Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
dbcb6a716b817c6cc709b13024fbca8a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbcb6a716b817c6cc709b13024fbca8a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbcb6a716b817c6cc709b13024fbca8a_JaffaCakes118.html
-
Size
36KB
-
MD5
dbcb6a716b817c6cc709b13024fbca8a
-
SHA1
e6885e3e25f95bc6efb6c07b6714551dfd3893a4
-
SHA256
c27599da48c4c27927136eb0ed1234e405833146c85f2c6a41f0a3deac9f1bfa
-
SHA512
053a628f9f379d8c199e19ae340c314538cdf9d6a96465d3fcdfeaea2dc15e6c9c4beea98a59613b360fcf0212f4bb4f81e65723ec9d37bac88cf430858653b6
-
SSDEEP
768:y4FQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34aDi6781DdRA4vEOjq6h8aRlR9:BFQW81D4RA+vEOjz6raA7IaWC81DdRAW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000075a0fd4465b599c7f64a1d9e9f9a4f3762ba73b3fee35a4a6121daddb92c38c7000000000e80000000020000200000005a47c1518cad25777b0db1314a262ea5c268cd77ecf0028fccedd7dbbd2e1625200000007f5250da5e5eeea03ebefabc9c575d676a03a603a7bcdc7f5e9eafaa55502db3400000004d7a1e7695818268d53c288cb44a469ffaf2c43553954dacce1f3228612ffdebaebd56a77dd956ffdb3ae63cd6923b8657d679d106b25519a9357fa5a9d0551a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7061E01-70BD-11EF-A0C3-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fcb190ca04db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003d8e051a08138215edcc48be24e91248c9b0cb9ad8629dc045e7d8486c5e8f77000000000e8000000002000020000000b9b2a037c75f0f9502d329ce6ad5c924bb078dc00be4c9f71894af694c1fb0ad900000005af4a2a390944fe2be1d6a4209acc87b47c94cbf12d5d8632577807f972bd56875325206dfc72059f6823fb7f74d92f53dfcf1b7f3a5db37443b5a31892558ef2f5d0e02f441c39847c722f5404422de50aadd8d3429ec1ce8f4f57351679bd2540f9377f13c4293a5e754cae32e9f27ebab93d8cae70a17db3551c70af33cedcfc021a27c32cdb497cc6c732a080cde40000000cd3a20e96dd1c97851e6ce986dff0c5cc3651e7a340f1b09c6bb25bd04bf73e92da0c09c85b3c0d09d17b152f9651358e7c6210440d2e873a52ac685ecb35d29 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432276427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbcb6a716b817c6cc709b13024fbca8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209401427ac34c51bfabd206a9374fcb
SHA182a8bc79b9cdb4761d79d9a12c463778fc01f5f1
SHA2560357fc510c72ab0b9c7010a600582d8047787c2e6e74b20a467f949de59f264f
SHA512284d40b0764848a2e5aae7a6053e6aee5802fa6be43721c41b9f37afa244e0304fbc6d4c5c3b875b638b856d13c1c080f36ee4c3ec90d105869c1c79756dfcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56926c7cf594ad4ea087cf0333dbf2f58
SHA1727da4235a0ea5d7f98683f45e6eea44b833e9dd
SHA25614b5ae607d83c99f2de6b64388e607d7a9d25f2e6909e1c24e57b147d949a19d
SHA5122899c53d0282d0dfc708448457462cad0f2647e889bb233094904c05a101b6d95be0f836f14878a0be7576b8380cf256de89a147c488537a05b047a585640778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba0a19ee2a26e0d64d3362654b08afd
SHA1714a5abcba753d0c5bee19fdba6623361f1b1849
SHA256e8b77fc299c66d5515f3feb1bc7b96705f3d1c4d0b456529cbc729cedca02c36
SHA512f174347aff1197d2083e9d703805d4d8e887158da4942cc8b44f48eebbd9f37947ab803503b59430563f9237f3e1d9abf722436efc288fcf5edba85b4a336a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52322d8143e419f513b1eb131999fa742
SHA132dfc9ce7e44af67c739fbe5fd97b18de554a3db
SHA2568a7711025ee6a0e7eede59b5971739211577cb1507a3791ef50736b9ac41b6c6
SHA512d34948de2f1d947a381a8f94c75c07aa8b2f026c8874bbeb6efd12093f96fd63749aee8046c5e9be6b6b4f2634887054294823882e86858b23c5673a176004e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fafeae7247aec171618d3382bb88df9
SHA1d60966dc91c9fcfe3000ba7bcc155514192e4c62
SHA2568771bee799c4a8e23be62593d0dd7ed25371c05c12ed3c20fd0fb9d19e2cd675
SHA5123bb0bbd39bf0575a502dd4a8ad2371d17df03bf3265730c64eb005568efadb53c7fe0b0fc04e6fad4bc48fa0a72188ac5d5ae25bb2b5eb9770cead9661a0173c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a9a38b945ce96463c3d02d29f394e9
SHA1549912a35ce97ab7a9df2a41078e7e48b3666fb1
SHA256df166c992d378c693dedb8083535f3c010df2e092f3e38f87aaab8c5e3641093
SHA5129ac292a39a66eaba01225ef44a8813f01ebad6dfee69f1a287679722f67abd4e78b07e8c01f72c5dd0fe1d00c8078a637b30a021082e93fb86ba01576cdecbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec776609c4151e02ad43610fdc9a4b8
SHA107f10f6c458e1aa9b62b7b6dcfd19db66935c79e
