Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
ebb275705bb2bb958d2c7670e6e7972d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebb275705bb2bb958d2c7670e6e7972d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebb275705bb2bb958d2c7670e6e7972d_JaffaCakes118.html
-
Size
77KB
-
MD5
ebb275705bb2bb958d2c7670e6e7972d
-
SHA1
2f1eb707872759f4a6f9053ed21ea75a6cff0e2f
-
SHA256
4611ab3fb9fcacf92cef7cfd313dfef6d94f38e409a2c2e573603b676d7b6af3
-
SHA512
0e1446badda57b9c8240fe42629d0e8340038e2ca1f6c634379d1d0ac820ff8ab92335c5e082127c3960230ec2e3e2978eec4a20fe7cbf4b9ae676ed4f97021e
-
SSDEEP
768:Zcd9QZBC7mOdMwHpC5I9nC4iaTxyci0dPd:gQZBCCOd30IxC2O0dPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b50cfdad0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{261928D1-76A1-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432923864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f080db7d3d5a0572451bdb7b40cdde60bc11863b0489cdba763c025bd3be315c000000000e8000000002000020000000cc5cc232ff69a2f5145cc81e26871928df3df00c1bde6f8d8626b764616e75b62000000038007b5504df3cef06494132dc39992a1d2009ded489801fe5bfea35155c422b400000001d1c89236b6f9f879b3464461a13f3805f213b90f3f5b232a3a45c922f82dd7922ea1d3a07b00f345303c8959c79eddbff4ba046802fb3a2b1d8e8520226b32f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000e0fb76bed2c11ac6485fddb45d0ab253c23fbee8725d71a912c5b7346ee2e951000000000e80000000020000200000004006b4bed3d194a4d848e12666d92bdcfc92f545a688be2d2675196642e134a9900000008cd84a8c7f6287b1e62b18dcea95f47c9573f08de0f32cabed5f818026ed156ea1513b4549dfb96bdb281e12c2b66360c17da7a44106371051bc1ddd2e1c92e442d61f9952eee1b692c890e54f5e4e1ac70a48688adc0f20619a3d908d06e5367aeb48ba41a421a0a16b445efdcf79adde41f0401e14947d68f34a6527060d19bc94e0d7a877a738ea7d8f5553712b2d40000000ecb63253af37e37f6c9233f6e45815418505d4686ab9842791be1b3985663ea944180cfb25c9b41b911a24a56b07437584907ed334cc9ee44cb03fce7384eda4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2396 2420 iexplore.exe 30 PID 2420 wrote to memory of 2396 2420 iexplore.exe 30 PID 2420 wrote to memory of 2396 2420 iexplore.exe 30 PID 2420 wrote to memory of 2396 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebb275705bb2bb958d2c7670e6e7972d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad95eaed91abab85ffc16d4fea6b1d0d
SHA1822c75ede1fd1d4ccb4a96f4904658dc68c1f411
SHA2563ce5689ffb84be9ef1dc1dd493bebea65935e311744073f7306185fbe0953fe9
SHA5125543b998d9106077d5bae092152957e0ee0af852f656b5f23e5950c101c27837b2556cf1f045afd6a50784fa010ec6793e934725f10d6f54bde92dc42c925f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66ed3b27201270c8ba69e92b97e96d6
SHA14416258280d56652bbaec18c14aaa64fdc498a67
SHA2569c4d58bcef7c3ad980fb0e9ff65c3ea4b3d6537ed298a33dccfea139987e2ec4
SHA5129a5154f6c7b8cb9eeac0c59f8869a4643726295f83db0e2a75e5f17f767aa3fac4e3bd5f1eada6a90980d289613d3fe7714cc1d161e85289a8f8261abd01bb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a079b77b0f06b76916699bc8f8713822
