Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
55dfa47a015a112392df42398bae237b_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
55dfa47a015a112392df42398bae237b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55dfa47a015a112392df42398bae237b_JaffaCakes118.html
-
Size
6KB
-
MD5
55dfa47a015a112392df42398bae237b
-
SHA1
cc296d9bbf3352cfdd1309b24315c58cab070878
-
SHA256
ace41c7637ebaf4e63840146e3a644f49959d1ea1a752b01beeb962fa569195a
-
SHA512
fae4e7a31bd102ff966e3abe352484791b0a824b62ff3401aa2e56c14770929d3c9a97857e20dec91d7d841180d3674a619ba01bdb2298adef1a93c4161fa838
-
SSDEEP
96:uzVs+ux7zpLLY1k9o84d12ef7CSTU7ZcEZ7ru7f:csz7zpAYS/Gb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435393590" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CFEA271-8D17-11EF-962F-CA3CF52169FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9059c9432421db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000b50a947601da46b4038076ed15ecd96a524297b3185143df98d818bd36bcce3e000000000e80000000020000200000002347daa514493ee6c6573bcd489f3fd1f02b9b0e6cce173975f69be9c814f025200000001b84c878658f5315681ffaaeb00a217c757c0837f790ff3b73d28f41d4e27b70400000005b3bf6cf1db19d33d19deaef2a10e8f54a7fa041bb6f741289ae8176199da70970c4e25603db3665f724559469e4e5d5fac2ee7926c6608174835b04fbcafc2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 1992 2560 iexplore.exe 31 PID 2560 wrote to memory of 1992 2560 iexplore.exe 31 PID 2560 wrote to memory of 1992 2560 iexplore.exe 31 PID 2560 wrote to memory of 1992 2560 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55dfa47a015a112392df42398bae237b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cadf8cc7bd976970abd9818b72c7a86
SHA1cd57daa1d727884db8d8172573d75397a5e18ef8
SHA256b57a7279b3222d19053222fe2d6cd22dc34c63eae6452f4344ae5c746ac9f282
SHA512003e38aca5292c96610f9f04e2c9dd76ae3921c0aa0af6fa47ffadde1ebbeb92b42b286805e228ee5c088ca8f20015a58c3543f95ddf9f40a1fd4cf51ab6427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbac5aabacd3586ae464a228e3ec25a
SHA177814d09b630789b15252aad468340f4c0447f1a
SHA2568b5e1fce08864209d74801fc97bca2daa58b741bc7c67a8dbd72673001a96b66
SHA51246c2dbc8967dce3318a7b9956fb3a62412e8c47a8aa0c3611291e3ed24e4f90e5dcd84ffd175b8e7690ac46cf77c7d173749b9cb69284dbd7d4057e87071479e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b505e9962ff0e2dad8151041550f59f
SHA15bc9999ebc47141662478fd5e1e332eb7559faf3
SHA256c392630e7a6d8ef04b5a26d637fc204819e612d25228dc1cf4d4afe3e8f79d9f
SHA5128dd23eab5c5f3fdb94080708a6ba2a14207c0cf711820571a546fe26c4e00532a3feadc8aeed4f1a41a17d00492988800de7f74ddb658cd92d9702f7f00ac76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd2fcbce408eed61c33d9edfe628db5
SHA10050f5ad1f3bb7602f4e8783823b111d58827597
SHA256f5652de5ac50545c0722bca2581dc4006c79f87ec0bfac13f573737bf11a4047
