Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
084b6a8e6476ef3a012b541c3d268217_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084b6a8e6476ef3a012b541c3d268217_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084b6a8e6476ef3a012b541c3d268217_JaffaCakes118.html
-
Size
13KB
-
MD5
084b6a8e6476ef3a012b541c3d268217
-
SHA1
1705a92eceab63b9ae34081f3262490c387dc928
-
SHA256
6c42b6fd9029055e8019c93e92fc93f7df421416ed1e3089cd16ce2717bd7fb7
-
SHA512
29cb35ef0e4c3e5174717b1d328b476107110e19187cdd2e4dbf27f5ee41feb98d8da01470b76d046eb7d06e8def46b6e1eaee8dbcf8dad2acae6445b2d5bc52
-
SSDEEP
192:csz7xYAYS/P6E9EoHsyy16tbclEePHb76f:cqYAY8P6EjN4ESHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D1459F1-805F-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000267c5ba107d65d1eb166bd9f10995700d40d2e67f12508ad8bca33472e063119000000000e80000000020000200000003806003ad1de47a6951774d9a33d1e2bd6fb9693a8fe1f6c262b1c1b355fa59820000000b4e6b10fff0d6e3af428aed5322246efcac4bea58bcdaf2081d515b9e14c20c7400000006a48b737e916de209e5fb9efd54302b6c3877aaa8a172020de4bda8009fcaac9b963c8a9b169f3d17447acd1ccef3dcc19ad7c91f5087866c9996506f8d09313 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433995121" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000e930cc2500243bcb9ca0921a3a2145b582732fe7bdd5db078feb3b017af4c78f000000000e800000000200002000000031076d301b8591c1c50b7d7594bec017f32ffab503256fb2c94bd18a6a99015990000000877ba578b592ed8031d629094c770743158946563eac52e37ec4f5d09ff83fae6fd2aea3621ff0bb8b88ee5bbfb72c1617cb7a5a424d59e81de452058bd30613bde8af73216b4883fcff26d669d30af00063c5cbbf9c7be6e73dd9730e04e83eeb587a78a84a1d42ebfc9a803b55e5dabfa3e6930bdd234b4a01d382bf492d6a1185065bd7a8dc94b3b485177bab7de040000000fdcfa83ed2e47a349103040982504d1abef53b696f045131e8313856a1843d06daf6ef06b3f2dbc0fd6d9a4116ef0a3a52fe1c358ab324f43de18e637335c92f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30930c326c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2748 2068 iexplore.exe 30 PID 2068 wrote to memory of 2748 2068 iexplore.exe 30 PID 2068 wrote to memory of 2748 2068 iexplore.exe 30 PID 2068 wrote to memory of 2748 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084b6a8e6476ef3a012b541c3d268217_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524336c049c9ad1bc702d455448894935
SHA188cb4bfda4ae539c2d9ab90ff333c24f055afb03
SHA256cabfd470d1662030f705f666f5b579da68ae1275dda1fef9b6bc21ad8e2f9cff
SHA512b013b332298cb83fba12970152729a452c4e269495d474bb777d11143a93e9310dbc428e77e8dbcc828c27420b9fcd0120a8d44606d423bffa44515b3ec819ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517134821fdcf0dc7eea6febc7a5b184d
SHA1c8cbb611e948b0c61ff229a6e96f741e53ab7bc7
SHA2567fc096b255997f00b30c92e0ed372d46ccadef096751397c8a6fdadb9e79e026
SHA5128b271f474c445ba8138a5e0d77e054395c6e41ed2e3b4e27251e894340d16681ecd601459f30aff3d91dc93ec45c537a4275fef864d41771b48b29cca3ad7741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80ef86178d8c63b2d44373cefeade04
