Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
d388d2a348c10109df8b2a2b31c32e85_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d388d2a348c10109df8b2a2b31c32e85_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d388d2a348c10109df8b2a2b31c32e85_JaffaCakes118.html
-
Size
24KB
-
MD5
d388d2a348c10109df8b2a2b31c32e85
-
SHA1
add10ef177928291d78072ce7da0a245a3020c22
-
SHA256
d82324d3d164b2218c10ee3900162216df9a538c7bb98a42a2735adbfe5c9daa
-
SHA512
f443c45de948f7f91a99d1df57cea53c8641dccd3cce3ccaa0578f1d75bfbec20fb18e8380511ded8e7ba36b381a93ceaedab8ce8a29cd034213cf7880b895b1
-
SSDEEP
384:tTlIcMth48RGTHXf9QGhty9ikTGgVti6N/gb8LOXguLZ:iM+g4ExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431931402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64135351-6D9A-11EF-8334-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000038041e359f0fa3f0d5d664c6265529cd89a3ec8bc88e732dc85d025bede9cbbe000000000e80000000020000200000004e493268443a8390fdf1b2b3f8797eff5aad84a1553c603345be012aaa6cdb909000000025f5648af8d44fe8111db755e9e0878d24182f4401a212e37b2d321f291a5c2e0a0ab2f8564a45538133ead781a23bee6af097c915dfcc0535ae394b955a0ff0930fceda2e47afafe22a00ae1bee8c6a4fc17ead8af7889965b22dba8eaa0ed55fec83746fee9912d177ece15c589f953f6c4a012e6b7c8bf0b063f34cdbfa5ad843058f6882df4f8f0317c852743aad400000007504fab066e32ae3351ba477c498cc6994e18e7a9d6a2d5ab29db1e4eea435e7f79ceb1eb2b38326ce910ab83c7f7f010491066b3c9df239f9ac11eb0324a879 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008ebeee9b5f7e9c77c3a579acac98e9c2b2edda4ed628274edb7ac6e66829bb11000000000e8000000002000020000000ab7b67965fbfa7439c877dc9d346ada483c842b93017cc0eb95e40a51a3e0df5200000001089855db478bed2848f5a5a15ad60ac6341eb1258f438cef68bc8b4dfe8ec7340000000c9c26b0a419f922f8215fde5c40960ccd76db57e3a22778b4dbb0ab6bca7a024ce1314c3ba73c10b92d12b0280a5a0d1431c6c99fcb4a09fee8900f2dff62dbb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05e9d65a701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 544 IEXPLORE.EXE 544 IEXPLORE.EXE 544 IEXPLORE.EXE 544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 544 2316 iexplore.exe 30 PID 2316 wrote to memory of 544 2316 iexplore.exe 30 PID 2316 wrote to memory of 544 2316 iexplore.exe 30 PID 2316 wrote to memory of 544 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d388d2a348c10109df8b2a2b31c32e85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7cc536c8c361569da069aa17a9d3c5
SHA18b488854c476461cf41f093d45dfb70cedf4b994
SHA2563617025f736650177b0d43dee33a8d6a041644e5555414f72ae34b13875aca51
SHA5122441e07380744dcf6d79238458495f8df1bb9c472e74b19bff173f768bdac63f278eccbff5b7b030dc0fbac2f578b7ac534ac4d7078adb97d821c617d7c87156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564976ea1fbd298edaf3aa3f4083a818d
SHA198a7d768a295fcd50d7715469c3ecc9f60c4ce10
SHA256b5d37110483f282096cd4527ac9c126a9fe561dbc7cc121c8114e42d919e0ecb
