Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
cfb72e79795773a7cb0a82043c9e1463_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfb72e79795773a7cb0a82043c9e1463_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfb72e79795773a7cb0a82043c9e1463_JaffaCakes118.html
-
Size
96KB
-
MD5
cfb72e79795773a7cb0a82043c9e1463
-
SHA1
89c011fe0be4e8f23893f34eefaa24729b81525c
-
SHA256
b04e28fcc68891c30c05942af4cf4b72ccb6edd3a160d07ec410790094560e3b
-
SHA512
01ac2f99a8421e9ec4e779b6fc27a6be97e5f33fc30d214f5458004956212615593fd2faab4ac8389a8617f981dc10486bae209f5db7957db7c59ad9d8a8aec9
-
SSDEEP
3072:Y5lBZvqcyGhWQHx9g+DuMFnVnt799t40cbxpnHjfGFCcq/0S8p0H2EaV:Y5XDuM996pnHTGCcnp0Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D468FC51-6C59-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00e04bf6600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431793722" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000048072e1e754f6596b357c98822e13e0e2d41d610281f8ba9e9d4913340051450000000000e8000000002000020000000b85b50db682a53b2bf94f3fef2fb18354754d36a6f6563911c81b44eae8cb87f2000000073cc8cbcefd0d807a13ee016e86cc6eefa33174982ffaec103c65a7e1a2a6b564000000024501c8680007d8aaacafe0c12e2bdba902ef80f77d291ace33e3d640c478db93df4fe169665a1c7077cf01653d581bdbac58c8d20a7d4b6f2e594fe39b2ae56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2712 2148 iexplore.exe 31 PID 2148 wrote to memory of 2712 2148 iexplore.exe 31 PID 2148 wrote to memory of 2712 2148 iexplore.exe 31 PID 2148 wrote to memory of 2712 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfb72e79795773a7cb0a82043c9e1463_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a56e7a587cb18551e1e4f50599fdc0a
SHA18609d7f5deef2e6b1eb1bb3410074a5087d56736
SHA25624581a5be968b3d87f149d9e7bcfc6fd46636748806238c486d3e93567c49096
SHA512b22be699c23b18a2b40c91a2076086556faad1df0f9afcf468cf0ab98a9f396d1e32a7a5c9537fdb728310cb3bafab9b27cf57f846fc65889d9cf4da79278c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527000549e279470a4a4615596ba04d2
SHA12f8fa0f751c58db8f8b5c56289cfe7aa24c655e7
SHA256bb04898eac0387c2f8a65e63407811725067855fb093047b52721be08c03ed27
SHA512d1822d9a1b383e77a4ac374f58074740a193c6bff78d9996b9f4c5fb6125e015748e61bc8a6b100c586773fe60fa73f87e21a402513da33b3c7934251fc2e752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37b98d5b00b77336f46cc49b709351e
SHA169afbbafd1c94d984a0bc7bddf3d569782cbe5c0
SHA256d3fc90065337f0243c02e08cd340b72ada2437ef362e2c92a79ec311e61312c5
SHA512befa5ee11c6c4eea54942a604b5bff28c5b89826da4d4fe7ee90f625d02e2378925583181e5fc98151dcb3f678a62f5718bfdcfcc9f253bf356372408e10e0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427212bb8a89ffe791f63ad523a2724b
SHA17b510a757c237987ce3937f48961c888615c07e6
SHA25698b24f43632a2425bdae06eb9774fee4eb5e48075b074e458a890c6988b7f229
SHA51245c681f168215e372bea309209299653fda1a60505b0b885cb263819b7b2aee48bfb625457fc271f4d5200cb248b12f4c3a93ecb2fb80f32f97c0a3ef8e44eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9988d19d8b1c3ae6090625fad35d26f
SHA1e9c3aae1fcaeb09c3a80da0482e99df66163feb8
SHA2562d09e908e520cd0fb1e90b4981a32be301c1e80b7f15ef3465aefcac74a7d1f8
SHA51260f132e7314f6ae0632472868e49de8d573aeb732391c3dfa8820986a7af7a30f3099b2a14eb60561714e46fad432fd9736d462b0cae623d55aeb93619f95ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192a4ef3317965570b14628dc3315f69
SHA123a783c93a27e2b620959f4d9f132061c40100a6
SHA2569c9ff82c4a990ab3eea209fae28f1c8d01974f04e62d9a0ae0df19ddf55b45f5
SHA51295ac0758ac0f8016219632798ec45d87ebc1f81203f3b68096e7d020a3eb00d82264b2ae8c5d16c55bbac0098dd4a69f5183b5c3f01b27069f204f0e88c34c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574eccaba06a516e354c183e040590e91
SHA1dfb8c427755ded296824905ca954973cb511cd04
SHA2568c2f029a165ef9ec0e03d6c770d0ee329fc1eccf5210e9e8b669a3d08767856f
SHA512f1b544d18898626f0df968a6b8c7b652e171330d22ed8913f4989bf328d5c7cd384ab73f267b424cdd294862cfcf473acfb185a069455fbe78c48ff29a880bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b67fcb91c3310f71e740ad8688481f
SHA152a0a751c193d61aab6301f8cf01c42f2ae177c1
SHA256a90c9d4dc805fad6747bcb8ed7688cee2284e9c680b9f87912e6c0721f767a1b