SHA1bb7eee7d7d119f190d586de5be0d60417e93e531
SHA256effb80ba2a29dd08af59b3bfe9801766ddcfd7f0057575dae14a249f0298af1e
SHA512ad2d04ce01b49471f3aca65e7ba4b3af5ac3f45c74a9e80e50cc9bc806be20df29ccbab23ccde4bdebf2ba8d5775837a1ba21c3ed1a91dac2c51a3c69ec42cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b57aeee7dcd56ec928686973fb74c4
SHA1daf267b4553016e767f9ec63f28dd3bb5b31913f
SHA256c32579a12adfaed69472dda1fd3ada4092e6692cddb96a92f98e2e2bd17828d6
SHA512c29583cf00a8d98aca422803c0f3debec7a317a01bba10bb7b37f375d783674a7f52a656c00b20c73bb43b0e73f9bd0b6968ffdc018bb7a071da7b96c6612ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdc845faed9c00c1f259c888f99e5e2
SHA16461de47e8bd921b25ce0c82962b63fb8d517fb2
SHA2566c9389c54e6631670c6bdc8a69a9ed0b7770cf88ce5b6205554436ca6ef51caa
SHA5127a1b54cb3f99783b71b91b7f787299e1f7dadb0090c7773c704db676ae5cf8f251fc62232921cf4144ae1f9fcc8e22d48dc6d553e3e0a04b1c5407cbd978b64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107cc209dcbb2c1f83ab3489b86b840d
SHA1574437da00fa5438195affd03ab82593b5a82cf4
SHA25668a2ad4499bc23ec2dd3659e96ea0264ed542313ae60bbe1ce0410c1405b8276
SHA5129fbd38ed020f206ff24591efde1d671077831b5e3f300cf6ba0defb03aff021d956933b51ae993f8399289caa8e23e2511d3150fb7f5afaa27673dbb3924bf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1e9b1bbbf407d05c9d50cebd0724d6
SHA1c40ee67870382e4f9fabb55e3044343d805696d4
SHA256c7d16f88c928351090625ad14d80f6b2e7b58da23edb1b11486aa2319abc3e84
SHA512edbd4703442959178f8fb36bad3272f39879c7075ad2e5102b56258aad1db9c5be23d410c36a807344ff434dce28847719aa324680f90d1a3d676450cac9f337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0869b216fba10e0014b4e97ffc96e0
SHA10df75d17d07700e6bdd58d9bf7d86e5c56e4d5e8
SHA256817ce2352f56537e4eaee465a0a508ec7bba782cfd9ffe793d0c0f1f8e57f2d8
SHA512762922bd79fd7497d8ba465caf5f46298177a8bc5cefdd0cce06cfe87fe496cb35316b9b588a97c5ec7f288e21b790148c133b69e9e4d4c1414e41c2ef5ebe66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b952e92d2a5fbf2484a554ae7ac3365f
SHA147e45a4959e8271562dfeb2fda41044c902d20bb
SHA2564ec75410aa97c14db7dcdb679b8a62fee231bdd5f748e4e3a591e62aec842868
SHA512da5179095df7389c3a0776a67227d1589e443d62ae39732750cedfaa2df957fe33edba9fbda8dff8e698015948dcf933cf17114bb430fc34d7e9499ee56738bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d009fde3f5e30c12df6023a36b692dad
SHA14fd80cc6623060e35c4c31827738076b2f7f4c6b
SHA25607eded133ae7a3e8cca3747611b4e147fdd4d2bdab508eb446a0edbad74209eb
SHA5125ed7e1bafa5388ad5daba26d5d90a027ff487e366cdee8eaa0388997b2b20b73fa3e51b3f5d5392bb2a37ade5829839e8592f298336637841df25eeccd2dbec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e70766bc46eb5be46c78639b3a3382
SHA16d223f47856a24ae72a44aee6d19537af1b45663
SHA256f225e60b89760bc31b79991fb1ffa84f4cc8873eb96dc012a5d7c590a04141a2
