Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
e1951cc2d93d37c016294c3af8e44ce2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e1951cc2d93d37c016294c3af8e44ce2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1951cc2d93d37c016294c3af8e44ce2_JaffaCakes118.html
-
Size
139KB
-
MD5
e1951cc2d93d37c016294c3af8e44ce2
-
SHA1
40031fa81f2b48f5dd6b2587dd3987bff98b2e3b
-
SHA256
5c2f5159ce4bb6de4b6dce653077d301a6584d8b470ba4d9fc4784cb3f739565
-
SHA512
f214ec493071bb10ca02d402a980e06f6f004185a7b7e9122acacc968637592484f7a32875258460a84efdcfe1c0405f6c8c9e63164de539444c64e95fb311fc
-
SSDEEP
1536:S03Ng9F0iaZotZlpyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:S03iqottyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432531304" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2590C111-730F-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809c1c3f1c07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000aa0be72cfb7789f76ac4e224ff805f30a87b24f151590d2bd31cc69504208879000000000e8000000002000020000000b79c7ee4a7a0102e9e40cc584f51dbe379f40af42c46a02f8a3a53ccd66a1b2d20000000ccfe9dfb18a086cd861e3571e12c73b1da362e52ac50341bac72a6ce74393ab140000000f8824e7775803398d476e230f33ce87762738e051cb9be598bb14e8826149bc509d2d92626b47521dc030f5877bfbcec4a69c106348c8a4de4d437b8379bf9e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 376 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 376 1644 iexplore.exe 30 PID 1644 wrote to memory of 376 1644 iexplore.exe 30 PID 1644 wrote to memory of 376 1644 iexplore.exe 30 PID 1644 wrote to memory of 376 1644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1951cc2d93d37c016294c3af8e44ce2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cef067cab5069de5b4050025296be8
SHA115686eb52f1771329365a325d5de8c1a40efeb35
SHA25678ca4ee7481f758562c3535a0995daaf18cea265d6ac4ec0d758d87d50576041
SHA5123a0874dd18ea2452d94057c229111e65aca583dcf1a582138aa90b71321d7ed751320776de1efdaaccb3f2412f4713c0326fd3fbd7cb9fecadfb050f6f64d94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542730e865d8208f8d64f5022dfd2e8f7
SHA16329cab283cbf3dc1d0bdbbf2df9880582ced39c
SHA256f32a1a0a9b887458832e25f12a0c395a347b9745b285b55dd3dfab95edc48e81
SHA5124ff6dcf52c0cc6485434162c5f6616efa89a6e0de6ac19c54684a54ed269207aa07830f3a8a8cfb689171c18db2d199dc5172effb612334ef2fdf0f79f5c34ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d6268e43fe3e84d69df62e53099c06
SHA11cb627aa7fddb204ecbdebf614b24c6a9cbea126
SHA25646f3e4641de020ed7a26102c887bd6a897256d9014ecd82a3c0007f1cbee23fd
SHA512022812dcf01052c4beec0850a37ccc47f9b9ff9fcb0048956b8d62214c3576f73f699e867e5178286687ae91c1327e6adbb610ea852ae44885839ff25c2f65f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5771432eab6e787c72a6dd25234307
SHA1054eea20f7c9cc5c199ddfde8367e954b3386925
SHA256bc5a50cd26d1b6940a3490455066b5b941b27b04b92065c93c150b072cd12a8f
SHA512257d2705b1ed7eef15acc7c16b934bf24b97b48ff34228950f508580766210a559f1516b0a4a37715efa171159097daffffde2d92cb398826360123130f7903f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231759e8827548a8df186257a48a4e9c
SHA118ac07c0e027e8a03219c463e66c92fbbbc3935a
SHA256fe9d5a8648f2518e53baec2347bd1465ec553fcf4664a39bac4e6445db7e1c4e
SHA5124c1255aa5ded7d7c9c7b820d2d3bdee8e539cce33d3d1b1a4fda0998edca53b56074eac1f7267308091a01c6133e2f3d2c977720d8068098c642fc0f60f8c2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57291de6d7a0cba4b28a017878fd8140c
SHA17c2b1919271344d1169c25918420df04b022a3ab
SHA2563022bb3ad01698476af6956eeade98a8a23cc4bdfe7dca7536199fdb92a46775
SHA5122a2706efda175db082b4bd14d20023b77ed10b41f5df89cb59db1b0bd1c125cea3b2c017b613885e101b0f514361d8c0930265c032f6a9b304b702c5fd08b244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547883f08f3b78d7ef56755675a979171
SHA1e53cda31736c2d21634ad169f9dfe9ae0a7a3dd4
SHA256a03a1d60fcd52fd30c643fe54de7e8fab7b2bf8f7c7c801ae086d49dfe0900e5
SHA512b92115c6a172c0d60c1f7f2578a4389d3dbb03179494d31d7483eafe17761cc569547f2deb8cb1abf7df85892801ed6f9c63f634912fb8c3d6f4de4cab9cd4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebaecac2e58d5fe945ff4df7546f2ae