SHA51236f0b16e75a20b7523ea9ada2fa346944f5a37a9525987054bee0f47726b7547a98ed8e7861ea1c2c3f09896415ef8cafcecd1ac410ebff19fe3c0d4dc4b6b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744e536b2f67c8761f3b6d295f5acfc8
SHA1b0882423cb5c866e0aa9790676270c326404022f
SHA2562a8ec42c26048c3063559fdd65282e4e11193f4b9f0bef57927e911060894089
SHA512df4289ef654884cf277dfac0e55b7cf03c918897e8636a15b23fbb3165f82a3db42770ae78a9a8cd7a713e4cf30099137ce71d7da1debc878a47187c2a58a969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c5c89b75a73058f7d0be047e8840e7
SHA1981cd9d62bd4ab2c0dc12f4f28cc378d5b32c3bf
SHA25668f293e0d0ab86dab408f5dddc175289956aae8c7f86adf1e8798ad61ae9fb5b
SHA512e87d790d135521a85ed4f105fc5cfd592b2760fc7394f3ced3312348cd7b7c79df3e302955b33cf281c8a6ae2f3fee34528dd0681b4c451f4630d9ff471edeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064e2062ab95976857800d8f7f3a5b6c
SHA153d91feec288da2f9830d14797cd546fd59bd2bb
SHA25668ce68bbead5aeaa67da97ea7f2bc2022b35f73e26ab9a4f38149f8540c1a87f
SHA5127ef5e3c916555501d9388a1a91d6c5b281cfbca971c19d6c72dc13a84d8bc7bbedbe7f894f6f0769e42eadb9b2a51e8881437db4a4f62464078783fd340ed4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d87016f0817b9f0bd7172828431eff
SHA1544bdee78e94a747146611a1861b90f314627dc1
SHA2560a7751f2671ac581ada3cf562c4fd25b2d4c0836a523f1a541f0306507ef21ef
SHA512c8746dd52850b3fde52b7433d9d7c3061fe4cd4c2796523bd6b6922580c2f0fe5edffb43e786f08769d619f689412cff89896027984f9e8dafbed58c7e469452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba64b410526bf0233c8df966827b645
SHA12a7889f2c13bbbfa9df69f494fe2a8261760b1fe
SHA256ee532207b07299b39a39c50ec3a434d085f450023c0dbe6f4dba438b098aaa79
SHA512d117cb6f2d62e96f193c1240b9951b9451cbfabdb1ee649d12e206c8bf5903a60f19b98e466264d9382539eeebc52d5b9efe6aa4965d3f76fdc6576792a3bc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaedccc2252c949acbb4687db5914e59
SHA1dcb69da58b8f5abb98abe98104f03317acc7f291
SHA256732312e10acffc86928f1a5fdbbcc9554b7aadf5ce391195c8412fd15c7e66b6
SHA512cb161d0181af1bfb58eadb97c815a90346184e0df9c9c1c9599d9636089c54b7da1491d4f230289b950a9a6b88d8d6d23da58c51365eabc4faf750bf6252d04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf740359b15108ef184095da4e13573
SHA162ca0b4d445182efdefca55af84c6f4d61443e86
SHA256c91b46c077fc44502fe0a5ec6412b99d07e00fc5af74249f03cae7df2927da5b
SHA5124f9a076725483ed7d2304dc7369a8948170cf480bdf501fc302e01ccf427a54b681f3277a770f3c8c860bbb3d6ef57ee46de791c1c8cc18c1431349ba13e9a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bb8c3125ecb0ff461763210946542a
SHA1b186cefc34683acaae99e0b095d3e76029ce4f8e
SHA256cd5df1d4ced5035a5d3239f6bc7251ace2bb12c4b1a1e6ccc4d38302a40d2324
SHA51248873864c241de746ef1075a0aa40ecb5f91aedafe53e301409a4e995f975f3b1f1ac2827a6dae07871b1adec4f348f951591ea1a8d0443a711767b95da08830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f052d69cd3851b33bf6eccd0fadf33
SHA1a644b9e1dff0d763cc743fa73210413324499f16
SHA256e79026c765fa49055db3d1e17e0221c53276f89aabd1733839dafa4ddfc281d0
