Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
eaad68f7047eb5417e5b4475219eceee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaad68f7047eb5417e5b4475219eceee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaad68f7047eb5417e5b4475219eceee_JaffaCakes118.html
-
Size
139KB
-
MD5
eaad68f7047eb5417e5b4475219eceee
-
SHA1
7324d73c609e07aaeea62bc01fe8b00095568942
-
SHA256
68dc5e805ebbcac0ca00592cc22014d388e2f731dddcb70692b061fdc99bb32f
-
SHA512
77bd6b438eae9e106277d4e08703e27b3cc76e94d5b7bf30547da2f67f458b286d6a75e3ca8e7ee21455d3348e2f718ff0435f6062d5d6c1cf13fe5dd9549b31
-
SSDEEP
1536:SutwBlMQXWgyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SuJQXWgyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c7eb9b550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8506C901-7648-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000082362ea063ef8f2d1ed86569357f549e2385560f2d1ee3826122c79b9c573cd4000000000e8000000002000020000000f42966492a7e38d168d411c6ac3e827d6a094a3914e15a97f2a659ceb7783aee2000000075442539065135aa9da61b4493d24df6677be262f21dc7f891af423761dae5e44000000006ed7932ce5dab7dbe757effb48ab2645d6312e54696afffda9427a82d448c5db2d7f906e1ddd0082ea6809019b0baee8f1ebe0e4427eb3c1d9c1ef8165883f5 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2736 2140 iexplore.exe 30 PID 2140 wrote to memory of 2736 2140 iexplore.exe 30 PID 2140 wrote to memory of 2736 2140 iexplore.exe 30 PID 2140 wrote to memory of 2736 2140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaad68f7047eb5417e5b4475219eceee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff2351fc02724f0f324ac38f5e26721
SHA1051a56015527873fed23f39be5dc5ce0e436df8a
SHA25684604681e9b24f13269b16da68413a1f51aaa9ee618e08b3bcb62721ee1f891f
SHA5129a9e123ef7f173df3d8be44728e39df5198cfbb4664bb4e15557a632c9b92186942570aab7f08c64acf52781c97f377548b454a24e630305af18238cbd9cdd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b65ed6356f65a01ea7ea3b253dd97a4
SHA14dc183a09a3339f3bf7020fabb2c68acfdf34501
SHA256a751a201810d833ae9e15e2297c5c35b389d339ae686c21fa4aa8b9c2e429293
SHA5126507a595325c59b696b9e4a796805b24c9f6758978f39ecfbe9dbe7dd54ce63c36615106793828609529e722d425ffe5057ea936e3ad0dd4c2a01caa35e16d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca1b7d0464bb79c87da13f1427cb0e6
SHA177353d167799588f3d2370aa3128dc0b22e518b3
SHA25674b83516cc15bd4abc6d30635856ada6c9d895598a7ba277e8ee749f76d76a11
SHA512bfed1da4c52ac9f78e49ffc44aa05c2cf92e1551b37299de850cce084aad2607d60dbb7c735b3040d5b73985e3a530e841d5ebe4f42a71e3c64ab88faffa41d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b138ab2439e9a4f3082c2c4c58af3ac
SHA1efc68d8e01e248a5d1657c92dcecba90f4a1b4b4
SHA256e461252f97bfc3b336810c1a8d68a3dc1646989a4800e486bd799e8c6d85c3dd
SHA5129a4a4a158da1fac7433a14a8510aaf16bb85aa677bd051ed9c7b4a28d84adf1b43101bd161b6e94746fb50381aa3c4606b388b8d3e05390805148642a04631bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae84121dfe449f0f3ce3590af585c841
SHA155c70379cddf3d782ef5dec53a9429ebc2b26ee2
SHA25666d27518ff1eb33303ab2c366a08d095fd7541544857a9a862817d051f4373ef
SHA512b4e3309816c9cfe6c862aaf16d5f4af4e6fd53d8ff4d66e694e6e0861833b106cb64be4f504cc2b17c64562637ecf35721633a5d6beb443cc0c5e290745e62cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e7033605a99cb0bc61224e39c2c67d
SHA13e9f8aa03f23c21ab95f69d371bb4e227678cbd6
SHA2565bec9548268196d1e6506866a400b8a239418f9b31b285a14f05e2212fd920b0
SHA5127838cda2f3735c6aa0c52bcdd9f4d909fd62e4716a5bb9b45abfb44aea63ab531b285a32acf9084bb5a855ae19a874d2ff21560335b60ed8740434cfaf192d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4964053fe2c303b974d969a6196fc5c
SHA1a47b6cfb01cd8bdf8779fb7f5771b77fcc318331
SHA256084aa28ee1eb5a2d08b8a9898de71608ffb5b4c6c2cfd3ba38cb8b3791ba0400
SHA51228b9589197aa3755a58628d7a01fa8fed4d767b3acad48cb7e839dd3de1e847d82ea03c950bec559cec73d5e09d495f189789e5fa64bebdb88aa8f07ea7d9d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3f658e97d52543d18e7a6f0a442813
