Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
db230c3b6838d2e12274eca988b8db01_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db230c3b6838d2e12274eca988b8db01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db230c3b6838d2e12274eca988b8db01_JaffaCakes118.html
-
Size
23KB
-
MD5
db230c3b6838d2e12274eca988b8db01
-
SHA1
148723a71c6d5e148dc889054b61db06153447df
-
SHA256
2145932b8ba3a7c195d06d6beeffc77dc50b08c2d641515830a0f9d88108d441
-
SHA512
44cf8a1a8eaa241a1f7178adf6c39f73572c6bc03205f96b9e64b729ad1dbe531d632482d8b93851dcb60307183bf9462a7e42b685cbd294e0ba532175370e72
-
SSDEEP
192:uWP9l0GFH4cqb5nwQdZx1MP/Q2FgsunQjxn5Q/ZnQieuhNnE38nQOkEnt/pJnQTL:PQ/bm/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001d5e10fd986c9089e830ba1b70d492ed344d7d76ce692ebda60d65717e63e382000000000e80000000020000200000005aca1e06f8ad50c5e628717177f194a35cd86def3e48f5c9d0c57eeb6cd29ba6200000006e9484a805df5a39d7069c70342fadcd5719df49522de9f63a203ca0dd82621540000000dfcdafe2d91429b5aadcae8fdda4f322201bf82c1b652afba5f784cfd69e525d03bae1aaa67c7fa24e8cdcb4cf62a3d7fb2a48608f8e64e019c96f7eef3c0c79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30628ab78604db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432247294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2656401-7079-11EF-9112-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2972 2112 iexplore.exe 30 PID 2112 wrote to memory of 2972 2112 iexplore.exe 30 PID 2112 wrote to memory of 2972 2112 iexplore.exe 30 PID 2112 wrote to memory of 2972 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db230c3b6838d2e12274eca988b8db01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8f13221795a00b2dc2c935522c7b3b
SHA1fe71a84a1063b8f0de0677b542eb6e69a3270169
SHA256a3b287c287780c16b883a21f7656ba9f2ab94c40ed2ad85eb5bfd61713f1aa29
SHA512ea65fbbc452318be7c849ba7d585433ffad274f035696e6b2922278be6bc8d6315fea632c61d5bb09749f3759397b81947596a213ada536a8cf8075df2a904d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdf4abc446b5b0db55c3e1aa425016e
SHA107d71132be2e8422d78535e69997a0765a4eebd0
SHA256c12fb97a04e579893a53223e984893394452b7a6e3d8b09ba4e85aabb04bf321
SHA5127fb6ef0e03dbd34b5564a4062dba3f4d9dc5a97c2fb8d44798c54658c6698b5c60b023cd26b48b9c8895fe25128a2ebe2460c864661c5ec3add2fb033f50d3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26e0a22950da766265e7ca74bf53e22
SHA1c134b26ff8bbf59a8832b14dcc68e2aa72387b2e
SHA256aaef655122da11401096d04ac041259c07efe9ccbf785649b743ee7c3d39fb0b
SHA512cea79597d4898fec2822aa7a8758acf943686211c84fdb1fcaf642e3e9cbc374ab60efbfc700430df1abc32aae88565c038d6c0138dcc1c65660dacfba232844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae4856314916a8eb3a5d82ace2466b4
SHA109acacf4289f0f9bb2e1195dbf2a44543836d2c1
SHA2562e5acdb3032b903a7b17c6ac5cda3c6b4a3a3aeeb55f949a10adde5fbd95c60e
SHA512f9b3e090baaf9d9758a98f7ca98d72554256140046d1d155f15f359ba9ba30bd2f012914acf8211d3cb72a46e4ecc84c4fd31f8f6f12cbb77a4de9843f75c1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a788e4987ea18465b28c5e8c19fbe591
SHA18f99ae9f629d3fa67186129e113f7091712be16f
SHA256b0066eeca60586f14dd4f1071bdd52b285d8c21d47c11e02950d21672d8ed770
SHA51281eb16fb05a624f3360af1ab045a53c00e8dcbbc76cddc37c51864beb98ca02f5f4e9c9de785c9b1285d0b30bd284da842bb6a174d97d9e67e159599fa756645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81dc4b1f6756cce274bb775855c0669
SHA1fd866e2f8cf77634dfc64a6f8d8c329568d0d839
SHA256e1f82fe625faaec925653703dc7ef30ff9451b77d5f186c2c64c6508ece25343
SHA512241b54ec749d0e131d4944c7e1ae86cb602f3990f696d0cffb5b0a1e88f59fa5823e531d247f06efa89d49eb3c3c3f713dce9325c9e2125e51f07c7050229daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb6aab12e2722fe4ec03ff984d7ed7d
SHA18beb32abc50dfe3d708c4d190bbe8c931c708153
SHA2568981cf9658f39be39779c7655055ad2b5d638d0c2ad14e1fe8a0b767a82fedb4
SHA512efcee2e9689a81c6c269605971e7b4169c7b0d296cd9272fc039391f2ca340b07d6425272fa5ce1b03db49d857941f4f02363ae589a997cc0cef503243bfdd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9d19444d85246e48610e3593dec756
