Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
3eae08a7747fdc8999c6e2dfce4441bb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3eae08a7747fdc8999c6e2dfce4441bb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3eae08a7747fdc8999c6e2dfce4441bb_JaffaCakes118.html
-
Size
43KB
-
MD5
3eae08a7747fdc8999c6e2dfce4441bb
-
SHA1
583d000f351e31d23679a0aaca76dd03dafbeaaa
-
SHA256
f883daddfa330c85ef79c7c184de3db8c43c2cde2579bac40a0bb19b85d4c7c2
-
SHA512
5eec7c65856e291748052b81e79e5f97e80bf772e772c9afe80266cce967bef8a1cdc25c0d531dc55b8975fccfd08ef755040aa66a5f15a7afcc2005e558ded8
-
SSDEEP
768:eR8IcpB/Bhsmvy+LCFIhdoWZS7QOtJ2wE2xH:eRYB/By+LCFIhdoWA7QOtJAYH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434968078" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b45aa7451ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4974891-8938-11EF-A160-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000018318d0e473aa3dde743b24753a1625abe1c2c04ec1bc12c7ae64b62c8a335cc000000000e80000000020000200000005b9a5c3e779965d9ca5aadc45a5afadc1bd37f192514d6d114a35db44134a37120000000dc3fc454c0873aea7c3ccfad17bdbefaafde0d2861d60b6eacc720f560dda26b4000000085cda37c88f76efa00e1e7f6c32f565592c30155435e437afda431cfd5ec7995fd59014c11cbc7ac4bd3597baf7359c97345c51d73b61255425193dc65349abc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1628 2352 iexplore.exe 30 PID 2352 wrote to memory of 1628 2352 iexplore.exe 30 PID 2352 wrote to memory of 1628 2352 iexplore.exe 30 PID 2352 wrote to memory of 1628 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3eae08a7747fdc8999c6e2dfce4441bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d065294efec7ba9b214adc6620f36fb0
SHA1cc8ec1f489598c6b74fd9d3a014ccab0bda253e7
SHA2566be720825294fa03f6050aedd5dc6fd8768b900d64d591704be2459e3a739d75
SHA51247e3a71f038fe55fab1f03fa8d4338eec069f739cf9ce47921b04140205d6c72fec55f103eea89318fb08b1d6d16d476590b86fbd400a9a9889117b69e2aa2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561441380148a25cdf2b5af23214ef8ec
SHA11dbc43f3e2beb2a17058c6086b7f914681a19a55
SHA256964b3805c65c61e0eddbc596c1a3126d03551c332b316e5ee05dcba99009282a
SHA5125bafe753ced0dbcd8e7210eeaba6eb57332efbae1b94b15d6cdc69e5264735a5160ecc2b1dded207b8da055eedbcd823b8f18d4bd3105b2549b548574c352088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868f9a2aebf85b41f21d2b46bce02773
SHA1efab15da13fd6f2d3b64159510cff9022f0cd816
SHA25632a497bff4e363287e6294aa3c8c3f756075fbea166214836021297226482f79
SHA51226f2d9f237bc36f3c75b94afebcf73bc66f375aa60b5ef2bd767068633bb6b2c6c0dc49a78279414d69fb757cbf392f510ebb1e25a8ad415c55639e7551f8ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d2ab94f35f7a9adf6be49baa5b5bcd
SHA100497216ceddf9ffd3e8a2a3c5c0130a113a2080
SHA2567606e89ceb1b9192da5c57a22599cd41d7d5d1bd077f1ddd7709f491e8c6fcf2
SHA5124c0ec96d8ab23bcff2792d5122519190a77c4b38dd735ff866ebca5eba6239af375ba40c1a471a2f69b5221a03402715445c12d3448f03026d451d7374d493af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e588c2a54c8645672f10f6c5dc95a61
SHA11e0f8a93e8392eafca3a625eac901791c06c2665
SHA2564a71b1db57097d354fb2db0a076fa9fd17edb6a39cc87df8af0626d92b776a62
SHA51220ce65092c4db394d99adf7dc015e07a1543feb272182edaa31d0a44fe460df327b515f85eea484fb3b4fd54dbf4f32c3e0f5a8374720fb9f1c5b5a76c8c82d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f413a19a35889dcab61374b3a841dc
SHA123a94177ac2023b9c5d63e1cae68d204d9fef4c3
SHA256d37815013230c50f10bb66aa7aa35e880a6df828924c8c4ef318abcaf934019a
SHA512126e946763a14a2aa5d3ceee793dfdedf75c29d9aadf566c64668d8aadf25e5b94bc72325930d4ddf87632e16360e80912660f121527b689634faef8dd5c3ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1837aa3e51d6285ad5fef9307ba1dcf
SHA16bed93ccdd5779bbfad69f1642c6e579b5718830
SHA256e05414edfa8c6e4884e1e51cc80edd4db9820a177ed7a52a49c3217dafc8882f
SHA5122df564512f10176157c14a6fd037e8e9ca2ea0ec931efb0e13b600da61b71ad5fb19641049f16021ee91e32dd1bf55a24202888e8cc4b69db936f36a5925d960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587041eb696815c84eef4a3b09b78b52f
