Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
ce1e5fa6281dc16ea55184b5cbe4a222_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce1e5fa6281dc16ea55184b5cbe4a222_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce1e5fa6281dc16ea55184b5cbe4a222_JaffaCakes118.html
-
Size
2KB
-
MD5
ce1e5fa6281dc16ea55184b5cbe4a222
-
SHA1
cc983516e891e1a42bbb97f696a01c01218fee0a
-
SHA256
eaf715379c2b9a759d249d68ab81f10387769fdd3698694d5ecfd4f49a252b94
-
SHA512
02b8f9b947e978b1172093133a18b13255bb8529bb08bb33ce27c6136203b592ba2ed76db95dc4b9cdab3e65dc965b005f22cc07270a069eca75af41d378ea9b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431739431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fdba41e8ffda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D1354C1-6BDB-11EF-99F4-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002c06f450ee6c470f19701a21aad0700126fc644a253f3bf3b62d784445f11300000000000e8000000002000020000000655e57e18d9131148afb1d76b6eab95b023d310c8855b7ac01737da4fa72f90120000000143699f906b550c6407cdf17f51b6b735fcbf2e6dbb9c6770a19887b8c69f32e40000000a7b30eac0cd415817e084b33c3e5525fff3dea966f955f7a08e140e7b00635972fc84b8a4893cfb259471af09dabdc548e3ab0205d8b61b8dfe62e3ff6d66634 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2436 1680 iexplore.exe 31 PID 1680 wrote to memory of 2436 1680 iexplore.exe 31 PID 1680 wrote to memory of 2436 1680 iexplore.exe 31 PID 1680 wrote to memory of 2436 1680 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce1e5fa6281dc16ea55184b5cbe4a222_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8b17ddf16bbbb1bf98eb31f29cc1a5
SHA139881bdc512d12b323f49927dcff9438eca5464b
SHA256ab2579c746958eaa92a9c3aadae8a3244e84012e68942052234a58f665b66bcf
SHA512a9eb0cd6a69749c98da87a5feaf2d80dbdd6501f6487f65522c3cd9f79fb9b1851596e8533b463e460db93464296d3a2b1f2d5a1ad1aeed011f2ca0872a07b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe6c1a3016ba80b6c1cc9d67718af62
SHA193be6f06bb62340240cf6fd81389ac571660b596
SHA25606b6a9dc9780698287afa667a7a9d91178b67eb8fe214055f313ed8234261089
SHA512b8fc665a77b8b0630196c9ef070e074eac448fce0183e3b7dab27b691a9adbcfb0d6066edeb9dc756f802871c66fccbf508b9bfc517352e1a502e7b1376dfba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849af9ae22e4b918c1851bc621ef57a8
SHA13c5529846d2e29048cc5d1e08cbe581f08204876
SHA256206634cc83d553dd419bfd8d7f63eaabc1277dddc687efd9d7c2cc58e978fcea
SHA5128bddc54b14a90db1c76c8732f281ba9c9378d2fda385de84d8ab000aebd06baf8390c244e7a03354051430e5ab9dfdf00409b0afa99a50cb2dc8cc88557fbceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976613a0b846307ee8c1d08d35f3e1c1
SHA170478bba2f2380d7103727744be16528f2c2057c
SHA256ce51409217645c361dad13d2705b00b43b60adf8e10d549472dbf74bca592c2c
SHA51267f59e8e3340dd1b73898e42991fcaac8addccb9e8222db672112e048bbaef8cfbd13a89622c3f7efbb8e7233a5dd7f27f24eab2145b58da077ee7d09be2137d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57637e1e39880fdaab72a052ee956c9a0
SHA18d5538ed208e5026eea0540817c7a311640cc306
SHA25612ea75608978aaa8c54fe0eb19ced4dba578ef14021e5b3209dd928e7ba5c089
SHA512a25dd277d0b89c4f4c5254b2ce304aedf00434e91513344fdba1a7750dc4448298e1fcfd3c083e7874d3434e71c8732e9fff05fe4d9dc4c36740ed19570ba1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d561f183cb5934e8e2efc0bb93af1e
SHA149953e3e84c396656af0c26da59ee3f390c12213
SHA256ebe3288d90d8dffafac63df542c6dd5381d6bc7439c0d9d9dcb33fc78317a553
SHA512ae45591b8fda2435ed0f7da842a6b1a415b3bac688ecf35f4f8551ec0151d661374da31be350ccba9a14e423c36937c984953f13bdebfa8e4dc05c4910e39a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233ccd02f5e373a36d5484d9fee327a8
SHA13f811fde6a125d122795344281659bf2820df968
SHA2564291dc80f1fedc28847a30d5c8229964161b49f635d6e387877297c8a913d938
SHA512cf609fb92d9ffe8f46d14b434b3e0e5f97619792325ed2f42ca7de911a944294295434f09292a8013ff30842de53184fdecebfc34b5344cf86769cf5d1b75861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902218cff40bfa6495853fa6abb9bf0d
SHA160f7d5b971e2cf9eb5dd2a1be24407e25d4134f6
SHA256c344a0691798657dc7c7dc9731e5244165bd0e6aad768283408b277aa4e61346
SHA512330c32f79685a7207a459d61df972edfb5a5cd451f98aed14364d306a53457b6e46dd45148a134971bc65f2aa9fa57304a362e9b26457bb2149b40c6505a4a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2aa0684e769d394118f3f587bea3c9
