Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
97a7165a4b7ed6f64fca486fedc5ab13_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
97a7165a4b7ed6f64fca486fedc5ab13_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
97a7165a4b7ed6f64fca486fedc5ab13_JaffaCakes118.html
-
Size
50KB
-
MD5
97a7165a4b7ed6f64fca486fedc5ab13
-
SHA1
f42ba3275fd7691282e7468251c6b4119fb33d71
-
SHA256
a94b0408708e99607cf68afe66c2d55c82e38fab8a10d70e14bd0a4900aa28ac
-
SHA512
6c67579172975d86a833929f9acbc49d1dedb7198ba3a6841a605fac08f37f1b83592cb0376b2b4da26e3bebb080807929d190bc4e7673d859b76ce3a004569c
-
SSDEEP
384:ZsnDCdkwoSXbNEvppC+27SRS66cdzbkE64+5eoYCeJCcD:ZIDCdNpx+2ES6JHkE64+5e6eJCcD
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000057ddf91658e0b89113e84efbdd2f0a78b4ef7258254b731453924a15d11814dc000000000e8000000002000020000000399d46e7dbb73a238f11df547ca2b65d268c67d8dcecd8cec2d789ccd10bde6290000000e451526837a11333d2bdfe3b1532fb215c2800ae824836c3484c40b60ea5080b67ba7d78bd29d85e63e892cc58cfcaea7d6c728f2177aea8287c5340aadef4e8782ba80ad54cdf88dde79cc7c6aa9098c2a42fe1e7094d658e7c88c7effc19b3f403daee060503a7e4e77eb0008287afe7830aceac21986a4e6c59d8c8fbd49099e92301367c6f9924add25f8957d1ac40000000e65ac776d3ba4d90ef882b28e4bc73a7e909ddd950b39657ed796a058e05c97c39e14ddd18a0d7000bcdf73dc214d88685fcb13a47c756738af3e5d703343f60 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76027051-2317-11EF-BB1E-6A387CD8C53E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f2635524b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423738781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000006c395ce802aa8bf4ada7d5a4f8f21f64726c85a8c19804cadf2f910202c8dbef000000000e800000000200002000000010584fcc0a0e963c54957527f5701ce0c4ae729b4a77813382bf33fcff10bf2320000000aac4c597d9759ecd2ae32208ac4075c4c1423fe18662029f66bbf687f92c889340000000be4efd42e528f3416957505b5aaafba4285e2db4978f742c033370954655e8b76d036bb603970ddca5c78a17744984dfae6fe84987478d122b1d4a69f165dbb4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2348 2280 iexplore.exe 28 PID 2280 wrote to memory of 2348 2280 iexplore.exe 28 PID 2280 wrote to memory of 2348 2280 iexplore.exe 28 PID 2280 wrote to memory of 2348 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97a7165a4b7ed6f64fca486fedc5ab13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef83078d911b9073a49579cf70b9217
SHA10ad0d24af41c551462c20545d839392134bec310
SHA2567dc41caba25bf63d6ab0b0fd65e9f529e2d248ed676e98902a0c4edddb1b200c
SHA51240623893081088082ea90fa91a696ae2de7ac691326e2cd44616c2c7bccbb63348a59cdde0f85f13aa5416fdc57c852029f03354618210bc4e1fa861f107125a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b336a4ab7e3f6ae9a3fbc7df46fc9a
SHA152f137d585203062a44cd6961203b7d37fe85def
SHA2561255fc62c0ae3d5168cdb73d1dae1abd2d8ce1c0f87d56bebee07f60e63b4606
