Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html
-
Size
21KB
-
MD5
d3d2c697a5b15ab6552ec141449f4e7d
-
SHA1
cbc964cd5b8320cee8d933cfe32619a78e931578
-
SHA256
acb4c1f9afa0811b92f54f3e7d0fca2e22a4df547fff67a46ad3d582810cab8b
-
SHA512
e0875884709fa84974f1708dd83e3abe8da9d67c6c4d4cff6da6ebfd676cdac58657d214e81e0a897395fb870789ce717b63ee37d6d43ed9f51e941cc5e16a2f
-
SSDEEP
384:QfRIjUDGO2G9kLL9j9F2OznaEUdJ11vFlFt9kitZbRJgR5MKxv+H8q1dCjoL7ZWX:QfRIjUDGO2G9kLL9j9F2OzSh4e4RWKxV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431941729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004b0e5051e43de33d546a658a186d6a6bfcf91ceb6761cd070a60a5d10b392ad0000000000e80000000020000200000003443319f152909390773955087fed3fde0065485b04598fc06a91cda39e9f532200000006fca0f554a6caac8588e9d59416d82f2d9fffe9309101bae62a64aee1279318e40000000f6bec092e47fb1d1d9ecb4ccc3fa20a4e8768a5a09aa51c9c1eff614eae6aab897d31ea9826488370fb75ce8c82be0cf34885b278462b286e725e5e9bfa8fb48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fe4a59bf01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6ED67F21-6DB2-11EF-948A-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2056 1964 iexplore.exe 30 PID 1964 wrote to memory of 2056 1964 iexplore.exe 30 PID 1964 wrote to memory of 2056 1964 iexplore.exe 30 PID 1964 wrote to memory of 2056 1964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54e11b15caa65a62ac1e2d6a4533310cb
SHA170722cf3901cea79bcaab2f0e83fb5e9fbeb61f5
SHA25634381e962553c8c686533914b4f1e556ef80a1ae51453640acf95b78ded9b47d
SHA5122e82e58b4a59aabc7e1e2fad2f1d8dffce643a2462bb3885d196b70fb1ae5451a3a197e89db26acb88b212e30e541cc4f52cc38307bb0f8a1d9d19777219cf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c53a6c76dad56eb0856db971879120
SHA1b44274de46f5664b0a189eabbad507b72a0e390c
SHA25642b13a95dc1a3f85e321fe73516925ccc59743e48e1bae6f1b4df6ce7b35acbd
SHA512200557b74b5f92d27c51def297ddf954e475d2d21658d66fbebd2b8a17983cea7fd16589667862007dbb0a69a4f6b8c1a4518282eda36fb2c776aa1bb1bb43be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec570009ac3c3ed53592df210553030e
SHA1824af56d9e8d918a7fab778beae4ac7f4e42db19
SHA2563bca136154261aac7ac674ecbc3e1cc437831c2c03b6022b3b3a0f9d2a836330
SHA512a461ac4d6fd2cbe87c1e3741acb069e1181a0b7e5c8e235f36b085a80299a98be5534d5737bfc3ac5f138985c53bcba10d6d57300534ccdbe04e8094f27dcd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aead406f5f946a667281ec88ac587dd9
SHA1542eece6db6360768ec3dfe97fa9d90b05b51115
SHA256ce07ad19b5bb072cec63b917dd1ea6361cc531f7dfcdfdeefb5c260945f39938
SHA512b4b9c0e41f9646494d92a3e31398132cb592aefc1d95cff3da8f32981e4d952384fccab8c68d6271fb57ba2c7ddc3a8873ef3e4ef26ea34dc0f0bc434e75d983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5c1d8848ca101937742b6cc876160d
SHA11f4ce03e7ac0105732c89cacdcea16f0b909cc2f
SHA2560f74a7ace69e3f62d66bbd74954ed0e9286deea2bdc7d7a37a9dff6104080c4b
SHA5128dca734a007809646e3fa3ba905daec17bc4c4e25c22277af62ccf6855d75c5210a6a6bd53f297072e42baf8f9a5241f2d9ed305361ced967346dae2dd5edba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7ab8619507056dc9643df69bebedbf
SHA15da75dd8ea67a9abb3b3a69c87e4d1618d2b1005
SHA2562996b02d76f3ca22b65fefaaebdc342b969288b6f3c9980d385d641fbd3d67a5
SHA5127ebefedc63f51d562879d224cee78df833a5f7acaf701885162dcf65afc7c44c8a5e3a3e8accd628c8003a5a4666c0e8d8c2947bd84cd063f9c53c1d4f8a842d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1af2bcbf5c044b2c2fef3baf95e7ccc
SHA1827c5b51f718b36b416a77b145bef8401fe4f539
SHA256b99832f2d9be67aaa8ae3e81006946f6a7a7fc72185b935aff439c0cc7b12c65
SHA51208c26f917482843cb8b43227652b7a1a6dcfa0d11775979734e9435eba262829893d6b19eb94bd20a13ae9c12e638bae01331e072379bc69886f57216f9b8853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afff0b5337a56dbdac97990dbcc8dd2
SHA1e32eccaadd4ee9e2a424aad4858418a76d689418
SHA256273a5f974ecc970112da08732395663c0788e2868931602b0dff02d7454270ba
SHA512cdd9f58a4b09db9ff6ff53e39144c4bfb5df7cbfb24d99f52e0c50535a33e7e10d84ff9daea1b3a85e0e6582f50b95f9ee8c2705a7baf00db719d822ecb00813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6114062452d5062868fc4b7f95db1e
