Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
d6246b8cf35c1fb53d8507b1c246671c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6246b8cf35c1fb53d8507b1c246671c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6246b8cf35c1fb53d8507b1c246671c_JaffaCakes118.html
-
Size
19KB
-
MD5
d6246b8cf35c1fb53d8507b1c246671c
-
SHA1
262d9c36c596455a5b323df89dd0afd10e814aae
-
SHA256
8d500b4586e935d2b040c55f94788a897355666288ce51a9b6e82327fa37604d
-
SHA512
3eafe2896b216c423e0bda5039bc415f637003831ce20e366f0d1e4dcbd278600b14846617ed3e24d5f327900fb898785a77aaa95a7962b4f57a12566a54db2b
-
SSDEEP
384:i+qTZPxLLMHS2CKLgz9JrX1Q/rTlKejhIJqXxtbWLYx:i+qTZPxLLMHS2CKLgz9JrXUTlKejhI6N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b8a9cf942e7005fd8d1a02458a4a0b4a47e84d1d2e5df3a8a101227737e85062000000000e8000000002000020000000e3d4b0208a7dce74ce70e2082110b6e23e6bf99bb9a1bcb5975a07562c9bce4f2000000000f4ac00ebc49d6de7972e0c22d572cba42fdd9b1dc32d0b5696a4bb07e864c140000000eb3c997ae44b3ec7fbfd3b058622d443ebda41085b3a04fd96822ce8014801cbedafa9890c1eada04d50b3e301cb986c1537575a2ce6b296d621dbd3f897e179 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432040128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c74a5fa402db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A67D3C1-6E97-11EF-B8EC-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2700 2216 iexplore.exe 30 PID 2216 wrote to memory of 2700 2216 iexplore.exe 30 PID 2216 wrote to memory of 2700 2216 iexplore.exe 30 PID 2216 wrote to memory of 2700 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6246b8cf35c1fb53d8507b1c246671c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f1232e0bc24a202f1d0361bc9b38af
SHA14d8d40cebf48b4c43459c242fbc920bf0ead8417
SHA2561239d10001db9cc83f986a1c28cd2c2006dfd992ae4a070d530d131af053fc84
SHA5123844852f53f41aa62c1da1f54779dfa7a9302793635559ed974b9399b5533e9346832328c31f764293e9cafab03b1b8f99ba07e77cc823a145c781215a46b2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417c6296126ef900554856ab7a83ec93
SHA114d6345837f78ea18284b163eb3c1dde5f77eacf
SHA256b0892f5c891d515d80101d4fdc5ea4dae5ea189868aa842296c57949855c8434
SHA51267f353252e9cfbd2c40244dd1df3e1f690fa958cec803810b68a0e5f4d4d19dd9467b9fb59907449f92980fe5d2ea7ab1f0bb6794aa065f77fa0b77e4c832d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6e41173cadb75f1bd34382bd7b7be1
SHA169b0316f2da2cec236bfbfee11a0b6369d2db50a
SHA256b035a7e01af70dd5dc52deeb82b223e476532d1005b912501a310599c4a5f12c
SHA512d631143f61b29e770e4b52010e58f2590307552293dc2b403ddd51c3d2182970a9d3ba82a723452658258d1d7b06dd0b773fb7c60edab2caf2200ca3a621377c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200a7e66b65db5b2498d88bad53183cf
SHA19716f9fed8be06f672f9e74ee9736eb0a6282114
SHA256a3315adeec5aecbc6d4e9df29fc8fca33da2a9cd0e2fb6d85f8adc24e784cf64
SHA512d8df775ea95a8e9f7931a3414f0bb62872efbeaf3511395d181173d44641e9b46d99c8e0d4aa9ca825f880e98f2787b612c60af32f81e2f80013c48cb095061e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ac8b98556940839f2635bb607bbd3f
SHA1c4ad9afc3d804a54b808a8f5a79ce050af68f577
SHA2567bca4ff467a90708598dd50d738400599796248a7da61001bf77c76342d61163
SHA5127c958cdfbb88f54458e29e8722ecd3afb1ba5db3670ef65e307b701e7635ec9d9dee70b38eeece74e50d17336a3e474c3b9b68623a96fa8fd16edc6e004facbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210cee7372eeb382c6414fbd59b57fc2
SHA17deb259db84735183990b66dad6ef5edaa0670a8
SHA2563deb0182b505c6cf96eacc0c020b4d198c0ddb201ed40f2aee5e4a7e74e07572
SHA51202ad6573f733f2f3578910c3fe13190507cc0db6efb3a624202d81c98b49079d6dac115f4ebb32467985311727c574c5f6248cb0b02ccd34cf505c689e215bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e90aa3b272c0efc497275b1592c262d
SHA1d0a95c8a26430b1ebe0e934aa05987f831e4daa9
SHA256a015a9fe1b90cd63a3d54ad3076f1d095645d3d28e444095d74cfe2ae74b9718
SHA512a88fc9971e6a08f25bb35f298147e53ec740b32f4da4e0a113f5ac3041f0a31fa17c82453fdfb7cc18fd27f446a51a8aeefdcb62a8befd02de4564f21a319137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb65d1e57e099a2c743553e19fcc324