SHA512d5bfb02c4a255395e9e5f5f7a2a91f73e08963f7486ee7006496fb3a7323cc415428029467f9e991380e902ea73ce781050aad8fdb6dd0c80ab37532c685594c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc3458b4820507af3661cf1d85c0cdf
SHA16331704357647942e7ef1f1588ef6454a4a5fa3c
SHA256d6ad73f80e4617d1ae4b3eb51679d56c88cb4b9236fbe5df84a24e4b8cdc23c3
SHA512da08d8ca28ee9c5de96206f4a9fed37944dc6bab72faca3e57e92ee54c86d55ddbd9d66ff4a64a80b0adf74d2f321501b4cf3ab6bb774796cf3c732a0891c06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ddf167ffacf7701e30f445c9f07128e
SHA1a4827469458608b93952e08af3ea1575474c2a04
SHA256fd198f9a65746a01d6fcbcb50004e8d604d5beb6be00de0d4740edb0228e5fd7
SHA512e9d99b37392bdb99d76ad28f0a76a1204ba1a88951489ecedfe0b525fb90d186d5175a3afa9f6cb94da341af4c2454cf41b0313347e922d3b629821baf713419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50912f11ee94522bfc5462e7898655817
SHA156eb2c3a5dad5e7fe32d8b3b0223b735fa9af03e
SHA256ef7dda1588dfe51af02e4a0fac3e607eda8d810e9d4dbbb7976f7666b8c38403
SHA5124d67cc81fa1f270a3b86586cc8a87279159b368930cf731e35c39da4cd4d38c4ccd31b7d4e7be8069563a419d387839ea7d4a830401a8d0cbbe13fced5134dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54749a223202bc7165007f31057a9ee
SHA1e19d80149e5ae25bdb0cb0f2e658903c7f6b3437
SHA256f57ba7453163d12c5649f492a182f8f800d4b29af16cc5a8abb1b1ff043c56b2
SHA512cf724fea523edc5670460740df2461b5f271b39e16fb7e6ca18ef674c3954bce338b7236c6ff9c56df086cd8ee7ef9238c9022e02383f527dda8b21853653757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f81bf280f6d0b9949b96108ad84d4ef
SHA16841f87b4c1ea0ccb563a24591783c37a056da8b
SHA256ef2341ce0c89e31a17cb5a008b5bc2bcdd387b04ade7eb8d0bcc7a9bda6de2ad
SHA5123ec04790d59c6bf5b175e16eaace1b2c536c23692b65741e76b08b4c571bd8e0bbc3567836297e0ab7690bb84b1734b5cf155c55f143b2d563e55e88ec6f36c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6565fd4ea81c22370b0635becc82540
SHA1e42dff063d150e6a8dde8214af16c722db0fe9e2
SHA25680af3e0b15c415f18781b66b995386d82e50cc14fac06554ac9096e3f9ac2a5d
SHA51225ef75e2cce4d5718f331600906e9791b21ea9e9f018eaa6e56904894e2f0cbe9dd2ee59d5c9137dadb5cc1d25eb60e3745440111bdc03f53d74eb3a598a6d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc27515200def6e5cbe9cf0e47325dee
SHA15baa8052510b9e18d50aa56877e60b80b0eec71e
SHA256b2826d7d3b3c3b9792b1850c9a90dbc1204c2bdb6696f03e046e9d12a8c679f5
SHA512a9493d297c8b8e07c9f3b80aa75922d535f4beac8a4297e6578fc7428661319e5a53ee127f1cb34f472814cfadc29c3adcace25650134323f5650e6678a582fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596bcea3b5ec2ef0c9a9e18a306d9ec7b
SHA1f6e4dd1678b058f197a75ef48d9c742394b74d2e
SHA256d6b90157bb39e62e958f5518c2c87bfa2499077c3dd67e15a3b22fcbf0218706
SHA512391bb45a76e71111244cac9dcbc71fa9ee7c62fddf803538791529a42d85c05115dd91bcd1c3168c493074144d39ad16d0dd703f6d93913012808f5d014b7117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bbee2314419162e20e0a1e38866c25
SHA1145fcbe15679eb8a0e7c9044843a5323b905e96c
