c06bdc9e596150ebb4b2ace5d708bbd034e9fb67e4409fb70f3ebe69b0a6a821afdae6a5031b6aee244927940426cf4f48e06cccda7d280 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905325d7561edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435085347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDC4F4F1-8A49-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2264 2280 iexplore.exe 31 PID 2280 wrote to memory of 2264 2280 iexplore.exe 31 PID 2280 wrote to memory of 2264 2280 iexplore.exe 31 PID 2280 wrote to memory of 2264 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\431d427dd1c3a02849e278f27b509a51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f36e7e20e5f68c1dbade2376401499
SHA19ed24d8dcb60fe82057590805c5c94cf39888898
SHA2567d0b787c088d3002665331e9bbcbf7d55783bdd28ff5330c066b289675253705
SHA51266644a07521164b3d558a1b19b0545e228d6fc76b71d22532c789a2c635dbddd2c99e7c049545534b66532f3333572e59b05b06729b5f45754bbba6fc85a0220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c61d85a08ea027951b53672dbf5636
SHA19be72eb6c1fae599942f3b1efa13e62defe4b6c3
SHA2562c056709d2dc355e3a238a74fa829a7fd566afe3a906b0a430b0f447a45adfc0
SHA512c28154b3093659efb0a4e0652301ab733481709069c7e8beda7dfe8fb71a5dc12f056e649688bcb34f4d0f408355a19201b56f3de9af92c623320bbfede1eb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd42f7c74e25c93b29990f713d15f63
SHA18f6ff59c7f96f4f4029fc819b25a2659e97f9241
SHA2560a71b51f4685a07ebd57674e604f930968e0e63160c74698e3f6c3ff493920ce
SHA512c95825d2580ec14798dfb4dde3b331748608cdd5d9273540dc9b745d3d27e98649097575d38c5e6bbec639021ee4f0717478d17ab26326f24dc40b615b80d0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1384ffb60b68069d8a3c66675d1150b
SHA107f72bfb91765d447f4c0904398646f9352ecd8e
SHA256bc1f08e5d9743393722c7ecbd587c159c4b0e0f954022ddbe7ea591a39b10955
SHA5123ff43cf2d2c2fbc5c53ea42fb12be0c1e8cb4bd2500372543e299156c3ac674df7a89a87d2c8bef5f29e95970e4c49fd325fc1b03cd44fdb588a685b6073760a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b31758b0fb1f70f6ccfc70a6d2cbdf2
SHA1db68db3d1744a37c09b8446b3c554c09b30b9cc7
SHA25682c6729f3bc778f5c2889d87799d0f03286a3b45776b2e7c1fe350044b3502ea
SHA5126f94eb2fe203039dc49c2e3db7a180dc406c8584a64d89bc1aaf2b9cd060a57e636dde7f333fb401730e2408bce13a48e3b182c982050ac2b946ef71cfd7a8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3c767bb57900f18f7bd65e4cbd296f
SHA1a8edeae2f0b5cbe8d197ea4d28cba4315b4c2266
SHA256472248d3d2eb205fd12295b59114e159d63d42976955715f6226413067bc968f
SHA51297925cd214f6dca788ae1c58a782ddea9a2f95c84797422f3948525d1e07f7ee3cb370febd02d8428be3ad7d24ff14c7ae5bd88d45271aa779c9744d427f9d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8c3b10ce15b6f892c24af4e0e8dce6
SHA145523118ae18c61cbe22ff9fcce3cbfe544cafd3
SHA256d014063f9a3bbeac2ced4a4490e09447e7e038a93f52430a782d5b95e0957fcd
SHA51235139b5c36d1c84b34063ef701288b3f03b9203ffcbcb6a60fb03d962597aa1ea70daf765a89d475521fcb5a40066919cda463a39002c791f7befce32ae9055f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968e886999c7bea004aa2b15c4944f33
SHA14595d5e08d174775872736134806dd250493f63d
SHA2561ef93572b384b09197cc383290a685ef4067c8623e1f0144e48fdea2520aa5df
SHA51283ee85a22ea2217cf48b0c7402eed06475e37c64f27e076340d21421c74458e5f82e7af0c2a063c5bf66fb5408c2985ddcc10946042d1acdf05df34e1802f394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab8d86163caf1a0ed4e391f7344aba7
SHA153fd5825e783336a3b996203f0afc26efe0a073b
SHA25652e0ea519aaf811722a0cdddf3b557cf3a5620f7ab2d83d960ec7bcd2a0bda36