SHA1a99a00583847cddd221888f138283014e61cbf9a
SHA2564e780e2f8810a45adf3621bcf7425f3370fe890f820c070c80ef1511d83ec8d7
SHA5127bba4ea7b8f1e8ee1e009bd9a4b084b640e6fa5b26a4ddbada4fefef5da3334bfae19647f6386ab1708656e87695f177600f23fda082ac4d5249af542f89dfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b647af2533e2968c46ca9577511740
SHA1bf79c7db8fe22fc465934e5b90e6846f6347a841
SHA256fe0f30e2687cbffc2fea38462bab1c951630db1e1318fd8bb3c82a38f059fcf9
SHA5120806fc49fce7bf827eac7e5ca348fe2634f1434e0ac3cbc73d6cbbda99110f5f1896a1881899b6a9554876ad69a434dfb12828136e0d1d20db298273f9cecd32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5d5f97029da5ef4e819c5daf25836b
SHA1dfae1bd6c950a59e91fc2f32949faba46d70a249
SHA2565e895e2752d2a8c99185a45434c18aa62454796a0cc3e1f27425b11447fb0ad5
SHA5122e98a07067b0fdda0c80f30b8918cbebc216b6e58aded12bb4be44a6c68c645bf734b054e49283dee278b99df5a18a7159b79a889433bf60938e9f9e3c9ca1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b38b6163b5a1431f30624748fc21206
SHA12ada855cd5686d1094d8e96089c5d864534e3a05
SHA256d2c14b6c2a27dab7ec09fa6d85065db4ee8cc05a17e3b365df527f35be2125ca
SHA512f31904f7b0711e757cd2c02bb59f19a9094f6364ef5f23c448c9c7c14817f40eb3efaa791a57d0f3e0ed59270b6d41d30c4d1953685b4664368370d4c9f3c6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c4eb3848441b492497aa48ac849c975
SHA13b9f47924099c65e88861a692d44d4b1905acf85
SHA2560d13e8efc393f7ecb87fcf274de493374d1911296dc8c037a047c7e4ca3fa5eb
SHA5129a9a5c57b1643ed6fdb7c5dabe690d556b696451444b6f4f5f00435bd486427f98b72320eeab211038a661a94d6b1ffb961ade777564e2878d138146418b77a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfb153ebd18cc0073936f54d154420b
SHA17dcc6ad9e6aafb3f5137821e7d8578cf6626fab2
SHA2562c7a895ccd4495e5985f614bbff66a9e2e5736c6b00f615dc5251e72c74b7ce2
SHA5123128fae68401317bcf3eb656a9b45926ffea27495ab97020c57f6c1eb311656b6db35958d6968cda0529d115e0ca8bcee45f9f8e5ed40dc4bca6b7d8290e57ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2ef9d5951bc492989512ed74127232
SHA199c6966024693ad912c26e2238b7b0c0cbc95ad6
SHA256517dfa4e10b687def816a8e03f7985586067dd00cdd1d3263eb7c338a67a14e9
SHA51222ce5bd74233a7b0a0c0a375b48681aedbceb293ee54b8aa80fd993355b4f550614cc79cfc4067fafe3ba6f99d3ab563550758952107f200aa0b87219c58e0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce2983d2ab6c894a39dad0a65e3884e
SHA141bc40722e4faa692b1b56ececc7406e31063d46
SHA2568e79f8c4f6f0672b2ec43ade2e45ce5af6f7b221450f14f26e312c6385618933
SHA512e55e65a6bcce0e07c9394e79e9318a8bb00c8380a1f488eb2e730275456710f4e0de358892a1abcc8eb3e0590d729abfd6d0d44c1dca7e9d41bde8b099f348b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35c45c086231f8819d40f99e634df5e
SHA14013f241ed405082d77b5f9332dd49f240636935
SHA256323b1e1e25de8de5e25c5283fe9eee7d8fc0cf1cd8716e040f4254a9428a5b9e