SHA256a8deccb064bf6dd092eee95b183c34d0fce8f7bac8fbca1ff86b2c98bb02c0b8
SHA5123549c4f6399f24d2f3c779511dbcf49f674cf2f6a7d7998f9090af59072d619a01037655db326128aa4227d939ea4b04d70e65d5548776453148f09c9458936e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a722e9562eb7a848ec001e057a7628f
SHA1d8a31979ac393df2042c30c89cb7ee84ccee355a
SHA256cbb653ed42e9754358f744c87d43097c5191dfbce4fcc90be0620535f356f92a
SHA512700556e1535e18a4fdecffe197fd179d708e5d9bc5a3b65e74c3518007353eef398cf64e5c503402ee3c6d10c63502587c2475adcfba26b0a3887332b6dff353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4415d47903a780b5a7486a47b17c9be
SHA168107c33be32b5ed1d72b8ace71fcf04d7017327
SHA25616d7d923be5047e48954a29bc55150e54c0abda52def6fc4157647d7cd7c53b1
SHA512e03dac447edb16496b8eebed97f6ecbb012c8998d89a215d3c74f954a8b16f6bef19bf9cffbeb760d9ccf159e765e13d168a96fb2a76f3f98171dc75d4c5b0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2c0d33f1e343b3a3205bb8b2ec609d
SHA180bb1930d01fe1fe6d2ad1b9434d360f5524a924
SHA256f13ef8ffbcae7b670e482449a009d41e49cd593aed2c406955b2ff5edd2f528a
SHA51248fc57c1a5f3ef711988179773d9404cedfc47765dc626f6be8ed1366e7b2a4860fc24725bd64580a2fc83ce6c3bbda97dae175019b75952e518f462735d4abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c7d959b44227e4b3d1835bb9f0b3e5
SHA19a8eb4bfc89b8f495e046fe7b7b5d411eaf163ca
SHA25625887e7d46d10b1a957eff9739c0d4377894d7533da0594beeb2d2ddd77991f2
SHA5129b4107486669303dffd40616dd7258dfe9ceb20b670a0bcfce88b0c14289cdfe35d5b0a984f7321495f5c70f0f5770031e109bbe776ee4afc5603348d3af7e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b3dcaa5edd34cba13198d1601550e3
SHA1dfb3bb4d04c2a820fffdb81d4bb605cd319895f9
SHA256a951b72a596b1170d88f00d348ee7b96b1d49366bf4314d8c554e7d8a9acb4da
SHA5121b5eddc22960fffab0ebac469bc25e07ef46485a3c35cf3ca63fb0147070d2bcdfd7aebae0bd2e428c9e20e5ea66cbca799ece3e0204b9247c7ea6d807a37389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0c2105c72daeb1ee70d66483c45ca0
SHA1f10c352d090e65bcfaf007bf2bb62a68790b2d71
SHA256acc3dae01e7bc7e8826b53a4027dead783b697a3ce1df421caefbfe3a264ec6d
SHA512abc503ec2d2a0cf0b1a34886adde85ae9a81c907d9803c5150ba830beb64f99fe8f6d027062496ccc27aea634fdb784841103ec765a98ffd952e62a8c3a4706f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0de65c40fc5c8c3faac00e3fbaa525e
SHA18e41d37b6fa794d346c05743ec90dc91f1c04d25
SHA2566e41db324903296900516f6c1125426747c19abab0a90eba915e22f758c82ab0
SHA512503ce2651014316785846908be3c7139e0243a07fd30111ca27768aaa93bcae686cf8c8b9704a5f4a5228068b15c44f038ff978a6e566c60d0638f340d59d707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506952bd1c233112f16eab730958c44d9
SHA1261d9b317cb4aa6b7b0e151c2b2e60a2d103bb90
SHA256c7aef24d7d2cbf7949cdec42dbd26590c843b1dfda146bd730aa99636a6cf013
SHA512b42abc45581491639bcd4f8a6c910c32f7c269b38a87fa8810c95f15a53d7d390ca477bd62186931543688ce7ba662f9c84004eba2485046c09df453bcfd50b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b