SHA196882233e3c0946263ef64c595acd3781d527f60
SHA256e54993c9fd39964b98985e21b85431185d8bb0167e30115f67a10fb3f7f84cef
SHA512cf18e83623907140b714c92772eb4311c602f4fda0a9b343b31aa57b066061eba5693f91df0d86935f6841d9431a0e6d79a0e8b1432e7cdeae32db85c8557d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e321914e6eae636a1b8665af0ab51579
SHA1040f54fdab08dab55f20ee17a122017bfedd5d2a
SHA256731b646f80b5f372ef973d7b64c80a859ec3e2b1ccb15782a1daf7d26e9c1ec4
SHA5127f68c7581bee8d668d23916d50c42f3a015a41beb999e805f6de04802db617229e43b391e0d50ec0e0582f908eb71f43dacb848e3d2e44d29322cad20c9cad14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18dfc515ab2df841155a15dd95a0d91
SHA177f346fd690d2e587a6170a0e424e4f31d3539fe
SHA256be3bc78e506c778ff04691b4802006793372e691879a8f64973d5ed6e8aef5b5
SHA51282edd66a85124ba470c496b9229df8b1c86171f07d1a6810799dfdfe2067d38b2c8de39d8ac72e26c69c5cde96603a62fba84d992013f59fad529521e5ddf34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e0b3b2cbc7eca0c4c377ff01e8617b
SHA1756fd2317991f76cd1cc07d33166fd753b5cf583
SHA25663a0b7cfe16b51c3494b06b2d1ba73c53f4b569c9e4312c1b9f7d0afe9fe8b33
SHA512ca46629b47a0f47099c5c520074199edcc5cf70522d77df50eaf78b23ce3745af95f82116018d34677fe68f3e483e7e03cf98545f8500766eec7a4ea0a08a463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0798c70e37549b915a7950dc28ff36
SHA119068e2eb502278de0aa0e5900bab432dddf02ee
SHA25683a74938749428ced116cb4b4b9e4578bdf50b9d4802ee79490037ddcb725293
SHA512f7ee3b2fd7a64782efe54ae02cf40c18dbebc516079a2abb777749d27518a5de861460cd050213808db64ef27e0ca7307338ebf5c4bcdd8e54962f2340e8b838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3fed0c44b879c995ff08c99f7a9de2
SHA19b7f399ccceff722caf5f4f012bfb6177f430f4c
SHA2562dcc5aa430c2513fe5b7daabde4a93760655dc6281653ef01ad80d59799d2070
SHA5127d3eb749d2027394555de63a1d324387203d9da0de6834133de6d1a1cfca188f4ca48418192579f76a0db19c68ab90dafabfb388c85416bc5e56d4f92fa1f01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcac7ba20f3f4d2d658c9ca55c84ae42
SHA1f9f259b10b592355aac4a1e3a00e0ad3a5a98d7a
SHA256f1fc7b59b72b6cd9524a46f1ba9677a09eda953c196169e1bbf8198bc81cc701
SHA512cc25b65ba200fe2b6b731a91515c4556e10756f70fe513112e6fcef458fbab34571077824e059862f0897f7ea7d119f41984b86810f93e74da4b4c69e86f12cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514df423a2982b0994a888931ce443486
SHA17ea09beb286ad22234ca2e10449599d0fd06b012
SHA256c2177967f5f6227348ef3068bc5a79b1fcef0620b92d04afc0b904e7bc914412
SHA5124e8e468b547cd3743be2c7d26a9217d15021974a1528e274d76f948e3066ce4730ad5d6a18c172ebf0aae52cc115ffaf54794799108493c5a5e5055c98881c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d27f3660f012dadce8c6dd6fee459d9
SHA1102d82f23e2b9835b0c8769d72f2c1326af8f119
SHA256b4258f45acd7e8e15d710d2125d53612af4f57e5ae04248a55c9d2074fc5b859
SHA5121a57081ccc281c7794d8bd7df34b5eb1fd9ec8845bd85612926762c4e51e4765200bd109a525eed3b7ac75ce61160f2e25703d35d911abce5f8fd59a7eb1d7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0efe512abadd7d0570738aaddc727af
SHA1d92168a99c340ced6248a5c54b82ef97b91a1aa6
SHA2561411aa45697ff445b06ee15e9491db0d55278a9c0d78a19ee122a0b5f61e7e65
SHA512ffeab4f2fa06d72b51303466b83ae0c5219ad45d9c908efd9c1e6a5057ae516e3ce9472268a3d4005c737de8a3172716c2f834fac0958c96ddcd49568a75cf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f3118e41fd3957d9074057367c2baa
SHA16e92622ecc79438154f3ff4d8f69378fd5bb7e28
SHA2565475ab0e5e309414f7719be93fee445ed57b11889f4e80f1eafe11b8868d35fe
SHA512ee2ad089edc2856d56143407e3c97a263d812687a288af17f9da7d2ba87b4f90f87e0beb5c1f7c74007064b4d3b9c2a70348ae3c1ff73238ce28674cfe30ed1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adda9670879759e29c6464b7e7fa741b
SHA1c143d4f64ba9f31dd3db07e1485211b266baf4bc
SHA25600c279bbf2c125b6ee8270546de3e4326e26b2b5ddcaa4efa25df06fb37884d0
SHA512c836f8b2c099ba26181bd34eca16e933ec457e862de4775d3beba777ebbe55109120014a54285a7066a833a5c85baad72b2bc4bba88fdffc26a5b5667254ae2c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b