Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
d187c50d4716ee62cf3068abc941dfeb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d187c50d4716ee62cf3068abc941dfeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d187c50d4716ee62cf3068abc941dfeb_JaffaCakes118.html
-
Size
139KB
-
MD5
d187c50d4716ee62cf3068abc941dfeb
-
SHA1
fdea7a9ef041a941b23cbe55855d8c3e87dcf2e4
-
SHA256
c33515d5931c23b5e554e57e2655da5d520819d73ce3952a5d4cb9b149ef89bf
-
SHA512
4acbeaf98001affb76993ec18f8dbfeb2fb8e189a133628a05194ad4cc522c00ea0459891cadbbf875fe9fc0c30e586f716cb3053e9d52d8dd4934cd189da666
-
SSDEEP
1536:S9tQHMCkBqclEMaRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:S9iU09tyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004d372262354862b80667a6074d119aa3d652f23ca8b5d43d0df0ed016d29c074000000000e8000000002000020000000cf34a865a83aef7ed0ddb8dff34de1f7b15186d90b5c98a008debd708df2ee1820000000810c9dc5067de83907196061f9ec29ba6bbdd89a502542e207aebaa57f44780b4000000026fe6c68af2319c386382597aa6f5e563411bdd1f38d29d6d455101ec4137f111051b7ba9255424c8a7fe513e751964df40213c8afb137d6a8c2b1bf1ccdc97b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a88c570201db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431860474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FBB8541-6CF5-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2360 2916 iexplore.exe 30 PID 2916 wrote to memory of 2360 2916 iexplore.exe 30 PID 2916 wrote to memory of 2360 2916 iexplore.exe 30 PID 2916 wrote to memory of 2360 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d187c50d4716ee62cf3068abc941dfeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b3080238dc71cd2c89f78d5b7de3d7
SHA13371f57f8e7044b2af56a15f9d4e92a4c8da2fc9
SHA256f25e954ec26ef23127fecc79c77bd8f57f47b5becdc6f873b7a12a132151a824
SHA512022bf88a8710d42b4d448f1384647521d514ae51b460f3a1271d634d6fbe850c2e7d66316cb435c541eede195375b9e9963e5f04b3f92ca5232e8b0d2e2af16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db979516de721f7868241c125f4abafb
SHA19329da1dc7f575cf04d47ac944600921afc69a42
SHA2567913822208e20894363987b5467ae0d4c050295207950829cff9882520262daa
SHA51289a30d6d5d2b6831ede6bb286443229f2166c696b45d992b60cdb7e07c0a014254eb1fab68ce520689a073d59c8514a90ba4d04d821dd6c881f0c708c80571c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57872064cf6dd2c4584494d860a66aac4
SHA13e1713fb905c4d4ace3f05c4bd03932f212dcf70
SHA256b50c314776dfad61737458f0b9418991696fafdc8ac314baff47e3a28692353e
SHA5120fd0046967e2e7f51f07cefc42ec02e552b95badfaf5ed4820ee13e3ab878a65cc605f6f0e4f49481209e182911337c43d9f912628c81c442cdb2ac049a4be86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431a56a22f1cf2a7241a15138e8f6f6c
SHA17206f2e21a0900ea10ceef6a74020413892c32ef
SHA256337b758e3244c574f601ee9276ed4ce942ebdeaa9a8edd6d489052da6d4e6ded
SHA512e36364f2e5d9dc080eefa4994e1055d77339ca81d94dfb860e56673ae9621963ab1e5c7499f76db41b807b1d8de6965e919de2a4c0d631c77b18155f669739c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557dd49a27afb9a5efab369f084a78889
SHA11d0246741f64cb22ade734e856214503367b185d
SHA2561ffef561b151ab43670638f9ccaeb6ff6668c6fc910c37ae5a23ced028f0b19d
SHA512c3053764a0778ac9632957de01ee57a34aba9da3660ca40ae768ad5d84feb3fe845501eeb9d5047795834c6a7de6ded7d85e61276a282028c40360c1223cbabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f1c6611982da40718358ad2c558779
SHA1655a874862b22174355fc8d3b9d293dddb3b1276
SHA25654857e3d33dde47f9dafdb9dc42f85d146e92568a1acc1ef5601f91042f41d95
SHA512c971a2c09d05068a54e153c91d576efd058481922d0b5855ecefa38974df8277152566b262f10344acaf1fe222af45aba463f8e3cdc0ea23c10dba1eb49784eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a7e1fb0ecc32100efdb9b9722472cd
SHA16e0d4e7c9470ea39bdb9ae527e585523c1df83ef
SHA25661aa040c82207476afb4edd7864326ec5ebe8ee87526f0c75e98c74a45e8d674
SHA512171392fcc236a5c3bc5e0198d064b801bc936e8a4ff6adb68490ed1be6e991d2e3cfaa78c9ee51c8498081594ee51f8af0d263cf14abfe6eb5b1b01a38eacfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccba2f3b9893e4fa42e5d108332b970