SHA189ae358dd57115caee3a32db867c54434b463fa7
SHA25631f480a3040b318fc5b3dffa3aee2307710ed74df48ac890f0520d8b4865dabb
SHA512005ddd435cfdcb6f14a8e8d12b728aa30c083a235240b0f2240318e13e8bd0c7cb3da83e17538818d2d7d87516808d5cb69a6e76c4f97849760f752488d3a375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c534d940efa3db305f039fa5ebbfda
SHA14790d060a5bcf85c98111c77ec4992680f48affe
SHA256b4ae0d44bd4bf9100f5dfc0ca4cdf2cb2fc35ba7b6c911a462976e0b1ea0e59a
SHA512764912b33ad915a2311b8a5fc8350497adf4f3ff3d231cadc0b85048605bb411082fd80a8c7dcef20a717d42e9dbbc425170a475561ac2d804de4f107f7f1a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55841a46a9a56308e26b79b5ba00a7a15
SHA13b6df1964636ab2928f10c335b0ac22063792367
SHA2564f17ac9cf8d3b9daa7f3dd8e5bef0fa658b15b26f8ffc5fb2a4995cf1b46a108
SHA512747c8b180f2cfcbc65c5c6f2cb05ae04e4b921847aea338b92d8fb87afcef840663cc245e61bd10bea26f5eb947fc9372040b7dc338cac4c6c56d6c1bdf439c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708fe6cfd1983eeea03bdbd1fcd750c1
SHA111d899b00de3614c24b10c2cd4a000a3cd33cc5d
SHA2567438aea73f0686e2cabb456d3ee42bafab4f4b409ddae866e80b4d8879378bdf
SHA512cc25a241b9c245bca240332e59ea5a26e9a53bb51accb3048d8e946120e02e1f42f431c91cfa7e220e84bcf4d7201309d7853d17472e91ee6acf288b5dd327b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d982df7a6fb4f7ee172c33b66daed0a3
SHA1c2ee40e58faa8b35b0c5786bbed689d25b834ea6
SHA256012dc01dcf957025e7acd2461c817582023ac6131ef6d1a9ef28b4965d445e67
SHA51283e9965c06697d4bddd14e3ec288b392b0ab337268f7d9b78f5fff3184e262892c9d9ab1a02115ef86be62ceb7a4ceb39eda574d8f4d321aadcd5e93f6cbab44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8628b5c3ac566e36b3c9ca54164d852
SHA18696a499ece8e840ffb3afe9a3abb6609e1b1c36
SHA2564a808322dc1ba401391597121792d4984829eccbea0af33383b09d7dec6d2fc8
SHA5120081e8269e59ff061f2b9422ee6edcd4398ccb35122daae0aef7313fc4844bccf1282cc491f3b448695c9c918e01ff2d908fbea956b8df88ef08c7281fc932d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581497b0ab4339f4683d5ffe3241de2d2
SHA1daa5e632a471f12cc5719866162a50a07715422a
SHA2560e5223460908c9a383497d1632ae07bfc14a4c33da6decb65c38ad11b9f82f08
SHA5126d60fee6ac51a3001d94801dddd33343b02c04fabce0b6d7b98290e89575c11cf2056a3d33c6efaa85c77d0dbb5f1c0ca8ff9a8fa6ad30bbe6b60cbf03c371cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2aa4302ca8bc7bd3a3da217194c3d97
SHA1d7cf56ad1410d3ec33c6faaec307934c8071fc33
SHA256317a638c2dc3e87f44bd9b6f6be13a7bb2ccc496acd01f8554ac38cbca92f43d
SHA51282a870a98b901e12499524d89eb5bca4842351df0906197060692278a2be774279d34b86a605fb4ba059f661f78d3bb4c0483e2e392380168ffcda8d67bd1712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51480d00b674f9c515b08baa90c59be1a
SHA16a6c6b33dccf9e044e95306f86a71dc9c84c3464
SHA256c714f78707bb5d20fd82a645ce80f2e95487f654cc0a7e48a4a37e869b69a08f
SHA51208bd412ff302399e5c610a2eb34447f76b507429d11c6666d11bc27c78c064d1f5f92816488e675ff36fb685f70b7b704d9825aed99bd8c71e67e0d393e88873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f443eb6e309ca553e35954f733dd0c
SHA1bb3b55f381dbc9943cab4daa8f4baaf8b6175baa
SHA256da44b22c6ac3ed8d7e8d9c929e8779e0fe31eae28e4e8ba2df5ead3a426bff99
SHA5128c949726df1d945f1adf71f2b1ab13dfc0c1bd6ff2f7cf6df37a47a15b46ac83a504ec8f6238d1c2e99e6775b11cf02ec7c0716f3c99d069946a2af976f4edb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f00ed22dd5552280adc1c2f4d3f3596
SHA12e97e386b23b60f3aa45d93e1ac73ed1afb50723
SHA25637f2b9dd40bed3e5fdad7a1ad47c561c185a3de7501fc2a7cf2f87b959a6fe4a
SHA51277371af59d153f09ed10377e5ed2e573886f262e3f412e219a7fb5dbb9f90fc316f867e68403010aadef145211556dabb4b58d3aa1315160db52eac12f27b499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8ad3de09519f39a0db3e4d53dd9481
SHA1ddc10b335f23384e0d5d4d842cb7c8bd127dbbf1
SHA25674a24b4cb3be383bb8266fae1d26ec0f34a08171543c1744df3a0fdc17d8e805
SHA5129672193460ae5c52fdbd53b237183e1fc04bdb868ca264a859968c23e4894ef9433449deb4fd8585dabb7364890189f879d65552ae58166bce58c35b2f834666
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b