SHA51242b676f02b9e4135ce75cec4df7811a998f23929ca6b5094be598046f84817099855a4dae6cf9bfbba200d6a90671d4ba9672132d1f67d51c93b3d020a9f6603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac248fd89c72f82f43464e91f0555038
SHA1969fc92ce4349cf7f8f73f7601aefd28a14afeff
SHA2566e1d10799472218683017801f88f71bd12048b0aae9cf80e8fd6561d2ba8002d
SHA5127717f4f80a8edb4456e8bb6e1384b6a33c9b8971b5221f0b8b46fef256bb137515b8c06f7ef28d5778c7237d1997ac3f7068a48e4c68129a7fa8465acdf49938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541804077a50c715b157553e205db7a4b
SHA14edf772de79c59965af0fc00ee6ee068abcf8711
SHA25623a467333852b6d5e8d40600ac48d8cd9e283788d7cd9bf8035842f57c23cdc7
SHA51200efa549943c13ea66f0226d7f5543f9c08fed429e0c9a166af4fbe18da4ad1c8669847f780663365a60be1336cc2784cd497214c51597e640a484bd9e213634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c944936297c50db43eed4ea74a46c75f
SHA1b61fda562d08e01591c0ae876acd58b4a3b8ad9c
SHA25651d91093f59543a1b2b278880f802d988b6ce1aa149f77e7d34a32deece50ef6
SHA5120ffac34a5104f5790bd90b3c4d920e90e537c6ef154e9b1794cb65fa0ee2de18e0a8b27bb1ab66185e8c93fa241a2a9b008bed3c4b20a3048607eee6d8600a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9b61c2a745be8bc654ef95274f7bfd
SHA143ad51dc938b5b08a7fd4144a072368b4442551e
SHA256693787f385a6890093df034aafdc0fda0100783980d0f43ce7ab38ec8a0eb65e
SHA5121e5bca794582335122f474b403ed78b853c5d958895e04c17c25b9b07d764c5ac3bd8fa53ba33ca8693e97d8b38aab27675a51998eff737ba670e55fd9ab64d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59819f14f1bb85caea6e824b18d11a19a
SHA1489433fbf7b0c73b904ac2c0510b7834e036f784
SHA2566804ad64895e24909bd48965524d765807a30f5da3f647483dc7f2cb8dcf72bf
SHA512de6ddfeb8a2d0c6edadaea7f73b1633807b6f9b112d41e65dd87235a464da08d4b70d94a63a0a9b5f98444c1df0a17ef22b2d1888177ba484edf7dd922995b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b92b58e81d3da624557ebe8c610b2d4
SHA1ee65b440555db3a702dd49bede5e32263dd45045
SHA256f0b80d21e86a31ec8877054e8f98b6b3485c171953f548a2950851cbdbda244c
SHA51246a44544aee34a99c9d4085eb9c10a8cb0b9f6953e33cad3be31c28125653adfeb615f58c15913f964cf62c7f9017ea8bf02a9dce07ef6c965efa44cbd1c42ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc53a4f587f2f6c2d3dc876b6540152a
SHA12e2910f2ddef1c3304dcdfdeaf3d85c4517e6066
SHA256b0814f6f3bd7f69752e52d092ebc84ae2d3ed3855a1df51ea7849b72b85e463b
SHA512ea0fe1a39fbe92cf16db93f464628d4da1e6c9ddf17584afa936a7e60003ace6c2032060c3ab9541bcbb97b1fdf87bc8dfc044e5066ca801165a2340208e355e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b3b58a30c8e910d238638456f790c9
SHA15c69518a7a0c857884bdf227e098d12facaf6e50
SHA2565081f1cfd5a83870d56f7f9f88fe6115fc6579e58881de98af4d73fd29b0864a
SHA512c921239eb9fed9650245c3b15cd748fb1faaa795c315fa347be801c7f1b20bedbbcbec3b28fbe374778d8d67b4b6ac1bfb6cfd3f2040475c9e505e6baa4bb8bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b