Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
ea83ec7e0549bafbe432f54e080b5d70_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea83ec7e0549bafbe432f54e080b5d70_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea83ec7e0549bafbe432f54e080b5d70_JaffaCakes118.html
-
Size
68KB
-
MD5
ea83ec7e0549bafbe432f54e080b5d70
-
SHA1
cee1bccafab7756170c8e60cb1fd568ef15a8de5
-
SHA256
9620535999a98283d58a40427577143c377e99647da97f9a2a2c2d4dac168290
-
SHA512
212326856def891522b220b086d3d8a7d5b0cf2207c63151aaf33565e3e6910a8e222c5ded2d9e934744c9e8bb4a913aaa4339c0ac93621780ee92e0d1932671
-
SSDEEP
768:JiegcMiR3sI2PDDnX0g6nX2sjBWzsOoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JCLsjBKs/TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000dd8eebc03be063f291cae19fb0c61f0bc258b5c7f2fac895dd2ad4fb6eb870d2000000000e8000000002000020000000d554bc13450bf4abd281f032b7f9aa127406de14fe068ba35d11502dfdfb5bd990000000903d41635d91d469f5d65fe762c36680e1105b0ecc9980928a07f6a5aa5363d452a272861ee96f1a99c21c6c3857d977d237cd0907c01f34443847e0f14add63f27aeae0fe2b9f823ae50deac41f139287fbd0f4cc8b14075cc24b3c4fe59789be76f4e5495fc3ca57e05406b0144ca8cdffe36a4c3a59590d488f142bb236fdf45bbcf06d8d9912c0372783d128d174400000001cf22f94c73b49798186c396ef283b7c4b515a21080103236b3bf91cf15de5419902e6fcf6484e560bcbabbed2344b30842e019b6efea74e6dd60df136a6649f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0628f8c450adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000033ec50801cd79b2e4359fd714c7f9a38a30d911e21df5f2c365616877b18cddf000000000e80000000020000200000003e232874a1f382becb968400c15c6d0093e7ae480b1c0a03284bc70d60e88ecb20000000e5c8b5d54c4ab45cd11f58c59b312f1149ecff8838e23e53b529a71d0fbf50bf400000003f049402805068c26dd8b126a14af104c1b3113ca92d4a1286a51d2f80036921de8d41cda36da506102da89ef3cd24097019126db2a667da80c0c69db8b24dae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B66D1901-7638-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3016 2668 iexplore.exe 30 PID 2668 wrote to memory of 3016 2668 iexplore.exe 30 PID 2668 wrote to memory of 3016 2668 iexplore.exe 30 PID 2668 wrote to memory of 3016 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea83ec7e0549bafbe432f54e080b5d70_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cec9e63cc7a9812c37650d563aef8c8
SHA17a11393b535cc86ab412f05325980a622c7c899f
SHA2560e36ad829d289a2d8e73efc6f28a0fbcfa997c31d97bddc26e76aa5cb41c1d1c
SHA512df5f6f9774d8c251e4ebe8ece8dbdc7460cbed21991fced08e3a714ac935403bbd50813f0ecaa3fee5183a98ea93215de2783db4c18896088f779e64e4c9f952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50094ad5c60d4fd7c262640e54489def2
SHA12073acf5c02d3e0014f26c5b13352adafc4b87e3
SHA2568f64db17bd1bd7add0900f6b163411a82471a31759e1c0b84949fa949d0ecd1a
SHA512843df6d4fa50525dae457ed37ad2fecbbc2e71f7695d1b24de4dde835cd4f2ca1aaf8bc574d1f1db298cab19d3ba00aeb3295e0210ecfece512628a4aebda733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3bdb76172adc2afe073b40601201258