SHA15dbb9b93571fa4373844c10b2fbb56200b4f2f4a
SHA25676af25042ed0633b1d8ceb2b7d6e7fe05fcc7d39a82d536f86ff62866dee73ae
SHA5121be4db628ce50feecd02468c59e56eaa51051f7032b18525572e74554659b591bcb9a00f4135841a7f738065df5370c0ab24909afb3b302e950475934f416840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f7d515d08baeb9fe095506b5f13edc
SHA15b5f2f3a564460d7257d5c4a0a436d8e37c9f345
SHA256cfa12f0aec505cb35770c46af8511577770795708ff3f937a7e592556a7b6333
SHA51236257812ce8262c2648070aa70541f4e4be659f3e4588465b35bd96e2c42f2dd12ccba5cbb201e89d66661b50c1d849b26e698f7af5a1f9e693c6a3d7fc2dd51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97535e0d9bbca2d5e23735bdf087a3f
SHA1cfc688f298485e9c94293097fa26cda3d8c8f7b1
SHA25681eb4a71725f8803e015766bedf0dca291283dbd33ae1deaea8f6f718af52612
SHA512f9657da0512acf470c535786ed12d2ba3cfc53abe81afe14aec489e84f5ac71d9c70a0c72bd5d0e41e6be1bd8670ed334fa22c102610a6bfb0fb3749d5877373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539489f99f5b2ea0480e654a19d57a678
SHA1982a82b91e200a6150f73eb4ebad06ae63d98a9e
SHA256b9cf01e3d3e624a7daf8c592359e7660ab4854382f0a47269699a35d050a96df
SHA512cef48664723e4a0108a8f3d62830bca724e427ee143b186dc5444b7d6ede39fcc02a1e6c715cace7c7a57ad5a6d344b17cabce0bbf4ce9a2d1955e1e97043a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0eebaf23f5be564f956925787b61146
SHA18aad26926f9a375811803dc818695054f5392805
SHA25676c137df7d26a3f682a37e1968bcac564d243a4aa4678d3cf20217ddf477118e
SHA5122e575716995054e84c8fc195c025824aaa5a64b558e172d52c2ac497e497b6a2fb4a6f5ceff9781d8a81f68e4b01323dd8b1268fc57e7c33b730b13bc6f64ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f239c4dae62e18c2bf48a710a944a0e
SHA10def43942175654fb98d83b0c6fa1ca19355971c
SHA2561d3f30e1d1a2d44b0e484f395a2e976ebf37e3e7f6147d659d95b1d9afd8ee7b
SHA51208c65a9b3947636622fcbf4be790c8a6ac15026a7f1db67cab2b537cbec0a9a0070786e13b364a1772463e0456b81e7e843ef19fd65b27408880cfb9b90cfaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585d218325e04fe416b238bf7833655f
SHA1d732f38638d9439f016b30da8ecc89f2ad409bcf
SHA256642d193d59493b2639e84bc09d9eab5ec830c10f6b0baae3161cebc98eee8848
SHA512c223201069e84a01ec9d671353d293112cfbcfbd3bf25f45d92770e62a06309783b6e0226cd52ff4ac390cb32d87343d7f8d11db392fd8a929e3d95f6cf029a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec134c269463c5b5ab0ad2d9289b667
SHA10dec22eb84c7041890accd4d38d565656e703e3a
SHA256980bd2ffbcfefcacf60f55337d4f8c29ca39f1be764a75fbce2928302d4dc5d9
SHA512d3cbd9e5f3e2d1097357af3240d716281ec8b9ed599e42c38bab2099443ec0e566e207ce50f8d1b9ab28ff70a8e0dc22a7a0cb15c969454ea373c6f9112be22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57308360bf41a0c0afa1b9177b57a532c
SHA1cd90f2d8a2f0ac040b25b2f50face38e638044b7
SHA256d144881718244665eaadc316ba454950c0c47b8ca56b0c7f0e6deb8ce408ec14
SHA512507738089d4987ba005965bf9d4fe8bcdf28b6fb1f175c6ee9b9c3040d7cca67e392eb23c84b87670ba8d15478efca6bb8ca3606040ebea37dca5fb9063b2046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519180a58a363b4e030a3a153ce20cb9f
SHA14515cddc887fb482a8bfca5145399d12ff8ef8ac
SHA256abb142cd06bce434a753f84d6bd9bbf3ab41ab8cd1903a9812504f0a1474042b
SHA51202f336135240805b6f47c5dd18e6fbd36ad415b401d257964aece5c9d6f7f159d3f87738ffbc40415833d2264094eedabb0150478271b75d1317a3b8f9e71833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c8838d2c850ba9217b44435904a92f
SHA19c2cc10e3532c71cbb695166f23ffead3891a96e
SHA25663d2c747f1d718dd48e4769867914e5e31ec3fdf066801fb179bf76cc8340b5c
SHA51238b8ddac96c9d2bd24f2e1e86f723bb82233fddc4156fb56ae0277eb3858279bfb434793ff1378122b50ad44f09fa60e3f2ccce25e85d4f5b085e665b1febd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54149de926468acd3a3f1881c9bb43eb7
SHA1b1a39d846b35ab1f5247cca7a8a95ce8e2347c6b
SHA256de68e7499086e408f90f35c8e074a18e8d835dd98a2083bbe56125b6f9843a61
SHA5124309f7415aaebb526354e22fe59b57c3be8f81322b95f485cec936b2d25d951f88c443a0f3a9eb8261bf530455e535ebff3b61cef88524a90721d428e24b7d87
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b