SHA1f9bd12c5f39274999feb358bfbd457bb021c966c
SHA256462ab5eacb789a5bc804c8b6297221aebf1baf8adb5c5be9b5bb9fdef2f766f3
SHA51255bf5bdf9b192495c1f8de9428b9022c835b919a1815b54a6f65bdaae4713f20e30d44da0ae542ef0c441b5b1544a68c31410d0d3bfdb81e2ec7f887ff27ebd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58660fe2df964abc0c0e3167fa11a4f05
SHA10ea010d7c784fff994a507efee7eb769bc61fe03
SHA25680f2f2860e26aa43f0ec111fd474baf7342d880e2c7393b1f6e7fb358f29824b
SHA51252b1885f0e5032327d820340ab882656710930a2c9131a1b1f490550f51a99e07ee7d509c73b4f98e642b05109714db6e713be3978a68bdca8a2195405103dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d986ec488fe4bc8735986f56b8e829
SHA12ed86766f0057652adb37c6145ad06555239be9b
SHA25657cf32d68b14c0a1e71921994f46927f214c265d7dd0906c43327685c860c868
SHA512745bf4aec3f3e2789822c4ae8dfeb9c1182a0c33bc9ad746c470ea9b1840141aeefe78c98611ac94e1a49ea37833722d899be421315a098f2a1043668d569d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e97115a2a47d033ad6f31d0be2ded1
SHA13b54981cbb6cdbf235f348c391a3a98951a40aa9
SHA256e7500137d6317dea8ec3f78ecfb9203951abb22c1f8809d61ea40014fc8c33b7
SHA512923493491a9b44cc950d7cfd95dcbcc9d90d487c2c5bba3d440158a71889b3d20a92e32b6fb2b0994c29d258877388f8f5967295ca652cdd081003b313dac0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1135ce437a4c835165678b328d1fe35
SHA190306cb7d315c2bd88664df455adcb3f6b18246b
SHA2560b65c1ac8e1c566b66d4935fe7c4202c692c385976eefee2cd6cccc627041b84
SHA512f8606c356fa30d7c51e5323ad81a6b2ff0462c2aaa6fd2897a548915a31752a9543b06ddac483c7f9ebaba30eb1ac86141627019887c42a05bf9debec5b0af1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a54c1322d6545f2764210d35ce0cf7
SHA1799cbc73ea24341403ff641051a4f3c321a3e857
SHA25646f774067f6214eeaead154bcc181ece22ec8af205f66c5f3f495bfe7fb46a77
SHA51252c59aedbaa181e426af545c89806a6667ad8f39fffc3411d94beb0f62a4bb91e06b9a36499ef38c72dc8a656365ac37a88e0bf2e4433a9527552abe39efd2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509701a4f04ab2fb8bbf8abcc7036a4e3
SHA10355c3964283e28ab2d88638a42cddac3353e1e6
SHA2565092c87e30e8dabcdf2570679ce6ca19c0da072b8c8586183dd651dc7f2ed72f
SHA5124de3cf7a0185d0c25d5a31d05db6c10ec8594ca3f6709b87f4e16afbc07c745943682403dacae36b576c6575e645bf6436eab6f4dba23abd6466c96dde7ee36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b9e9bbf928a0a05a783400492c9180
SHA1461791c669fa22a002c8dfa0d7ca02acfa35b5ce
SHA256e7730bc5a49ea9f5dff0bb9b0083ab411c5c78649463ad6ab3c5f5f48ca7c772
SHA5125175d98c464a783923a7f52f6c5ab8c894786e0482209fb89c2554b2ca2d1548bf2793dd3757d949b7aa8398729efe7583223425dd3d260c05433642c64009fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c8534216db8afdf6dd62898e3ab1a1
SHA1b2293df1f06fa9345ecae05e1be6c91f3ce499fb
SHA256852efbf30ada71c89c12bc83534408294e57b06e8c100c71eff5782ebc12301d
SHA51274942cd89defa0953db9255471a9e4cd0ae3ff1d1bb4e3517c15f90717df16440835e457815022660a0e22c4ed1d80d90a9559036100517d4351bf64fd0a4a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a474eddcce968268f4ec548718406a9
SHA18dc0b4ff22c55b051ae2ba17c4d55279f1d1a08a
SHA25654b167fa3b80e5318ac753f61129e56d6135d0dc39f80f5c259ee7d02dde734b
SHA512588d352dc5743dd24083a1ed796ec71d51d875a96cbbd2b542189b9d580bf17f8abeae13e1fe07bbbc012060d0c836e4e2f8df4dc3294803a7035743dc013338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b617a4d1c26eb4af7a14fbd0d256e6
SHA1d9dddb9f56a7aacbddffd1d3f6e3f524fa87eed2
SHA256e48970a2cea3c176a8af8bb9bfd8bbc7ba0867595ab26fe9d97172f71a597bf9
SHA5125eb19b3aff9f914d3a5ebe84597604b13012fd77adf0de21281a59bb92ef1ae21f59c7a35dd3fbb5944d34cd7fa07bb10c50e2ceb79a84217bd2b4706335cb9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b1e289f54e28608e85915f8afc43cd
SHA15bb5e5aea37285f271bbfcf5e8fffe46b9f4d6ff
SHA256f2390eb76d9fe70cffb859c4a24ed30a0536d4cff0e490aeb5d68fc281770f5e
SHA5126cb31127e10b1a671a63317150945e5361d127e5248b6057125636c09ea12d203c1677e283316157dc45a7f91020b6a34a2049c6defb65a1044f52883af910ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b