SHA14f980143352ffac4eaa7ba23e5b48a09d2425ed3
SHA256843bc72fc2e411f60a10a51ee315d80616c5ff5064b42bf9dbc6eb3701a765f3
SHA512f6e6fa4200e5c3371d8d523bc51767d880846a87db7ad5c8758a2e0e545a2324f7e8e6788b1202ef64a0788f76d762093b503a0577161c9803aba4226aff06e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b69b72dcce881c31659789816c2ac226
SHA19f309b9da9eeb57321e74b1f2b82f1f16d101cc5
SHA25659dc2dddbe0c20e465183963c046bd4146476328efb27371867d1e350e19617e
SHA512114962daaf37255308da34b0d00bab16828d77bf5cb68bfc3e2c8bfa821a66fb6c0154407035f768b2f1bfb7c1e0b04ce5ed0f32f8e563a88a292a88dcaf1106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b466f0ce5cae4173a867dec694fe9ae
SHA13ba0ab0a4dfdb5b54d4945b9ce8a446e4fe1a116
SHA2569efff7ecb35ba87e9d9349aa4ade7b2dd65e9fe672dae1403d22cc2cdffdc7e2
SHA512d69f5b8b12ae13423a7c079b24833e72fbfbdf297d0e916c5a5817508de6de04ecffb79b05a40685d4c7dd1ce44123577b9ac0fe8cd87519cee5b070e47c618a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd05f9b72219b7ea2bcbc2d4dd95323
SHA1929d86474f8ae3becb105193430482da0b08b068
SHA256a97eb819073f0dd3f22849c98c905b89ba579e823e1efc3252a0b6fb90e80033
SHA512a77330312772311a679de4e0a026076c53a07601089d5ba7f317078a4914104728814bd67673e86e274aa7634b54b6473663baaefd6e4a74f3355cf9ad0bc0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56345927b7bcf01cf4724f482399455ac
SHA11f0616c3d80b4b14cbf9768d9fc225b24ff389ee
SHA2569940eddc1e41558558ad334997d441fe59566c119f55870dd51fa9e0a3fefff6
SHA512a54d92289086b7c24734dd226f82c36f98dc9ac75e62b9f2033deaafb1296d1ca24d70cccac34c256fa9b3f324d0e67178085b343f400db43facc35831651100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522f795957ec5a525796bf566f71f670
SHA16296085e4482f0d8343e1bebc57596a91cff6ed3
SHA2564012d71bd26112ce145725609df3e57687b23bcab2a231bbdfaa779fddbb6167
SHA5124021da5e1edf6e7cbe96c7881f7872487be7f154cbc954c0c9031490d76e90dbc3ef2b9c049bbac2467c212a11ae03824d65bc243b37e913d590baac38ab22f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d310477a7cb298a120a76d3aaee673
SHA1ffb6c3b6bd971072d8024fc3f3bd9693ff650afb
SHA2568707bcde51610985c6c1e695d5c05de9e7313f8f7be81ef87c7d7a61d76f7bd7
SHA512ee371be6af693ce07d60dad80a292920316c64cc5899d811f94c6e09da45b7b55a5acdbce24779e5177eab7e2f45145f0a2456b7942bb642f18e01afc39b2c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d984c380887a91f4f1a45d983beae036
SHA1b5133894611b707dc0e55e07d184b503b0006c8a
SHA256f18dfca79833bc570a6a79e2ce2b467bf3996bfeaeedb41a4e3bb03931928579
SHA5126cf6a9f04075ea2ef19b856250ad56ae67e3f4b1e4b3b675f70963c3a850e1db60406639d0254d9743992dff2d39ff0dfa3f4a59e5d09d00044c086ba30220e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554597003949093575f7aa5a5f4003abf
SHA136cdbad518ef50b0b8c25c51373d83623146c1db
SHA256200089016dd1051ac42cc6201f1d5114b2cdbba6e8318fb6c904de287f6cc595