SHA51286baf680212946743e019c164603d734f05f2d9a198d77200237d8d3d5999fee6b84cb7d393645cf0796aa04bc61ce68adf3fc839de9baf4afa611279cd7b59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d1df54a4efb1f47bd20f0772e6c1bf
SHA1bb65cb10bde08e7ba1b9463c2792269795ddd9ed
SHA2565ea4a49ed8ea340a9f3e358f62e632b50def0aec6138adcfa7bf19ad7bd69cf4
SHA5122bdb6b943db7dd81f38313d6388e27f75e23ef4e5a3866c3c07a1211b7568f1c6322070a4ab9a48083dbb97f2ebe3dd9dd21398585263a1dba9e2a24c124dc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408c033c2005357f850b48b52897251a
SHA1b0c3ba16215e42c53fa2fe7dd2ac2f41deb1559a
SHA256b14161428dd3c391209e7d83b9a1db7928beb95c3c927bb6c0a7b2a1a537873c
SHA51295a1fb3813cc9e37d0a9979394fc32d4061b7639e771d7c65b46fa1b69ec4920e4bdf012cc52e6b3ea42ce1935dbf4258ab23c78445048a52e44364e898f45b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef18ea2f485c666f9f24da9400dd1bed
SHA1c27b610adc7d127e930741a8e99c150847690996
SHA256b716ee6f96a82b8bb9a7cd1bce41e0a9bcc5f02bd0da953033579c6bf0703a1c
SHA512a1b0718adfae574c2e69326b8cd5ac3912ebc345202a6165cca73e9c3a71b4a7ac82f570531d47b7246a5bdd2b9d5f97323411367823fdc87fa228a871570568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ad8347fefdeaba25a4c152a283f5c0
SHA1f53574aa658aa0db708adc410d066fc4736d504a
SHA2562fdf338c6650dbcaecfbef61cca01551e3c17d3f1dbf0da9f794a710100cb6e7
SHA512adb8c9d76f74c4f3e6fe17c1ee18f1bcddd8da79eda7638ea5be1c0f5242daaecb4879a9d6a7dbcdca366ea2b0c7012579b6fa8905b37d8bf4023f1ce01f6f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57843275373c4b3dd767447448767eb0e
SHA13f90a8ef96486dabf8765c3216cd8715d61d7a19
SHA25685213d8f3beab3368819b698cd8081f1ec5f1434c65e2597cd2adc45a65f31f4
SHA512e74e69892179cb324b70cf50d076d592e070cf613bbd59977fb0152583469a1b8de5b6af62ce4fb8dd0439c99aae9ae8d311951457fc7520f5c15ff1973b390d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd767eac0585dd9e6b4f55e743925d2
SHA1debfe575a3330603ba1b288e49c54383ab22c880
SHA256279ef31d85dcf67b444e85761a0a72c15f610413a7e3385eb71029997faeb1bb
SHA512f7587f53474da92ca2aeaef7ddf44768f2e43f454caba5a24bff13eac501260ab4a3f264d237f9ccef02fdc37fc4f47f6778ebebe958d69c76f79afafa6dc4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d0088ae9b1e372290a29fc5bd1f700
SHA1d728feb10428f63833364eb78b9a8de535917020
SHA256297fa732e65f37f0a8994c11cd03dd5d0e94234ce599da80e822ca7469e185ae
SHA51288c664173c507f82a2bda92925193828e32e773deff3645cd41a2e2d49f53bf21379ffb1f0e34f6c73856b4dabef33915fa6e81136d367e126dd5be92fcdf05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682aa89dc03632d0a842e4ea9f8a49da
SHA1e7711ed2fe98fae33e5c74d31f75ab017f7b3288
SHA25638a460eaed89bd33491e268f6d0b594dbb1a2c31acffb947dc87614b8c33321d
SHA5126286c1e020e8f66d167b558efdcd1e2e7604d93e52ad99fce2a01ee8c78de17a0acfc24f346995f67e83f14e2f3828c70126053ba2a73cc06dc5ac4da6e08bce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b