SHA512866a4051907a8b68ab4abe6bebf7a46f2652b6ea88fe97153fd844761323484a62b3e599f1acfd52585067aaaf2a6a0c51e8c2453cd4a15b1417cf50cd773c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c07998790281963b30570735ed216d9
SHA1c544a068e6027df3647d702edf8b2159935c8a1a
SHA256d6b2200d7419e69f783e3ff5491490f3ff08f3a51b563473105af68dd66c1751
SHA5129c12b05582eeba1bd60d1e66e73e1dc890673436dbd5888cc9d900b778ae2f72740b5be36a9d9e881bbecb57f6d20d352f5ec8a973dade8dbaabe8d6a3d0d65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeabf55248ec66f0348e1d8fe1a04d45
SHA1314106c69e8be91472c1d57e4449dcb2f63d4d13
SHA256cf57f0d50a2a7a07b2cb45c42bc8dd36a35395f42eeef960182317b89c5247ff
SHA5121c8e324d96f3afc0d994131b088bb2dfb3765806b470552de9eb3facd9298d0fda4988ff842cb6e158203dc3afcaf2b7933263a16c5624be088a2aa05ba2f68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55955839c0ef575482653c649c4e321db
SHA17a15342209ae3416212837265093bcd61a7d9dad
SHA256fcc1d250e34093d70074263420663caaea1a969d8b6dc73d754bcff962dcf1b1
SHA5128294cc9a9380659a9edfe36a768846b8b070a50bf55e01a0699868cb24063734b7356fc4860abc649d862b6d87140c9e4ee63e5de8f2abe494962337e20c1b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b273d59abbbd34a60a4110b5f00a39
SHA1efd40e7857e2704b5536f91448f61032f41b897c
SHA2560a36bffbd4ade673e3b111968ba87fdb9239fd8fd7b6a4a60fa6b2cf3923dcf0
SHA512ccac0b782a1a45ea2cadebe3e5a9a5f30b7ac0279c0c0cc7a5129acc21e58cf3a36c4af0eb3477657a6dc26375e2c4b682ab556586af1362f45b95d5dd2e6a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269aefc2e6be99c6eb981fcd78a1081c
SHA14a1fa15a2ed6351621436cf3a516c4ae755bda2f
SHA2569ac0fbeca914fcb73931e59949f58fe4c718d4ba4d43d469321aa819ff65093e
SHA512da8d85f6105e8458c5bfb1bfcfa53069adeeb885ae8f824ac036f937f8d05ba1f644a9141624c7fbe50dccf079cce9650b51b137a845039fad2977eb16b6a439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84acf0b6a9d88e95dc4cadb3aa12546
SHA1ba214e5f43549723cbb5425c024eb94b0f709a4d
SHA2560dd0a3173bc45c1a78b68a45834486b2271d37293a318695b48196f51f02aca7
SHA51229e42924f79c66f9011ff4a6be02631b15a006ad3dff7062e5f6ff5fa0f54ff932861460422e47c511f3760dc79d0f7c3d692071e5ff8b8d4e47efe48bba57ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df98d52bd89e9e30d8932f6da45338c
SHA19a6d2e310228ac7f3c341e74add83831c76eb71d
SHA25687de88313cc45f84cf7e2721973999979f215fb77573fc65287ce0e84d4beae6
SHA5120e72d563b74eb9d06bf892a21dd4d535448b4925dfc13295d8053f411afbdcf54062b26b43b4e4c587138898083feda3c8ec25b61e03bce33adadaf0228f7d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565aca215f8c86ef6c7f8b6a95f66561e
SHA192254c35ef8921f4a986d3ac6e578ec5091e79d5
SHA256f16564a6aea988fe739069e5870b4d0dd49abc0ab27e4c896bb766fcabd7b667
SHA512f051f611a035368ec00d759a60d1d09e26dcd62ab170dd06a7cc3cec481a1faf641d70dff3497febb56aba18d62d9bddd8f0ad131ac3e65a2495c45242b92600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef702d93cba75463327e19aad899379c
SHA10e1146cfe217d68e8870355c1425eaa00b0c44fb
SHA2569ce80e9638fde239974b489695098a9e535179f0d3b633c1da51328d96bad975
SHA5123671058873a491dd16a4d41a5e3f438d02861b1fb1e59e88fb61e026745cb634a384fa6e59a76f750223ff32aea5cf619da43521cdd6c96f9f694baa0ca39847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dac329e87c2c579bc18a46fddbeb031
SHA1e3f7e58214bda509435f208172c87be4a381bda3
SHA25612db60b26a654058a497f2cb43455b12067bd37004d3df1afe858c0980cd8735
SHA5126b88e27f2d7c9804cf0b6ac39d60c0b2203bf347c4a4676f83906e855bcda665aba6ffa16898a18d78129cda636d93ff7bbf81cb46a849a75fb33b4552f618f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957f09c99ed5888cdcad10a8bc4ee419
SHA13a3938292a9ddfe4a04392119b64ea45d5c24a7e
SHA256852615226534c2554db187c28fd5eb5abdbfb579030c22ffbf9b77224473dfad
SHA5129492f0c756c080cd4a2cd2329e097a9c09b8adf792daf160b8b82f889724b9792724855c0d7f48ab27a8fcbb95550afe828762b64bf1cda0d34ea778ad6153c6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\f[1].txt
Filesize100KB
MD55568514a34a64db40204e89f78730f7b
SHA1293e00e1fb8b6ebccef8d39e88fdcaeb953e55f3
SHA256731edf2fc40409136ab98ef5adb9a2e9c3ab73b68a11d1558c824854c10d2881
SHA5124755b407745e97cf72445c21d461ef44f3189b53e9e0a509f0e8f4b35c4f2b6a293240069aa0b23c5cf8bffdb14615a9cd73975cc8abaf8c86d057159176e359
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b