SHA12a3af1d2b63f172634b8112f97f9d58f2457273d
SHA256e270a6e54681b02333f7994cd8f2bc47cced68db4d0d3199ecdc846f70218ec1
SHA51269bf5aaf279ec59abf81a37e6ce9301c065c99d449e7121583cf8c2aa5ee434eaeee55196fd74580d2bf1e63e4ea0feb305d6cc18550d82ca38dd6028c295699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f69141c86cfdf35e1dd1f890b9a90e0
SHA1d97edc2dd7bdafa183d3837bc06758169a6a2db3
SHA2566796f96d3cebc5727a6fd3f9ca801a8766699530b39b580a2f2c62955a336994
SHA5122a51a5cb42f2bf0463dd7fb28783179b3c46d7c792517ad3584fce6956529da27479c3cac5494b13370fdbcb7bf37a741bc30bfc7f268687e8ab3f5f06493147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a9eaa18e22bb1ae022491859b84667
SHA11c44d98390891c798c34812e32a3f3d830cec612
SHA25656dd5fc0f0f824eeabf572cf8653527618478cdce76fa9c408a2f7ac97b34166
SHA5120020304549a07afb78c8b41ab845a2c69f4ff416828e931bb03e61dc6e349073959a82dbb87e4e5dda8a40c36e9ddc1ef434cd66a7b94268726a330e6eedba9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6b75c9f4af1cdd7fd6545698c81063
SHA18850304a4f30c30f6f7d908584bec4196e0b9f53
SHA256629d86c5c00479810298d2750d0e33d949584a91d19a14e5c36b886c72a56c4f
SHA5124d1401ea65b057dea41d39f5534dada61690a90e541d21f3097d3beb75cef30956081d7bdcf931a6a66f25cade62deadca7dc9efb086501e0e4cb1a3dd77c280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547153239e6db2ff44f36fe0485626cf2
SHA1495270593eff1957c5ccde0c9fbb3174f895c7ad
SHA2567d614bd7225fa54996b4ff66dc2c136ba7cd8684712559816eef4a36261335c9
SHA5129605c052cd55aa7bd00396c42a086f594a5b3d81b910ec664045aa0949d7e0da4b021de9cc3e70d25dbba2807343886d2140d58298f0a59661475ed9c8b307e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7386c68f66f1faa02b092e423aa161
SHA1944312d06760d6d54dc136739f3e73426414ab7d
SHA256c954fa830b7764306ced96aab0f1538fe7788dcab83ac21f3f62f6709f8058cf
SHA512a98582ee3c56b73d235a28a16ea72c03605c94523a81ce63647b43b8156e4acdcc2710a144e010a42d63123f1fbeb173b5c448570415a5e6d66b21348f53d493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408859484675e9614c625c206f933836
SHA19e0e2773c863aa169ea0caf5f696e510950338a9
SHA2563266f5e4af7928ec6a802b15074cc9e0c5cfe684ff5ab927244b82d7e8373746
SHA51299593dc715279c96dd5f559a46e09104649de6d14f5c10dc7422dedeb9b8f2ec512e042a09adfdb37e1e16a02fa163b44ab641ed6582637fd8a883317e88c76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d82fed149a6d3a94a6615aa3f888b17
SHA1530962e9e7b46da50e4df24ad64191ea3804df0b
SHA256044ad148fc65978ea8950dd5f79bd65b3e3422c9ddab7524ce94644d359e1662
SHA512e88b53ea4ecabf280b0f3cd4384b7f9a9ba6bce6d1c12a7f50ea63114329b7dfc9df1212117fba6b4e54e4a7d78efba1deada66a35db026086680d6c0ab3090d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f636c5c086e6d9eea81afa8da97239c
SHA11035c18628777b4eb075e1c08a0abe9be69ad0cf
SHA25634ecad2bb53a53ca4c72173d1ca9687ec92205d14969e8848f0d0b02770fd998
SHA512fe72b81637697a5c8d4485e974484d906cd4f16ce2e1d8cb32c61a66b84e8656ac0bd8b40019a509d9a1ac5890defd20602018800207c279ba03b6f6cf655e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d60696e7f48951dce3cefc1c795afd9
SHA179cc44b4638a0df2f4427c40484cc99b17e7ac6d
SHA2567ade64fdbf5138634e0b8d1ffa629a1ad6668477b37a031debe7620527df65ff
SHA512daf37ec746a27e9228a75ef5bbafd73b4cd2c5b1d300ddb0145c5dbbef183c3a012a503dcbb6a4b10ef2de0877589ac9da40398596f47112ab558be2d78f2022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4f912ab2fda45dd62afc10a85fd226
SHA17122b795933d800cb4ccb837b4bd28df72a2e826
SHA256e30db6b4a16caf05c308bdc18045d4ab97e82eda3d35f58c7c07915e592dcef6
SHA51220aafd93ccfe0780e06afe22ba1fe4783cb7dc71c7adc4aed5e65b57c6ebe0525eefaa845527cac42529e2d07e5fdbce18b79b1d046cce70b590a0420ba58b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e043a148759764fd48edc1f42cd2039
SHA1b8cb54318150bb243118f8a29957f52de3f5eeef
SHA2562a51daf20b1959d3a98fc62e15867603a0ecf71f593678ea4a2786c0339bce9d
SHA512a554f8d02621e1e88ef58d6bef8f424e1696fabc9aa671351952cc2b6ff98519233d1782171669e126de5e4db77f7f46394ad79aa2d5eab84a162f9be363986c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bb73dfe4391e18e9102ffbd28cca70
SHA1a7d0fc5d6681e85616be25a46142b72467873199
SHA256d5e1e65081b2096d56b66e8acd5e4880bc5d0f547b59a9a4c878a668b4a56bc9
SHA512724b5da140b67f752d2c1810566843428d89b9b057bf56ae0cd663f72fbae4ba1cafd2b710134530cb2fc0a49c131065656b3402b3281e2c88ea59a3683bfbb5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b