Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
d6502ac497e82f0c971f86871842f6cb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6502ac497e82f0c971f86871842f6cb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6502ac497e82f0c971f86871842f6cb_JaffaCakes118.html
-
Size
23KB
-
MD5
d6502ac497e82f0c971f86871842f6cb
-
SHA1
2bbfd647b42db9bf19234e6df7a28f37cee2d786
-
SHA256
59fbd34d5ae841c023a47f803f977fe8e98603a54ba49694f3b593dfd66da639
-
SHA512
d1c94920bd028b98df4298a85dfa801933920b503d18865ff13724b9801ef3b59b94c3169f47a1ef316d495d919d4cb76d382ed065b6ad2f0d0f0880e8932ccf
-
SSDEEP
192:uw30b5n+RACnQjxn5Q/wnQie7Nn2nQOkEntIWnQTbnBnQ6v06J4RnQNjMBbqnYn7:iQ/7v06kd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432046830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23E2BAB1-6EA7-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f1ac7b6ffce8705117e8aacab9edb2da577eb3ffbc57e530c362433c5ed8c490000000000e800000000200002000000077add8f8888f1dad342b7c1f7d2031a0382451a7d853698dce68a0a1204f693c20000000fce4f19ee4c53848a9aa7f33c750ab7b82e4c14dbce04c383087d717c272874f40000000e7fce834c88037fcc7e20acb4edd78c51e5a65421776d2754a9bdc082c8cce1ef616409a49e9ed2ffc4d6cb98680abb1855c7c589203a70ac3e4a15d11792d3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a2f1fbb302db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2920 2068 iexplore.exe 30 PID 2068 wrote to memory of 2920 2068 iexplore.exe 30 PID 2068 wrote to memory of 2920 2068 iexplore.exe 30 PID 2068 wrote to memory of 2920 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6502ac497e82f0c971f86871842f6cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f480e91abe0c0f825cff372784c6237
SHA119b11c8c60c4e0492544c95ea9ef738862cee871
SHA2560a1d388372e2ea8e5ffe70de2e696557eb73c0d702cf3e953dbaaeb81a5f4a87
SHA512dc5690f32e2d5d0af3bd1846b621515191f52e3951ac63840072dd07d8cb5c99f99980d16893edacda411c5a2d83bf7df12be2c09113b7f4d5fb70acbf6d3fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395e276adb7c0524c05d2b0200b87fea
SHA15c19c7a0e7e057d24f797c0cd84371f872a4a137
SHA256ddb9507e16f02f3b9a3f79e4bd6668341a775c4d0a0dbc204119a0eab9edd435
SHA512d67693bf82d1180724f48e3252432b68f1e2ec3d17c7a9b9566c93304eeb6fa0f6afbaea2a5be62343798d595097cc73c102ff7cae6ad1d93fdff847b374a624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802fd168a547da79f3dd975fac182cbd
SHA1351adbc4dc061630c029c1b39045762d8e0b589a
SHA256aac564cd496c27a0fd16ea28c797bb2754342f311006fb50384cf953ae428b1c
SHA5125f1a28987303f0dec6a79d55d9d984dd7d396154ee86b23e8585f45328178923a3d5edf87b62f732da18555525a7a5c681eeaf8f6c3fa30dcef6db2e601fea52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713b6665e5754b8302ab2f8156fda3af
SHA102fb62f86571ef322006fdc187d2cb34ac8538f3
SHA256cd51d7e340e15be97ed01feab58bcfd0ec728ec7a11a933bb6b59fce0edb5bf9
SHA512d7d19652b442ce29235f5fb507cd087a4a258af07c985853e188caecbe505f676880b7592abeff2a0a8563b8db0f89f06913c067f1d04de74e1e35ff3a80adf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a86af168c81c51133d612d712ceb362
SHA15ec2a3deb188dcc1c3022b6e1ee9efea3f9fcd3b
SHA2563e9fafbd4bbc61d301736f0aa1958889ff5f5214e6dc6a744cc7d6c0e4528053
SHA5129e0c9073bc32c29c6a071952173e7ecb57fe0d04e31a7888344f52edca9214bf28cdfed4204676ec1539611cbadcea0d15fbf77092960c53db96dbb774785666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cb7e2005679b6fa49aed279ae535d1
SHA1d9fbbc9f21fef271d949292ae4c620c99456058b
SHA2569678019fd2f265f647d2375e4ed90d7430458ddf78adecfe62d5050651d94a25
SHA512da8c6365dee3ea8e5614753396935b522589b24265d9e565183143defecc71850f4694f6d7f65b488d18180fea11227918bf0882266891fab390aae6226543f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab792c47a7a8fba4ab50189faf684186
SHA19305ab1cd124ffe8e829bfa9a59f0bb0056308a1
SHA256102bcbbb6c8fc1ea4864d1568c3e25e7fd75c5aba317195d1d3bbc7eb2548055
SHA512e50bbdcbe9c69ea774fd88211b08a0878abcbfde0cafe4ad84ac53c3de29b855086fa611755d272b0215c7c3c81764ec91b6452c612c826b4f77da478eb726ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf7bc54bdef4f1521214883d551e304