SHA1d2e0c7b9424b3e10b40fca6197cbeea646c2d477
SHA256598fd87c49d800b213a8927e23be565c1651acd78e342f5fd2a9d6019280aa78
SHA5123427d1a178ac79705cc1e4d062c29a6b8666f9b794e31734c29f1801ade401ca6d2222e5e8a561c6f5ec247601f760ceb860cb837898aebe21600e70d7c31827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ebc64935f27783e020bff23b97d7ef7
SHA115f75d108dbd2b84c9373afa4689e61103bedc07
SHA25617ad6ca2972733eb3648274d9c9ef4d81286a98997dadbfdadb483fbd397704b
SHA512ca493b87b2848844d92d933389122076675305de00f2bb56336262de5c8e17e57ce9f751f4b3f5264a4b8b696d9ced88016e5abe400c4e5cf3b8331ec5a31529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfad70fce2178f0da21369723fb323f
SHA1ade724cbd4bbd01482d7c6a0f0405b1e4c9b4070
SHA256d3696b37ec19f2e6ae39c601003cc089d9f2c105371514273e06572926fe810a
SHA5120d9b464166d866db6c22998e32d3917f4da7651993d68013b3056fe6524ff28d9531593cd4f10346f8c47b6f8708bd4ea0802cca29aab27745a045dc2e55b48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8dd372fb92c98d3b88f2706a6381bf
SHA133647d472317dca30be74173639fd1c72879bbba
SHA25661207350516b772b27929e8e93b390b90372778b818e01d765f7fb7d9b53a09e
SHA512cc2b7b5c4e88e865b1c7c21f77d0f6bb9d4d147640ab480e2dbb59fcfcb11b84710bc55e681761366e68e7135bf6084233ef3d16eddf7f390970d2e6bf2a2dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd94d28264d6966a5f653d579c44f4c9
SHA18da023e7a3e25f1c942cad6c1b7c63f3e073ad56
SHA256e7669d967b433978731996b7c7b2318dd3f9196406bb6f1e599471fd9065fa9f
SHA51208487c131ad9c9f7aa1993f8e19f8d10c9d02c79fdcc9f92f1abd53b8e4d47be5f57498013dc0ee221637950fc0078ae9067cf628df53b2c7a046642b6c75a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e32807df61cb5a6a8c378c415c4ba33
SHA1c245eb2821128b3ef3bde9b3590686b941f2c447
SHA256713fb96f886400d7402623fa257b9885a0dc9b35d5bc17a820c9ce09aa93d221
SHA5127ca9bdf7fd1e130a014de46630e00cef8fd2d7508d7dde0b4b1e9ae5fe6a32eeeb7e194cf8c40558537a525fe39c777c4d6786e969b5c8976cd3a8b408f74e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dc8f134598c1f8861fd6fc04eaa1f9
SHA1ad48989df280d77347c9221c337d93a03356cd58
SHA256b0d2bb40d80d4257a931bc320b667e0ceff77307b2a0a6c6394f0dcbbac8d597
SHA512b7efa2b0de961638126b6036e4d0e999c6ea256a3c3cf4dda7f161436984c8cfb10725aa8d71d825d3ae585b1bb7c0679f6d6b0e9559c87c319e457900a33df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1215bf069978d3a06b442e02923aee
SHA166fb699d421b81a11ab4de1a3c83b2482bf1e8d9
SHA2568e15910ce25c3b4929c95d0c562d5d8d08853e02dbaa056903e0243f1c4f8173
SHA512c5c92d38cb7d27e646b41ca7dcb8862f833e2366658f10367e59f832cca05f0e0e254aa6b2214f8f6c520037b39b173ab40166087338a051b8a3cc82c37683f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b24f05be301c8fbc0f52bfe2c99e84
SHA1787db352a0f76b17c6cdbfd05d9364df5a30d195
SHA256cee3f9c090078acc34d8cb782bad34ce588a52bb738d93fbf878b33e6e9e6251
SHA5121736191401cb52d6a3141abf46300cf83e2558925ff3e6a3b97024e6488fc39d2c40a774e00b5e44d46d1b8e82e8522cb880da2012a80ec3885c79a908604c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e628f639a9d89e5dbdf72299a3738cb
SHA15f63c03b0663c2c4c2d8ac571c92ccc94e5fbd40
SHA2564c7717e1e401595262e8352d2ca2d314b55927dcf338ac43b74958611bdc218a
SHA512cb1306a3904a0fe74b2db846f7324bbf482a12fff1fe5a91c0fdcbd04b92cb483609e5072190a2a39ef975828de2de7410aecff08e6d48820a54ee22797dc357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab6ac05f9760a5c4eab414fe911b0d5
SHA1f40b9a32582998a7c1654e7d8ac6b4150ae26910
SHA256e1bc881e7d1984f686577a9cbad83484040988bfee7aa900247eb26103d93b0e
SHA512ab0f68fbc073ff04a12cdf6d292cfb3dd821d02bf603bc3f999a4a5f009632ec22ade9114e7f2e07853afbfee36acda691ab78a4496965e5f2a1e6bb657cc168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0ce189a567f3e65b4feb9252557f55
SHA179ae8c685af6279d319563653182d17e6a58648c
SHA2561d7a525409dac9e4d8aa7d898e1246613421ef9f5c692c7c766609311a9bc16a
SHA512eee91a709ce0f16f9f69092b84b4a0fe5d6ae5211326deb1d1fd57c77b554ed9bc663158ae550b102547993127ff8d256862e276b2efbc072d6b97ca9e602088
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b