Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
e11347a3d80a46a878124e55527f6ae2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e11347a3d80a46a878124e55527f6ae2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e11347a3d80a46a878124e55527f6ae2_JaffaCakes118.html
-
Size
135KB
-
MD5
e11347a3d80a46a878124e55527f6ae2
-
SHA1
6ef1ca7f6930e3494d15ca5031f2df97a1ebccae
-
SHA256
7af260b9ada83093efb7297c9026263cd6952b2985e8574bbcfa91c6e189b991
-
SHA512
3fd9628cea2cfa1177b95fc1741a5e4a9283f34b9a41b965c8c71180ff9be092ea6767048dd4a1a656878fa8f2924fb16cd594b50d71ae2198d71720a838717b
-
SSDEEP
1536:7HVYLyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:7qyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0442249ed06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{747C4261-72E0-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432511250" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007cab119b67de06b20ba6ae0c5eefdbe4e9038cae91e6bd4b4cbcf23223bbd8cb000000000e800000000200002000000091cbc85e9bc5cbae588a5985e7ccf51777266859e8dcde0ae465a1e894410e9e200000000544d47b1be9bf22effdf20b0ebb7dcfee6261bba5900b164360bc77f9128158400000009ceba9b47942443733f672682b0c4d8ad503e9811d1875b6ac291b41fef79463db54d9cd45b862de82b2c10c037170da3c87093353d2e248ac4f363bb2d7ac3a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2432 2956 iexplore.exe 28 PID 2956 wrote to memory of 2432 2956 iexplore.exe 28 PID 2956 wrote to memory of 2432 2956 iexplore.exe 28 PID 2956 wrote to memory of 2432 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e11347a3d80a46a878124e55527f6ae2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f1909e64c042e7d2d231e2b1545de5
SHA1ee94ea412b956cef029e90a6ab7f1a3be93683e3
SHA256d9a74471cd407c6ce419704024b571d879b4170c2508b3631972493cb32642a7
SHA51254e09be6c5f6e6a4ef178f5d4001fee46e77fd0079e0509822a6f5a68964f4de0bef067a1def0d618601231cacbabd8fb0c7f8ede123b3626c3eab59e0fc65a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3df7ff9dc04fe44ff755704dcd5c5a7
SHA1b9e0c50e1b0a3cd6f0f0bca6e66f611cb7072a0a
SHA256edfda548f14729c6998cb2079c27cdf01085f240f975cd49a6ecdc14e8954b36
SHA5125b3ab31db882f18a24e144339da3fe28442b7f5168ca06ae04510d48eafccc4fe20ec6b8b91cbf9a765f5b77c0c599ee4312d1448469a71193e185b3e3c4c4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd98449a58f1e20ced59b64856cd3ca1
SHA1640e9e6b42f7cd332d3794d21163f50e5bb91fbb
SHA25693114567b2dc47aed4bb0f44561f1f0c622ba7a9cae29e8ba2dceab00ab3f34c
SHA5125a85d14ca882997cecd340bc6981446ec0e623e2813dad01233543c73b3fd13fdcd81e38bd7b0e68ad3a6bd48ff983444bb64a0b5c763ae6a2fe38686527e8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b772a7120aade166a86c2973ed1729c8
SHA10ef4a89bc5f2c09b86ca37b4242a01e5d62e3fde
SHA25645497bbac1632ec0e24f9f29940d301d56e51d6f576d4c6b61ff34b9a015cd0f
SHA512b95a9497bf6fbac8d8ef6e989c826db8a2b8bf1324047bd99e06d7e6a29453494f038900934523f8f8293f324e30d9c1ed463631d88ac91db165105ce3721b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b516e720ca7db7a767b25182fbeccc10
SHA1114de148f2af2cc02f47570b7047ace4bea31e6f
SHA2562e77ceb6d8c4bbcb62c94aca12822eea5917a9cef97f81ce6e7db80e4d2436d4
SHA512245f2f6d76f6eb978989fc7e9fe4b0d08cb1c96a6ce3558bfd242130d3b4b8602a1bd572230c0196363abb0baba4aedef399c271be380d4b5f04ae805ecf0cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789e8adc85b3ef2a7ffda4724f6ef860
SHA1131a44c44f35f332892476d3cbdde628feca31da
SHA2566198b2e9223280836794e9d9bfcf03df1c4b06c068dd649ee1ea4f801acc85d8
SHA5123c481b7af453daded669db62293e488e7578d5f6141d3035d728112b9944b17796cfbb6d0d872d8f33ac31a19e0dde8df8395a104e59ae3a6c9de2fc60c58097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c50d027d0143e1a4d42aca73c0b376
SHA15839a3f87648b18a919f4e043120f748e543ae69
SHA25631646f9e3fbef94992c1b9756f1f93986a9c9c209b2639a54514f00deb4eb4c1
SHA51273004faf8042964b69e83b2dbadf2a5bc848aac4c5d4cfe0681e98fa199b55f25df0dfd5b44e58b84bc672504545ae78634483b31650f9516796093107eb25e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8dcbd5c728d3aec508167df31e854a6