SHA51228dcfe4c4543f9bc6cae50117877410f084574060488c7555101655c1a075dc278815cb43aff2a5b4d37507899aa364c91b3ff7fae96b882e95846719e90c0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750ef59b9f0cbf0929671a68c5bf704d
SHA19cbf9d192033fdc8c855e6101bbef9b50dd75f8e
SHA256e25b809cd9ce9e7c5995f6c40a38d4ac84dd129faff10711241b71edd0c5c6e1
SHA5128fa62b0be97a178720efdcacacff4ead25a8c32340c96bf9cef68c6d9de3a7e0ece7522f000b3ad8b81689025462342a2e766a12e2a995fd5592226800bf5695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f2bab4594df5596ff1bd3f8e17b35c
SHA15ce68d6506e6b2ecfa51ab20687c9d861dddd43e
SHA25643e26239a5398a9675e983f11f4284358aa7383dfeb4bbb260afdbd9eee59386
SHA51233e23539f33df69b0ce2f66f53f08bce6a3a80bcf7eeb6182857bc596032016741cf9f627b1c2a8d50005a82362399ec761c90703a704c01d207fae13d8c6b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff91403eb3f8662d0cfd3d677b1deb2
SHA15ec05cc6b477694cc73ccc4f6eb17e0b0002de1d
SHA2568820a7c9a970650beb252962ca746016261aa5d344728008db518c6b014dd1d2
SHA512734fd23392b0cc297fe869c9e591876aedc08890632d351afd0120cba87d17e99cc8c7e59fb6c4334730c0f7cc119d35cf4e19906ed6f2e2ea088babe73a6aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55878b13622ed8ca20bf18174c1faaad7
SHA137de6cc84734e5e52ecc78e831316c28b36e0c99
SHA256fe9aa212d5e70d5646a402e6884ec5abbfc422ad2610650152d450b92cc23b9d
SHA512f702bb3d61569af41cacea3446b94779bab41ed6a4304ecb1fe8d7fa92b1bcdad7313d8c9008fe0c6ac180a7b4a19672a791e945d44c04eaee477d080ba2a759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409fd1381b6c806d6e0c3055b76ee36d
SHA1c461d31919fc57176f8426a08dd1ae355a90ba9b
SHA256c7963d73f1d3cb55163bb81ab79a64dc1b0e42bbc2df0ac272878e6b2ff385e0
SHA512c908de431296ec71efe0ab48f972c635bbc490f72421227c0f1fc49c6c0d57fdd90dfa5ce22fb34194ca5b2d2e4a0e7b7a4ae105577f478dbb49ac8bcf97b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b0bd74bb1f9253cf726cb9e94aa5c6
SHA187b5b562bc095addbccf13be6a34c466650afb1c
SHA256a6ff1ad8371b81a7434123d93890fa005e042abcc40320abd0af7be4c04d8884
SHA5127e7a07e009297dc5784130a4fe671f70702dca7a3dc8209fb07a28e361bb66fb9f6874e62ac0c8750e3a59112366e58b14e9ee419156dc1a410d7ef66b04d751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5f8aff52f469588be210c9c2a67d6c
SHA190fadfeb5ecf93ac0d5a7a51ff438c8a622e0ad8
SHA256bde7ca3188e496b85006868d9c873468882598e632efb4f1896fc67d2215f168
SHA51292f19f2fd289eebc63ca7c42e37ef6d9a9f3c9311bacd47cb69df7b3f195ebfa4b02398e92d26ff9ef363ef7a65a707992bb8d0c7cb75be0f65879616a575f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586aaccee11186413c9684b11e33a0cb3
SHA19a3843d98d376702121bc9601a8c6b502d3aa250
SHA256779fce8809aa4af9aba3c11da9384d3f015d2ea79576d9f35f8d5eccb4a7926f
SHA51232595ea86a4c452d59aa68eb34bf278da7b6e0517fb095db100b59e18101f3ae501c3295144ee47b6acdddf007e8ecd6e087d313dc90d01b0b331f978db1a98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232517d7a7d84b1efb547437de7f3f7b
SHA10642d275d21bf1957dda12e2d0f51aa525db6527
SHA25650de4abae3a2a595abfc7572117deaf065b479dd6da5c105e33c5a4f253e8b45
SHA5122f4f71083b17fb5406af824bb8ea8ba05a1714432cc28e68768638073388418dd30ae3cd351dddaf5ed681b00f0430c5f65b0073cf3a959033d113138166b23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3a50b9bdfefdb6558a201cb2c575f3
SHA13bad419d834677a0f30874a6c4c62226e29d5a07
SHA2561b610e4ffe078eed51edff5299cc46d4f43acb7a02386ebe69d586ee16cb4837
SHA512711dec4b77582944e1ffa181e086bad4feabd46e734e1763bf008ecef4355bb5dfaa7b7a1071c73a8691f14c49829e7d90c7199d2fcbd1dd21b567ebb6542ba0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b