Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
9b58596431968100f169af7f7269d69b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b58596431968100f169af7f7269d69b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9b58596431968100f169af7f7269d69b_JaffaCakes118.html
-
Size
94KB
-
MD5
9b58596431968100f169af7f7269d69b
-
SHA1
77be5fac90a94ab1c5a08ec2a5bebd7b6c0b9528
-
SHA256
d7861ffb74613ca6740ebd195b48ca648a77585d5e9ce019dbfdd01cd027d536
-
SHA512
e0b30c74862ec6105a949b5f45da9a1683a5cd0dcf30984a830c721d132c9c1ce0bf20fce0c3801dbde34357581a3e91b079cd3c88d31721634a2e19dd0132c7
-
SSDEEP
1536:WMLiN/HjS/rf9jUo4Tf4FLUUK7LsnQXPUyzvZyTBdkrY8mgHC+qpEyW:WAiyeKBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{756D1B61-2748-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000afd5e03d58a8a04b99f8b4cf08b4e88000000000020000000000106600000001000020000000cd2820694774ec79c42f1d8483928950628b31f3086d0edfb5ddce248a80b5e4000000000e8000000002000020000000a879ffb1f472800c49298816acf318a5ea09f6485040f9ad91b7f24ea5731c81900000006d94e9cf21a313f622aa3dd2f4511069719e583e36b8feb0af4b3acdba4494feeb7d960526e0875ac57e956e8c28148064c55a0aa91e81c023ea5463f6bedc0d74e60fe9b68a23bbb14e0e179660d27ffafd08c103f0c3695c7419c3973feae9f5ee5437ed355169dfca5959d1eb3e2ef6694d8ba4fa2efc6d72dfed7aee4d76741b0b97e77b8374c44032d4caec7536400000000bd1233875f8b46b8a880ebad78d47e440c5050909da2f63e6f1c4c0829d39f556e2602200d99a50ad695a78f9a3f116d084d32bd0f2c2a99712794904875c6b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424199631" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000afd5e03d58a8a04b99f8b4cf08b4e88000000000020000000000106600000001000020000000d9585a84fd20d45d66f8a62ce474b76e92fb6b10f8d1d262a99bf20f5c49984e000000000e8000000002000020000000f77a892522081fc71dcdaabdefb70be17c098688ba780799397d4eff9db22561200000000866ff2450996eb2677b2162ecb2345cb88a143fbcf9c3074b5f332111aeea0040000000c80cd183c103a516140043871357f360b94c96bb5566f3160789fd2a5a40f1dad291d002e44dbf7e6145ea198c048266a13b08e05111339a5e19c63372e5890a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cac74b55bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9b58596431968100f169af7f7269d69b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f5b925d4920807bba3e033dd3c7f82
SHA17b7aeab8ec0d5cb045e762335d64af7c213352be
SHA2561fa6a91cfec6134b9b7c463c16b55b2731e9e3a4f6d0247e91c4304edc29b1bd
SHA512493c12b24eaa686f1f524f1305d98404c4858ba4132a430f899ada7872dd4a1326ebb8325e7fbc5d4f4bfe0d8bf75818833bcf28208366e69253d98e074fbd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594205f57665afc9c5c37693c075f50d5
SHA148f82a2ede859a889277428c24e6f6af7cf2114d
SHA2568efef6aaede1b871d05d867ae4e4e64f3e368cd7ed78586b697578b366909541
SHA51267a3ca311d185978c252afde15533952b2083f55e31bac569656da610bf4aaa481983cdac8b2c13cb1693261cd38686070e1e0ba8c6817145457e83e000a4277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d31f1cd6d5d2d9171f9a05a65750c2
SHA132a8adf5188ca299822816ebacdfac6c110cc284
SHA25608546dd605d963e743f4d1f3ebdab51f02165d55968bd448f281d0fbe9ffa392
SHA51287bd451cd7616f6b611a2fc544a8180519e51da55095c020e348924ae48e840b2230ec37931034fa5bef658f0dc03fb56c24f0a1c1bdc46974f0fb7ccb5a1410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50221ded8de5f580a3c6e088f5e2656bc
SHA13634accbcc6b7fd4451dd5bd949031991ad7b98c
SHA256654601def79d1f1cc7c50ae700d3eb0e9d41de1dcd75f78ef02f979ea8c4ac83
SHA512c81c255d39db393e5a7ce754d504efde161466a785cd5f0334ad86848d9fc1087917091524a98138d073f0cb101c5870b2521f7ff54b1c667a28567cc0d13dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd571c6b197abf35c94031e4e3a51f4a
SHA1355bf0c1f48b6de6a5db64721e51c5632367c168
SHA256a5da265a43702d031d86bbdf0c74620b09d34aa1007ffe35653b1e72f60b67aa
SHA5126a89a5eec4c9e35261b3616a2f08af0ac9a4254434d4a94f229121ce8039d5c71c8c64087318fad46a01c22fe85e916daf2b5d1f4406275cad7f3224efd43691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f280d6aeaba9df148c961983f8c21095
SHA10611fcf278b00927d7414297951bd73021238cb3
SHA25637c457a7abb68b9898bb3729494c6c66ecb150bf660ab99b58a3d1f1820b4d65
SHA512897cc22f8deb29c5de3d13441062deafc5838ad2e62de682476b026e32578be075b4b581c64dd43eac559c13b7039d0f6a4e82cf11884629b9d8c530e877d63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f2e1477fedf5c13ddb48e7844f8312