SHA151623b13aea3bf5982e59aebff43a59694cc3794
SHA256585bfb9dbfcbd71906cc199ceea9669e2cc4dd76881bf55f83beb25d97063c65
SHA512484c6940cb696e1c19602f9873ff3942cca5d18d62f97bf8d25fa5b934d2a4fab54e96e5c1c50ff2ffc32d1b704cfe17695e2600bfc07ba7e831a7246aa5653d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff50434a4dbfcc9379ccc48a08574eb
SHA1f92e2db9dbb06934cd94b4a69341e3af66108db6
SHA2569031d67c8a41f0ee42ee8acdf5eff66bb4c77e8cd8db0c4e6577e4798407541c
SHA512f0a4633d93e51e9b6d139afe5fe0fc15bae5628eedf23234d86a067764f74ae66960de5277bfea1b92a2eb237841c56740cd0aca7b0b8d7377b155f22e5a5651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae38a6d4e92bf1622fe780696e09b886
SHA13b5842c1596a1ade88ba7daed8e5205f8a825b30
SHA256458083bfb5d5005c1ebe8e56944e8ba297e7f06f5a70170ffef2626a43c165a4
SHA512fcc7cdc899775122c94d94ad5b5c18e646be3fe1621a85ea03f5b025945138b4d63753214b5442a70a5f828968f21fb3af3b47e7217b378fec727a9b304749e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe17efe6f67c348779d389d03644f56e
SHA1b8e3bcf80f0e2716f186d17e3a9fe50bf7c4f63e
SHA256c3d5a0b64f4ca56f4bff2f13699b241fa2e1fa3e5a1dff2fa234133d1bc03f6e
SHA512d715db23fa2592e1a13999a5cdc487aac2d167ef27080411225510b58b695f827a62591a219e2a1ebfdfe05689033f64e6b84b303efcafdd8d2ce0d65a8e3da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e1e4924e766b48aeb007549a0f425c
SHA1eff5bd02e4ad99fcc4dd0d91b350047e206d8677
SHA25622d87a35990235fdc0c18b2787e9d4041838ec6205e8a982c8df0b97239c66a2
SHA512a3a7caed60634392a392d7e2cbb7700397d44eff261fa2d57f58752a4b254b73a40c3780a24b926129d1a43cf78b4fbfdd654afc1b31dd5b67f74f76441b1fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f2cb8e82e8a3b9b67a1d2cb7d5bf1db
SHA1c4196095f56b9a881e47b78843491ef308db6782
SHA256384d4d62b5ccd9d49b111393ab4c1386e48cbdd837031d56b3e58da3a6f30216
SHA51274230e6fd28e0d195d1ef1d0618ab0ae1732735c9da68a56683496ae81ceaf9759b1c62dd03f621e9188f9f89da2f4fdffc8121ecbc77bb6ff2fbc1f19271c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6a0cbefc720820baea314ce4c87236
SHA191146e4f481d17862d4f7523b5c66a7bd1ae5344
SHA256bc924b730e74a0239a5b951d228aa91e97e534d64a062ac9bb11dc6bec9bb540
SHA5123c1334f3e91a0559a28b3904ac1b3c8d13167d9271a14af372b962d9862c3327e45f237cdab1f938e9286cb9809f28e89fc06690a1c0c176c9e1c1b1543f867f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bd82715f20a105991661808dfbee8f
SHA178636866d3c9917d40022b6b774139dcfffd44a4
SHA2564bc008a6b8f2679c450bcbd8cbcf35d046c3f46636544c120a8b6851d8c8ec9e
SHA512f90e65105f7ac6e70d586533eda93534e7e1876225a3529fef511311152f8ecf85a499da66c7e2ea71115aa71eefb3b813f601312739bf2d1c45e604ceaf580b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab7db79653f89079b4e3caceac475a6
SHA151f0e0df9ae6c6fe834a4407b42abb0d5222676e
SHA25693c41b58a4bbbb96076f819a7f83b1a8a1a0fce2272f297e66ae667b60d702a1
SHA512e914d13d5fb66d6bdbf442b1f77c8028bd9ba5ebfb656ddebd65748bacde2032c0e71a7cf494b49dc08325273342904dde65de2770cb0e65afca4dbca80e7699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538af933e49bb85829f336daad705019c
SHA120283bfe1bf070f803592d61f2905b71eae01aae
SHA256e51c63580815292d5c86ec9c85125834ad4099b0f6ca57c1f5c92e600df6510c
SHA5120110033acad89d128374f2de89b795c403770b23294b8b0695f66a68382ef61910b1aa620a699fb9414c17bfe2dc9f80d7f3f00fc7fdf48bc414b49d97588724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3840a3a8ab4f835028170e7e6fce7ed
SHA1ed1a6431c411fbd2f271fcd4efbfd8ef6d7ba605
SHA2563bc7c852f45b87edf9628e641f35a77df947dbac2fb1a316d2a85840d4d664c2
SHA512f3f9ee25cae15412eab5080c41c0854b8f61502ea96c02354a2e6621a4c0101c67bc77ce2abf9ff0355b7ef628d9faec1a0c9925f49610c7e21f5374449cc2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520dd7fe71fe05d6066c562cb3597babe
SHA133c1903e7e17df69c4d2060e1ac26f07c46b6a1a
SHA2568e82c9f97de73fe08442b35a7f32efe5e5defb3e555df5c94dbd3562b514f2fb
SHA512a9d302fe08571889d028fd56cee74e29c46ca233ed20ad72cd1d493b355ea1f71ffe179c3ecea7982d69de35ee001ba143d29ca7ba4db59ce37c0e67e25c482a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b