SHA512b41242d2e5389f89a9c65d9f1ecdcb6af19a4af69df3577f7bfebdfbf546cb3d552022d9a4800272461a88d2e18a7405e1ee47a25c9ab05962f42b463a75d1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f0d59a583f0cfa9bf14c9878d045249
SHA1b132f666ecbe7d75d1dde3972f87c3560e121272
SHA25697f14c47ca2e895db875572b50773c1adbfa913d0a21721feecd0619e233cec1
SHA512843fc69c500e2074cfb9559b9a6ca5eca165845f540f1e38b9be8fbc462f660998fa1f5820eb911600d50d135392c7fb3484da0e6207fe2611b2ceebbfc1ad43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551881a426065629ed6d401f5f309b7af
SHA1b7c3c75a5c2f291534e8099d921e4fa9dae70874
SHA256b4bc621f1efcfdf73aecf182b63162b2eaae6adef5782abbff190cc2ccf4f07f
SHA51244b987878e54e4e1b26fd44c41474b5326026bc98763e77a3c846f66a69f6f3d69e5484dfe6a9a39ecb68a4dbef2c598bf57bfe4fa24df321747b3b34db3922d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56781061afbb20af5d448816f6c9b0b43
SHA188f6e1dc458beb44b879be2fc2bc38ab4a043b08
SHA256f4a81b3e6c1cfc6a6bbc69278cf34bc2e41211dc7c2315c1d424bded5aec4ed4
SHA51285252ec51306bc864cf03d33f13bd05addf6c3ce399047a27afbd9677f7c74166e2663e0867af87c3c1c3e11a34b93afed15f7cd46493e76996f64cb90f46aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552911c3c0e07600f0afda746e308e81b
SHA128d90778909111e1b3bcb4bca1e5d3bb52a9c147
SHA25604a5c7305504d193398279a0261ac8513ee53144771a2190f53ab37d04c0cc48
SHA5121531a1d11eb73a89bdb6e1d4fbce9caa32a8850a675cfb3925c0ade2997c2a64095d56f9857d665141ff8a736d2a39d5ba85ac77e45bd8bbe746a089b184c3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbca60f6746122f0d7cfcba95e24e409
SHA10811c1e56e79024e531aa0b72a3eac26541520d8
SHA256ac80c7e71503bcf29937a41e4e501d09e711c59c0bcd7908dd17433cb581a58e
SHA5121dd23ae677617303b0c5d318f6d6b684aaff5c6267b6689730c3c45c5a529ecbf4a7b9553c48eb480999b536b155d6c09b931d4ddeb2210985350e34372ddf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56318e5f8824aac32122293f1ba9a2e0a
SHA16786c865ec24b20b8d966d5fc0f1647f9feaa38f
SHA256563c18403179a5960f414b9f4137f8945224de9ec43ac2854f2b870bc458ed37
SHA51296b8431bf896172337e0f70c7dfa641403a7500c29fbd1930b940e4913ff452f44de9e34ad4270f97fc673d20b2f776c6a1abfc543a39ffc3f7ca8adbb4d622a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d909865a93b14d6b7913529f4d10c88c
SHA17dd644cbe8466a24f4c019bdc6b9384a1ef83007
SHA256d26c904caf47a9bdddab9b19e57115a5c5470489b588ff1ee1527538c7b300c2
SHA512e582efe70c76e8059282f4434a80fb2ddebea946bff84dc19338217cc418a5de6ba432dfb4fbb77125bce3401038dab5e759331abb9630a16c4fd5fe1ec18e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d4eef2699b91416a1c790ece59341f
SHA1e1f9304a27c9d64e3b040f8ff7dfa62c38631ded
SHA25654268b43a8bac97f5957abab71f9ca10bf4820f4b62715a46515958af968b6ca
SHA5120acf95b1aabbcc2a96dd0b62b97a91967ec2b828c2b8d91998119687b3dcd1d5d96438f53ca554b1aede4047546656d65c4ad6841780e053372eac2a6088ce4e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b