SHA1a04c68131c46865fa64edd85ba184264dbd38aff
SHA2568c65af4d9088be60a9d788d94de4caabb548f8580e57ae4f7bed11320e2c6466
SHA5128daab93c9fefd79cfb5dc094258fc629b6d7c6d5fb88306c06e3e30523d25d461fd4212e5d04fca2574e49a93c42b338ff74739a99d453e5ad8a7faffe0ebb57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b402010f7a25ac89eb1f14253eba5c2f
SHA1540459536b33442a9f0b4d6916436feec13f1173
SHA25661394f7297d3d892e0aef8049842a8486969272698e239207a02fcdef82f275f
SHA51211ddf195a06b654e6638bc28084a2602dd975b1f7f863db37b81f21b5c5175e6f93743063579245c999587e2645c689cc7305eac9b1c7f0954ec3cf298159d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb59285591b18e99cc5cbc8d51cdb7f3
SHA1bc556ee22ee9dd1c295eb9c3415ca48033d7fc94
SHA2568c58781f2726b8935c556dc36191ce175cfda6c347dc2f2ab2dc91205fb6db26
SHA5129aadcfa7e21866da64282c13562a919011eef309a4f5163f8319e4f3e50ec02b70f7d9e6f3f7c0fc7574ce395f55ce93b921932374b583b7b04718c76d0b1df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460ce225d11b897b2bd9d855ae347daa
SHA1f8da05ca39d6c070c6ad7c1faafec9cbfb61014b
SHA2562d47fd4e260f11802faf056c73f669413f46c3163e6f46f7b45a9a985015b933
SHA512a71a4d6807931230f29d6835a45ee820b04a57722063b09b4289032bf11fc1f38c2d7b50004c48fccc54ab06076d5ae8c2bc74ab6a653bd04ce020a59ac51a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f44c471f0bde92656430fabf2adc08
SHA1502935c2b45ee611c0e37339b587d79cdb4fb866
SHA256dc03497d59c9ae87960a376297ec2826f5aec7af7d9f2ed95cb9eb1710c40518
SHA51220cad0994c2baddde9699660639e015c92feabd2300778e9e2a4b98a7b9844b325d5e1176adbf3214a06bc60d49cdb7a2d211820a46254c497c744b70bb6a3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f9b1cdc2784f9bbcef46843b91e72f
SHA139b88bca24fdf2a610684613a843526fd771a210
SHA25677ca3a7e0b40ac913c842d1a98cd11bdf27ad4fd8d1cffb456267e346040d094
SHA512ecc47e46d7760981f42422ec2a790c7462db682ba67c76ddf484f7fd64eebf187e02edfa54e26b7983bda60ae00b77cdb833bec4a68a275c69fdfa381df8bf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692f384d8e5061c7b298d5fb2886a297
SHA1131ed68ca845c1532a893267e9a2f91ff68505d6
SHA256b601e0a81a2e131af4e585663b2dcf93a04a2f3a136791c19754d8d5d980cb0f
SHA51255f122e7b35a5709bd3871975b20017fe59c56aab294fec5e976182137fb6d448211decd9905a03daca64cdab7a80cd58d5fe47dd05d152a9c8e962f657c2634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d828f3eaca876fe043ea1677714e4e82
SHA131d5475bd259b89962cfca0ec99b4cea1783731b
SHA256681d7ac6ae0dea549315865aed6320edd8a07f543d0a7adb6aa2e1707e15b494
SHA5127ecd327d2c8d4d33ad9bdab4bb07b10fc0e7adf97c07cde0576045301c767a756552f002616cf9d8d8884c7339c80a29805a277d0383cee55161edb91586cb95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36f163fcfb0a3eb7246f721f87f4a44
SHA19016580fa793aee09123ac2f340d852817a5f90d
SHA256a719be1ec46ba6244c53ca3087114c39eb14135241bd1dde22cd027d9aea967b
SHA51238367308ff1d24a689daaa39c24d46f6ea87e42ae90d10b2a1d5b3b9c35faa00739c5b6b1e32b3f2dea918d00d93a6a58c939a2895c87d9365da9d9fe07652ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca4edb064ebe0e0e938b217586243c0
SHA1239db52ea618a174e907f6ef61562467537be2ed
SHA256bb0fd6e35c4ca22fc5b5d94ba76b20561f21a1ca4c2879004426c1c34ea4e3fd
SHA5124bf19e551db195eff5d93c79738760bd33a4486d1f3e4ecbaacea7893172ff46a5c58269fed2ed8811a5362c5bb313c3e4e13568fd6115986b930d43f228879b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d48e09d26d1c727b6934fb89d2f9ba
SHA13da67472836ea0ecd19b03fefe65b64da01c0482
SHA2561a89b0426c5d33db4ef5423262441fca13b0a1610da8c57869a1b05595535a19
SHA512a5fcb11b5b9333e65c8686136abb983174b708271261441e6af2d005c7bc5a3e3962d2017b9cc1b32544564bd8de9f3a38788cb99122a4abcd4d18ba6d7c312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d5e510e83c739567b8ddb2701b2f69
SHA1e29b6190911bd2e3cc4b40c0c2bf8e7b47980659
SHA256ae55fe4b55dad2f247c2425b8bb84afd593828124a63a7438b145757d6f63ea2
SHA512745a55336a00b696df84a274b54ed7b03f41258f55c24ad1a6e4c324a0a26af8cf2f04aab1047901122552c6f8fa7a229bdf032c11edc861f9836302e84c4150
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b