SHA256de2be3c91482a984c6ab5828a0d95b152201965adcee668d347c3d5390c4dd03
SHA512310876670e8d6db5aa79006d3c84787deecb038b15740fa45f016c29ff2f5ddfef18102cf3042b83e9cfebf1dc507c66210a43bafd913a2b259f5cde785ead3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9cfa45dac65484107417eaec0b827c
SHA1c6872a07b63036c6875aa2c3491fd7328ef56228
SHA256bc0b4a508f48909fa539172f0b414aaf83ed592bf1c4581e00cfaae1a506f447
SHA512b6854a326f14c522fbca31a8e38659def7206271e06d76fb1d0e408854cecfb1ab9eb33697d931194c5be8bc52bb752885d8270bf172ed57d23202f1868fd45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bd4e7aa8edd6c3ea457a05d43d8de8
SHA13f39d06ed43d66fbda6f1098eda173c1a059f3a5
SHA256799a072090aebb62a1688e7a70b3623237cf25c92a148ce8372f29925c33ce1a
SHA5128317ae1f8ac4546c47300111530e7e2e3858dbf5dc0ad3efdcf633214b65ec81802298262304bf95e7db0911e1c01f785bbc5e4f5d7092f6335a19940851db15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f090c88470621f53a77b7ce363604f0f
SHA144260df5643ebb7ed5b85edb6d75a8380cf70dbd
SHA256649ff448b9f38220ad91807d13426372e7f7610b52beb29e26abe35cc0c7b2f9
SHA512ecd33d407a30b4ce263a8665222552c474d0f77905367e257bc691367dccfa4ed1a45c73a27e3aed577353b713aacecfe39a7eb4c5a9708d04188e6d52f6d0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760f2afceaf3a7795f64d400a8f58672
SHA1d6673a888022a2ef8ef8984892158106c13f76d0
SHA256b5575e0e1f8dbbb4666ad9c23e761a55ca67f92b25da0a19bd29cb248ef7b987
SHA5122dd9e732e1fd2787b6ccdfcf556d6da02399fa560df9205a1487e77feff4256ce3f2ad20d91584091420633873675c7c85f16409491182e94a8d074bafd0a1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103d8e20cb3788cc78c1d96251868162
SHA1aec4824b4cdc8cc83741755396fcdb98c184dadd
SHA2561745007acf3112b1a23ca94d6862674e38d95102f1f37713f17d5f9fc6d6e36c
SHA512df607a04c79c32f8eb4ebbe0b986fc3c622a0a454a414ea47fc221f0c8dd069f4e5168b7bbd104e69a3fcdda7701b8166676f3995d34db1f55b6e4e7461d1f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec24af32b363e91c7b1667217ca0ec2
SHA1330f5c450afd39377ac7691392a5f21817b7b6df
SHA2568c008bccdcef396cf9562c630e6d7f4eaa8ea9e0359393f40a7c2754edad3e5e
SHA51270e3b692d94c8bf9bfc5d6cd53b3cfe5ca81601c86a6129953009c016b861bf147d53e8ccd772b35fe69aad2f14d0317f750e0f480653fc29ff3add93a3676d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e2cf2bb8a0afb3219c5ca12f4ba3e6
SHA163a8d10c1d75fb18c9dd8819e0ba7bd44dd8a397
SHA256ecea9b9b82d5d6ffbbfce49785914e5e4873cab6293991701443d831324fb30b
SHA5128d9d35c871c9fca62b88fa5bb379423ea7ef92c76e9d4c1b49e311a09c3b2328b530c96b44981616c68cb9f9c3006b57ddff2539e05ebb2ceb2da3ae30e03869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a837fc8fa0257a93c746266ccd987e51
SHA11fd8b7212a937df6dd7c47d4ceed47a69ac94d82
SHA256da12b1eafafcbe549cfff97c8e2d4ee84780dae19d7d79c0dd4742b16aa12322
SHA512b6ce402b6fc6d07bbd7aff35bfcee003ae2b2389e36eaaefd290b2f21f4907d64368e40f6a79a3fb7a10635ae237b2bec8dd5a316075cb6e848c270fdf53a031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4c9a203e90114e8a16838b78edc534
SHA1d5ff8cf75f94881f85d6326541849acc097e298a
SHA2561c942611a1c76739edeb2f8d7bd878c5b94a32866574dddfd11944674d64bdcc
SHA512ffc49f75af37eb20d5ac6253c69029bb5a7777d5bb268b7a587dd9ae36f8a274ef52b6b8c9bd71799f54f97c798796fc7a67d8b5b57d217b91f34008e3943cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a277cb953226eaff5717d5d928e8d23
SHA180216d574db7a72031bf97ff87f50c8c0c408037
SHA256b2ef91c0e547816dd6c087adc6d4c304dab1b2db37e4de02c6401699fbfbbac4
SHA512745e7969883b82f9ded70f59c3091c990596f04ea17b023fd64ca09a6662c5a74cc4478468904ebe612756d08bedcb319b21c4dd7f10139601bddc21314910f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506174678aa202a463b2e9686f7651513
SHA14850724d0878f27ec0d74365a2d1d5d51f59827d
SHA2562f8deacf6cecc2a92655492d6426d4de90796bcc95085c407576d5b9ebab1dad
SHA512a1d93d960f281fcef37c69692dbecf1a46c61cf3311fc82218ff3a1a42451281160db220180f564e846febade0fd5e3cb2692f6f3dbe45d33b773b0608cda8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116ba69bdd0eb33b25a56aec1733b15b
SHA14aae9d27d4532afe6d38f71fe8cd351f0d7fd4b5
SHA256775ab508d0e0c6030290e644ed79319fd70589a9841b66b1f5da5e70333d5b4a
SHA5120eef8c5be8c5a3ac53ca353f0ab964fa87fbf9accf24ec26592768d516f5d685b43f7b7ba3fd5f5d6be78f3a2895d02cba38cf7c1e787bf9db0d696a7848e89e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b