SHA172bc5e95822ca5e092a46446bd42c37a2d8673c3
SHA25652d93e52c575a2f7a1dd85db459c35082d232a18a9986f322e6056763341561e
SHA512d2be33acf4d202e095ac3b3be90e659ddac360cc942dc73285e9c952f8cdd5e960b5832f1a7044db52c49dc7dafe9eb5e2a9b37bb332abad2897d76c9b4073ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75ab1bf39a52c18c631891e58b3f328
SHA10fddbb0419e22b792a6923acc38723729e67b628
SHA256c8feb7fdb5a6d1945d493aff05b2f5d0ef0a60e6ad639ab6d77a87ea14743809
SHA5128cbb93a87681ee010df6842f0387704c90acb61ab853e58e13f293fe9c3fa6ea57e5105f506353ac53d89697a36d9b8a5c9ee526a7c8770c40e1ad7c59cdcef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531526f1b12b9b85ccb3b4a3600d91435
SHA11b8afac871a508cc596a59d66702338e4d1cac9d
SHA256d63418116bf95696c6cb35bd1322d8ce143eeca2cda30ba2b82ec420ee54473e
SHA51295a3f35f7594600c6f4d77ab91f832ed234036c8bb93c53fb43503c38935f5d40dc12314c543f7176056453316f15c3428cf57133d4e76c444a3cb3322dc20f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84fd18642674c8b64ac954f25d0192a
SHA1bfdc84e7de8fad410ff7081f40662b5aeedf8390
SHA256c120fbae475fa8cea524a093baa83cf58c07363a02881d811c09210c05d45051
SHA512fac76f8c057a2c04ed6da5f9d4af1ea73192466cf62dc85f3455ef7d69618fac254429f31a25aaeb43a036575e9c0fa1aaf3bf7dda5fd7d32ce7e4a6bd22d383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad15361f633a6a215e0ddc98f742cae2
SHA120fe3beedec23a694b1e1840c3ecfc775c70a7a9
SHA256e68ff14d2fbc24340cee3e5ac1b8e298fd06c45eed263758e6389e30706ad8b2
SHA512d58aec8043c6d30607fabdab7a6bcec6d6ac96d032b5bf9e019874e04139ec0ec656e643db0b85e645f3f794c9cea693b0484c49214756bd865b8971734aa6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906f75e2f2f0d35596061787b1c9f5f2
SHA1457e752d08c67063a39aae21b31c0da7647cc2b0
SHA256e887b5041db1fe2a4ab7c4e15426c3666a469758214be31750754b53b6113242
SHA51296094ba43f1a9cb3015e40c046e25f8a69e1115c9b7048096c1d7e0071c40e9f7c0300cd39bd3eee0425a5f88230968da0d1e5cae48209341dbde3644cc6c2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a17e44712bef8bbefe73450547adc01
SHA1193725f55bd890dd31ed5532bcc0531e7f5d931a
SHA2567cccd5c76f66b4d752474cf9c9b754040a1819e443ffed7a6007c5c7dfd821c0
SHA512b4b610887971696606232dc72bf19ace80a891a5f6a15a8ca4f240253d6fd726909045721a154859dd74be64e15423c228166b6c2b42d65adf9b3f9c90ea6291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fcc0b256fd915364475b6e2cd7540f
SHA14cac48b10bc30a92bff46bf846b683729d59b79e
SHA25619e2fc1a1a437cc4146b92771463f4ed5759f088eb8659397cc9d7af3eec98e5
SHA51297c3fe93e3ea5216a9c428921d2b674fda956c46fdf3ac6c7bffa28f5294a954e9417dd615cbd17abca87ce77a446f6bcbba0485307f7262c6efad4abbdbf607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0c2240aba31cdbfc17b492a2d90ed7
SHA100a1dff95226666db2dc8b9c3634508cd7cde623
SHA2567ff9416993a39df4791b3418951d6c672682e151a5761b15b3faac5aa3d17a2d
SHA51294d11a3cf1bd8c3ed51db22b06c910e6d452322ba74b4c3416307279fefc2ebb6e649adde6de0c7f20bc89d1f55045084d0ce856b61264a4c5cfb2898245a891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4522fd338914277904bf885a65561c5
SHA13644c02dd9ffaff65fd4a6e44de149e830b57f94
SHA256675c73a66f5ec3618aea32961b9bc1243fafc808a27700f0d78d73590f240502
SHA512111e51394497685ab21a251465f5ed2e17c563912e72f95ffbdd1415fdbd3d1dddda137372c1fdde7519b9e381d5f2429eb27d9362ec4aed7fcdecb3b8cc35d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3476ae92981d945ff91e38c6f98fa59
SHA13c53b7147c0fc91e9ae3dc831e2b9aea684fddf3
SHA256528b5420b59d2992fe7a49fc61150abac5abf0aa9e03e96513a85cccb932c91f
SHA512b732f64898c970ad62a7785f2ce3867a184b492f273770af204edf87c2bc98a6719a46db383e38b873a2834be6fd9c450df2348f8f50451ca286d36ba4408d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af1666ffc3d7595a22995b34d23bcb9
SHA14b88148e8189cf62a8b7d680d36f234613056a89
SHA256d71ac4753fc8c7c77a73629a1ca91b2333bd3ec9b02fdbc5208b215f020ec8c6
SHA512e807524e341af053918a6b0450e60a206dd6758bb3c77c83d666f43bd876803f323aeb91c829f640ad30de4c0db8fc9390bedcb296f830dcd0138e0375e01d0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b