SHA5120b8fa3b633af71958e98cbca6fdecb6aff4894d57c5c47b34a38062876820e7e638eda70ea27cee72c05818cb2cfc42a7eb5f2864172e1dbd13675584411dffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592916fc06176b0ee74cc47351d9aed78
SHA1be1a91c6949e394bb7b5c1f0d1675bc02ed54799
SHA256bc027d9610736ba1a49ce57f569254e19181d1afa1a46c79a749a668f53a4ed4
SHA51281fc81f87ee016466007e1fc317bb4aed443f0e822f6327f6b2f3b853ff0e071cb64c2b71b49b718ec84bb3157d11064e54fd9df251b34301c8538fabc0cd065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0adcf723ecc637ebb1b529d8f9261f
SHA1c59f3ce7552a4151c23aaf8ed8ecbd49b26e5475
SHA2568659668fb123289a9b1c3407142686f27d8a5c3fbe597884a8c21186f43f6ad0
SHA512916102293c7b0f0650c3fbfbcfc2424b21f66d04f1f5593f5a439056ea2c77e484a7f641cf29ce7ee559970dd81c133c30541f8734ea3f4248d778c1c94b5b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d949fb4cf75f738a5771bfcb6b9c170e
SHA1830d5abf48398a4d72a733e914ad9f56d53dab01
SHA256d20c7b19aef11bdb8a88c11e9d7a8cf65a628adf5d689212d85bf914dad9aa91
SHA512fdb5bc6123e3c237adf77b37d136424f994af3683479f8097f8f21c3bf21b4dc648e55dbf0c81f0b383c8dd2d4c26a58946b6cae21ce7c02d5fd705b582ae7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52f63a2b0101f9cdfa8aa738b116235
SHA11060621c35c76087ed586971af354f3cb4937c13
SHA256bda11ecbd1a7f7de60c20dd4490e968f96797ed428d0e53a4ea5ef24aff63cb8
SHA512df6b846eaa0d833ee6c79f85ca76000301350b874004c6e89fa4a6b647d24624317da76a4671bb7ac35fb5ee866aeba0922329983aef1c8f983e1b38f724b77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb319fb46e3899ca152cb36b552b39d
SHA1a69e2855dfdb2f7bdcb7529b3408f9cae85c8882
SHA256c5c8e70ec12e957e95785b43ad23493e33c3fe5483ea25a96a6dd90ea61b5ff3
SHA512d7407fc3edf86f3a17c5ad1621c1662e93e9fe0a167e90ae76eb675425b96f83ff8cd4403d90ca9809d25e51b98b0f1b2a3d24fcf01e077d952eec211bf09487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c49cbb9e22c3546a1ce17ce6c6a88d
SHA12e7327a84723f15d6d5755479c77eae191c68113
SHA256abbb9f427c69ef7ca0ec3e64091abcc2495a5e82ccce5e70b8138c9a360db6db
SHA512623b043e58298b88689a821475b7d17e9159070dbb578a62b9a3f36208ae3c0ae93d5a65e56529d649bec36f7536da1ea94f3bfacb711c603b5bd70617396acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59546061204ef5b0de02b6b5f984fc0d5
SHA1118de6b5a58539fc383af3e29818b198044b1e47
SHA256e7d2fdce8ba06ed3a0a1a748b9be144cc0c68d21744988311f9db214ff86a352
SHA5126250f0b30204304e39c646b7c3c82e9295320db742018407a97330481eb6b8b8b2171a27eb5ba2747d5f7e328fe73c133354749a67c9f7e49571e7ee6f9bd4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d5b93e52704e69056009c320db7fc0
SHA1d11f57a357890d862e370de5f72c319d026f5d62
SHA25608030cda91782c380054463b4108c42964a29c8e1c965a752f9af081c6e9d4a5
SHA512715b8f5dfdff4218f59e1b04b325d31bfaa0373d9408a40f79d9399f104d05f710103c32a36cd5a4b7147c30e4f507e17e026c0b4b89606ec2d9d557af40df57
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b