SHA5121954b355470b1d8ad90d66c78c9d1951526c094b9c08692d9e4ea71c91c3ee19ffb963cfd953862dc62ada474dceb7bb22ecdd5c9e8a4ad2552b4ccbf2c970d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3248c8fddd49fb561cf9be06ebe7812
SHA13ada1af27a8e6bb547c612f885e932429d89e010
SHA2560c91c5a34845673b3adcf779ec9b0f57cad7a47d5d1f35ac22c49f6812a138f9
SHA5124b98589344f950400fdb175fd17c63cf99ebb9dc10723271510828a61d2cef44caa8c60944faf087dc4e4bf31b79560958e45c9cc5ad5a407f5cf28d981bded2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d23ad9c044617a7c1e3a67932ed9bec
SHA15bdd44a454662871c9ea534925bdac39107946b0
SHA25680962c88f823b7acefd3246ae8fc0e2c4379bc65016101b0704b1ca20702737f
SHA51261be61060deeadeb5e5016dc33894de2356d7c0b484636b8bac3a636448ea5b6254469d7a08a9e3688a90e273cbcced114196931dca46ca52de1b2dec9ed510d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8aec1e07275a7a13b020766ceabf44
SHA16c54c99df49fe3fdeba610d923c6eb3cd542bd78
SHA25646669c9801ba0f2d5b4ae32145cad859acc492cc8fd24ed045ba1e3960455725
SHA5128f87caef6b6edd30ef1ee6c37e114e770eb7444b86a3dec15c1b697ac54ecce56662580e0eff9c71cb34b036469a322c598644f476526a77ba09f2e8402dfefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2d655516de48d2715ff37fcb9268e9
SHA1511ea8dd8d650187c11cabbbd819965e22a5aa4c
SHA256c7e77c3dcef89c915cfc30b6413fe2c13b55d3a954ac238c425e65be415ed0f9
SHA512367ac47b63133d02ae26efe1b8f6ccf0747f07ed82c023e70a24e9cb0e95ccf5c37b72c02f23b196900ac79460c71a4469b8dde687d9817bab5666c56926c24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591db5918bac165eb46557e0093a6abae
SHA1427cc5e666cdb74730ff3595a3a9aede6ac1ec1d
SHA25650e60a268be4e63eafc5629625d0e8ff0f6def4a8f2c2f806b433bcbb50a2908
SHA512861ce11ec474446bffeb2e6bbdfa83821b15c732ba89130eab009f0739f6c7d291d6dc4e4741317f7aa580173ac05c8a8fce738f59913a9b8ec788e22e39f5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af03d70d8049d4c117066d767df5026a
SHA1084bacb484f9a184dabf08f495c187d5c6fe903a
SHA25695d739734b55c8ed8abf212b27ffa529bcbe0ab672a5526fb3c5bb2e5b5ee7ea
SHA5121270c8e471ba4592cf85b6c65d9fdc350143dbe7cf9481b557a4787d9c7aefd6f01f935ed6c6c863ee43a9322a3f0ec8c932834ca55b5fd1d5e7756f2ea6c325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527501af9d3af81e390df255f778eb028
SHA1a2d9d1764eb76ac10e1acf6740c223936f532c29
SHA256f0b9a87f84549ff41eb0ca9858351f8733ef72f3433636c9ad704e1228a42162
SHA512d96f757a3c5e5bebdb34f1fecd85445ddb300884af00217027624c135ac1aaa07c2ddca9e9437068d66aa1af5c6f881d6f2718885dbc8803025afe64838c7ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4ecf7580f969d583807834b46fa0eb
SHA1aecac8dfa69a1eb4de01d5c179ce451b35b7cd73
SHA256b924f08ceadbc7a1e627fe44c66007cda41355a3995200b93fcb6550ea3a75a8
SHA5122a997c3845bcb894883d17367f7024e8dc010aacc8397ce9fbd96a2a21bc8121df4f0193bb655ca867bac68cf288bdb25c3766d3b4eb8f6764e9a5670547a5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5019f4872d4ddf56881497821d3b056
SHA178247775ed9699d98fb107f352f98895d6826368
SHA256064448213055f21acb864bae36b7ebebfd8ad0142df0f69dfc0fd064b2682336