SHA15280c7684443fd9654bfdb438b747257214371b6
SHA256123a0f20b7e73f0dda5c25a3f8be630222cd2db95eaeb7116afdef8c4446b0fa
SHA512861f0723dbb93b9eb9336e5175249e54bea6dcdfea24038a23ec65a71bea11da345bbc20e6180baf637cbe5bb7e7f35f26fc11ba3831f34a833c262f7a07efac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d92483a851cb8c7544515838f9d903
SHA1a83c95c6a0f31d2cb6111e2a637759b28d6ea601
SHA25637c83c5db55aae30512b190cd27a50bd865c18c17d1d9d37ec703f67d3c5c31f
SHA512fe876f96e6a62195891f6fa5f3e48bc5ccd77630cef4d5f9892c5873e43472b3fa06eae74fb67f07dce22bb7e96fec0837d81154f33ed1da413d9bf60007ee99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b725ac8bdc307dbefbcc3060ec8f13
SHA1916b13f464775e369bcb8df4362827d275fb5fd4
SHA2564689d62538852c0b5f5ae0751c05de39b1987158386cb3192d942678e575f813
SHA512b3ed013c537529532d27ed9bb9d85fbd1b326535e3c62bbc92ec40fa951cf7c564fe6ebd3d3c135d904a64e12d14ac1c3e269bdd8b78490f66c4941b4acdcc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b6cf07ca7e3017065eab78e5784a1b
SHA18520fc8249dbbb8571560fc2eb8e48252b02f94f
SHA25644bdb17ac81fb76605571026750d2cae6e5a4156afd9610d4b992edd1c850af2
SHA512bf3f97274ed20fccc4031e021db43702186348da5f8d53047cce459a80296c3a8fa32b7a4a33468ded8dde314e919b1a5f77106f897bfc91ea9d8ffc304f5254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514643628bf461e66063f816a2d968d19
SHA14d45a5f401479adbb6d44cef9aa38b947245c596
SHA2562fbc094d4f131a1351bb77e08692b8e2e4177ea33f41bf750f1972a4a718e1eb
SHA51205d314a66d1c73b2f5132d6776accff1c0aea30be8f99fd0838b30d42345bfcf5ce0140af5b4cabd32f606b3c271b8d94d80194ef1561fab42893e9d1ee4bec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52236263a10406a83302f105e409d4558
SHA1516a348576da3cf16f89eaa05255dba11c6d0057
SHA25699b5ac8eeb86d84f6c1860863737d2b5968576c017310b40e3e74ea0b56a31d7
SHA5126955d740eda366a1810adb8e0aa32cd47334a3de4eac54665b96378eb1fc37070238cbf5177849d297fc90a18a1284696f5259fb33596b5202210eebb75c64dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752fdce3931f370a0cec2b261c912bf7
SHA1294b05ab6129167af4213eb67b9035074cc1c0d1
SHA256c6d41a1dad476c3ee418a6b25da018ebee40709ab59124a682c0a812b785f555
SHA51279f9549248682c8f100d8cb81c0adac69003828c3761d67e4b8349bb4c39449dfb86c8fecae0c476b0e9ae4bc19215322a53eea5c5cf2f2507ac5d11c027d6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028aeac8a071151eb034f36615667f44
SHA14750f0b4a4947851b54f2dbcd3e6665b5d860598
SHA2560bc94cd02355ad84d1ac1cf4883134467246aa8196880b80aad04bb94b57f368
SHA512e30479644ba24f5739fb6f654c4f6ae9fe260ac5a32cd8ccd2050bf8578b5e2159d1f2f66bbd7b1640f0eb9b069e2c15c13f6c522b2ea6b920b19697cfbede0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec3df161e89ceb39e0e76290c1b0e03
SHA1038ed4dc2e0806e943de2b3298f5333812db65e0
SHA256828e4b44f389b771b167c1cec205402229d60145003e25a0461b791ee58480ea
SHA51279e89aa059586a6875cb60375dd6af2f6ab79f5bf657b8bce52a33403c77f310f145bb1ee6fa13a2236f65332affdbff230e3d78fa47eae050ef114f3f67a306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de370d35c9d6646e7f32c52286962d0
SHA11169f76e28576542ff0522493cfd0a0038eb675d
SHA256aff6ddd1bd50df8c48713be5e1dddcaeb876ea2e7a72c75661472cd9917fcc06
SHA512334e40619ed3acb455cf3aab51caa076b465a7728bc08427a2107899e9c064468d9f984912c0b826695872dec28fba17aa3e03ce279b4bda8f710072f7cc6c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b06c2e90f8516fcffb6e96aa7b0a46
SHA1769d835bf319f84a28f82b0da009b25e49e09843
SHA2563eef1fddc79885092422b759f0385dad270c832dc57b548d18347e3cbb404aac
SHA512d58e079d502d9463c862cec69032ae18875999d8f5bc7bfd793bcd56551f2e7392801b997086280956afe8e9926ba5cad2ef7d0a0f61785238b49c25faf7a907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443a942cadd2880eea9dd541d8358d18
SHA1d330255cf8fdca8a23e16f1dea3282c9920e143d
SHA25634712f1fd1d3802adc5c9c15166c99b75d9a28545399d9be111432b90a14b552
SHA512ccd1efd037895d01be1c95c016bee212651a97d4296db5ad79d95823a34086d1cd4e633c90b9a5785f229921336f1f1b2c9936deb0c24da7bb88e4e12f6473d7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\styles[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b