SHA15da14fa88446a01addb56c94c2db4d3d70eca8b5
SHA2567b5c5b1bc4e630b4d6c294d08c37650bbe522b2400b7eed9a1769cb959dffc84
SHA512feefdee3629b719ce0e5b16c5f4526aad51c195497acc6e04ec46e99a73d71f9287090fca749982244bf6fd268db9e11bfa55c80c1a54a9902251b6bd3765f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a2ed7737826e4346ed2caf1e1b0cb1
SHA12890f617f6a25ea4a45b72d316f8593908855e38
SHA256cc70a78509ca400927f1c92becb24567a3b84ab82eb15144908ecf1c59f06088
SHA5121b320c680b9c13b5f7075feb34466f38919c7e151564ff96b904d99be15290e07c9f1df03c878857235c3d59a95a979cc74dbb71c1c1fb408c54315d3dfa478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55789e63ae1fad6c4face1bc8ee0215ab
SHA1a70ac43b5f9d70d0663b515d7e2af390bb52cec9
SHA2560eb81bd9c0e5950421872446cd64ba7e2a85fab7a62c85dbd41d228cc78ca184
SHA512ea74371ea302b1f2812a0dc6830ce1304dac6a9f8461b3259b37c89bfc6e8cf1c36b6682e1a203a179de2ad31305177b24751b01411497f2d3a257b0df120839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c17e2b38e4a249684dc080ac94238f
SHA19fcc50756016be3a1a1c73eca99789f2e6f1e3e0
SHA256933c9768b57572f9e68f574e01243d8c96d744ff1cf44e5395c756c26ae1706c
SHA5126d080f686ff94796ce848a04ec35373652662fb34885f52cad45c907df7a4bdfefdadaf0f7adba4ca2acdc9495ea2add5c151152f158af088ba5d361d8fb39d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f5f0e7bce3930a76c34908f8fb3832
SHA1cf4c63b42a522a37cc166c1139ab49faeaf82139
SHA256d138f5f318d987b25f92e37585f20a6f5a854ad6d9b58e2aa6e8be2fb98908b9
SHA512b51fcde7b6e08486f51f9021e1bc54d8e7d6e77579dc2a1ff7ffed6397941015819d098cd3ae7516de69fdfae87a75ff11fdb398549635e47ed08758549fed7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e731d348be1411ebfb5cc4a0a977e4f8
SHA118abfa982248d2c02be1119654f6db00d392d4fa
SHA2568f1ab450687a4548239d43fd8729a5ffe278094c410f6308c145435637e35b09
SHA51288b9062a4ea324361bd38d3f779b7e84237b76fb9c645526f71a62caec11857f5d6b4ae8c33630546035be31ab51f8265d599f374b146d18e36453bc58e5bc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0f63aaa281c3b7b32ab8b4f1c1e5ef
SHA1857068683ca9205bf004c329169853cc3bcbf258
SHA25685c9adb5b92094595c62d2a58f9636b03020f97bd67ed01c418a2090387f473b
SHA512aaa212713209feec12dbfbc2a7376d03cf66e7a07aed02cd304476aeee451ec808c30dca4f40750ac213c10c3f340070231458caf39c57e4366272d252a1f935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe12fededacb5d11095e2aab797e890
SHA196d9cc05dac775f68a99daee3841e89874857333
SHA256d09584514ce2bc2e2406f0c9db9aae24edd0b191f6584e2816a85e1b0337d3be
SHA5129347efbad463abb1233b7c5121f44d0e46206674209012f49c23e5840581224472f58fddaee65cb5d649e74821e511ac6df962f4f8d64a15788c6c68c4821e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083026e043da708e5ef9b7fae104e9c2
SHA127022d96a56627de6feed136c64a509e8776f65a
SHA25621cc462c950296f791cfaa769b4974944ae557ec53fec435652547a4e4f5590b
SHA512fb029e6c78d184cad8a30e425124a559ea689b4314e359343d7426a4eec2c030762a0b627c154163766889a9a3dca631b046f263dcf20195af0d1b57bff99370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af0bf1f70a1b187f44a856848ffbe1a
SHA10b16efe355a5e283bf6f48242a5070a805581474
SHA256126a03acb05a874da907500413c30abf99c1a48e421a85e91909e3dd3ce7366f
SHA5125346a654a6359da6b3a1e249ef8ba7f2db703321c84cfb05a6eea74de9b8d494785c85d58ab15dd9f20035158a23c83c4bf8bbcda95e0f34110e6246c28a838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf7c2103b795691f6b74067ba780d5e
SHA1bb9b86aefa229b77ea61276c33183ebe7362f3ff
SHA256ef793c35e1c6f1a746f7f680abf538522ce597aac0230804362e82f2b97ee72f
SHA51262ce1097e5be4ff6612cf1beed469d81ddad92b496a5f578473800e91821a3eaef64e52aa2117b12050cb5ff15e5a7bb6b65b2237f078314b8f26b27366f4ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28368550000183fb44e5a7d642e5e7f
SHA194ceeb1a0c8218c89e4ff20fbd6012338968b9ac
SHA256b51158ede2c3176739e1d2f9abde5cbf08ea7aab4e97af18483755ce45238a1e
SHA5128ba558188ae64a86f43c8aa271d487d38d0d33d7cb37cf1bb1ba7d1eb282f6e82d1c8ea322b53b1d3c624d80614705c39fa13afb25031f1fef3f4114539c3d85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b