SHA5127a18f46593e187509fa4c9e2c9bdc84f72a9c69b8d0faa69171b9c874b66e6a66ad71ecce7734981cb1a919152bf3a1053cf53d0597143a7ee96fc7f25b634b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c9e118845d40495a617739a965f849
SHA188d32416fbf8f0d225cca201a6d96ff5c35bb612
SHA256058550f8ff801cabde098adcd06ffb4234e976d9ee10b57cde23038c26ea981b
SHA5128e8d07002eea29f89d5282e3661fcd60e932267dd2e17e7f49407766b832646e9f4ce6907584948f8ad9b778fa8728f32647598d2979189e0d5cac36f743ad53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52982c23423fe7610ef47bcfacd6641a4
SHA17b904ce19be10077cda4d385e9b9bd9ef74d435f
SHA256f9bdbe67b71b58d182939cd2f72b5465fb7c8031d83f46a2ffc9a136402139fe
SHA512e049b9f813bf68299a7343be6f5ee9ece2b0eee1a6df937234f013ba605afc0b4eda943732e934ff9115b9f3bf3f716b180db4b15b37b861c65d963d5cb89a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57849f061def1e223ff12ca5b7e8a1a1d
SHA1c6656a9008a8cee95c59f7dc04db8aef72b522e6
SHA256f8c54d1dd7dc852d1b520636d9eda6fd02041f7727b15b9435d7b32262de969f
SHA51277558d5427e84a4f6f1c0abb96a09842267c428e81cd60d5092146ad387746a9bbc143bcc89a9de96d6a856a1f4642f1ccda49c312242e2356f64d7f97e10039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503eb983cb279b99ce1b238e8c189a933
SHA14a01d4fd35e448dfab63b37592b3435239e4697c
SHA256a6e9c7754533df8beba601d98990e99d66c577c6950e75bba3aca20e3d457da5
SHA512e4b3d82bc29719e5de171a361a869fd51ae13af31b9d6a83edcd7b3e950d204bf8541de4b5347956a2f54de011e5284182b36ef0ac1b20dd6334d52bcabefb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b606afa9cb295b53af7430d1ee4d36c
SHA1c3f1188297605270c60a3de73237a8e0e28f1431
SHA2564d75db0e04b916575b5de1dd7d13f7ff8e9ed66f7db8e93038f7ed6f601d1aee
SHA512651f0cba97875f05968b2de30f9012c8764f40aa9bc4d75ab85d1d65de2c691d1ac7b61caa31ac7344642dd66bebcd5153bc77bcbf09722bbe649498195739ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563221f2cd57b8dc601415f33875804e6
SHA181df3906b765cd6a1fea023875a4e0b914d6e141
SHA256ed3e321bcf89308d2fb542448b5352f84eaee02628f56e2db557d46d3a1a23ff
SHA51221386313e75d0ef518bf01c9fd8db445421eaa8b3469bda4fa175b3d56f1ba2a963a372fbc86079abd159881c363814e2097d60e311f621ad1ccdd130a6de72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df501d0218d9b612a58d99d3243954c
SHA1c961e9bcd2bcb82917852e551d15216cc6ff7926
SHA2560855e4b5ae927bcaaafd3e35e6b63b5ca591f119c5bde1e681bf4860f11787a5
SHA51266c86704a927620a6a8ae90b845382a4782f6d8f2e256b16b7e0af4e5112213deb01bd33e3d168ec5263a610b57245aaf54c55bf106d530f2706c04ac51027c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d047e09706acd741cd3f40661404bfc3
SHA14ac1bff6799355190fd4bed965f62127854afe39
SHA256471cf1813a6eb38dfb135b37ff193e00597ff988ce989b62982dff1fe6f69834
SHA5123db17fb9679b7be285b0cf523f1c211cc0deae986601e2e1d7c24956325037765725474f29d6b8ac792cf5b777156551ddb514474cd414f0c9781eda4dddeed0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b