Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
e20b925efeb8757bad21cf11331576a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20b925efeb8757bad21cf11331576a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e20b925efeb8757bad21cf11331576a8_JaffaCakes118.html
-
Size
139KB
-
MD5
e20b925efeb8757bad21cf11331576a8
-
SHA1
dd6711c58dd443e91484e3031897fcbb516a8867
-
SHA256
2c1e10e908b59d28f83ee74730b07e956dabc1a1a2d720b202802afae3e1ef5b
-
SHA512
685be405993b4ceaa2c90852745c3c419d841c07332d762a405a1250b4ea9dc11b4bd30af00aa9a28992f84972b6f9ec3fc0b874eb7f152d31db7c535f159008
-
SSDEEP
1536:SPtxQlayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:SP3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a062fafa4607db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000face03df944f5688050bcb0cd11ea6e4cb7a47c8f861717b143a6b23b8ab203c000000000e8000000002000020000000fe2a01bfd7fe6b578b056bb1746f7b0f712314efdd78f08a05a0d8cca64a172c20000000fb93876fda008a06c1dab45048d2646216bbb15282ddbab841dba2c2af408c7a40000000905f02cd77f8a0d26aa60f85ad18e10a65339a814f0b57da77b00a1102be5f62310df11004de7c922f804c3524947cf47b824e963552c5aa81ba3b13bf714ce6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432549665" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5904C41-7339-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2508 2408 iexplore.exe 31 PID 2408 wrote to memory of 2508 2408 iexplore.exe 31 PID 2408 wrote to memory of 2508 2408 iexplore.exe 31 PID 2408 wrote to memory of 2508 2408 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e20b925efeb8757bad21cf11331576a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a8e0be85b43078c3414f8920b81b14
SHA125886e45b6e12c1bfe2bfb408c104378da3575f8
SHA256ecf3659f211b4bdedf3d7672f65375c7a9226b2f250750bd5f1a8f8091b75dc5
SHA512de94a15ba457b044bc65712bc050e7161b3678d29327615c91bc914252fb1f557d0fb69fe9c343a3140de74f2ff7e8e06aaf93b7d5a8043fb61bbc7fd6c53ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517417f148034f86bab4cfed947e7b3e0
SHA1bd4ab2e22d6fb788d7d5fb36978e192ac90a22d0
SHA256b84b19c9529452f0fa468b33b6d4c5a610483d82a33f7764bba150b7dd153dc0
SHA512002450cb9c27166d047788524ad85b4c3da3cbe5604f0be8b17bd3c336376d5f4c38651c18dad49d29c2004a9210a40e916407f9218efdb878d99c12c7c01589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55901af8f9db9aeee745f101ed8185990
SHA1f8e223817c6b075fe048292398ba4ed5034f93a8
SHA25657653e3c4fbaafb78b8ad15966b83b222422db85ef600e6c16ae4fd8a9028d67
SHA512c26a658dafe724e9cda8515390bfa7adae8a658e91efa570a43cdef086426e3cee402696358a35ed8d1317093905b1861892d1ced1f974df911d9b328d7284e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05ec1bbb848fb49df818865822506d0
SHA142d458adf43af536e653758c1b79cc85d3587950
SHA25613743605af4dba79e7a96e4b9b09b723c6666a3c72246e40e979d22d4bf86fc7
SHA512ab924eafa57a4661a0679c1d1255fd5a4e309f4e0ce15341132d6f039f8a05c058cb8822770d977302ee29cfbd2a435426e550524232fbf3b4206daee17d5edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af8249323270df5c04dd7e801718212
SHA13c95d2967201104714f5408fdcff9640533fc5f3
SHA256ffc1d4e2873ea25131bd39a5871df1879e3b9cdb67ed8f982a2a498be075e2f2
SHA5120db978d9e08a1c203b37b77262e7a42a4a5a1104217c4fa3ebe9e78b3abbd7c686f95ed62d6dc83d4060e80934718da2af42177836f75e0a6b78b473ede13734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577364b8db5c39cf6ddb7750d56ef2d3a
SHA16650cc2123a08167d20ac44aa976cfc32c405663
SHA2561858afbabc12d8c439347c22d14fb4984671303a7cfb57692860a083dabe27c6
SHA5124129225d61c11da8d36f7d7dda63ebb43c6be6924469222b52ae02727c601b00f26b97681b1b66832c1cb9762b1826e479569b6aab72b110aa8370da424748a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee6b3afbefaec59b91b9bcfefdb65d0
SHA1ada67fa3ff88427d1bb22def6dab2c5d7fb6b9fc
SHA256fc2a4f1c42f0968500ef144a2a8e7465ba8f197247e881cbf01294609910d681
SHA5124b69d5ac16e76d3b722edd2877b3396606d858399a01d87be28aecb4bdda5f13db8323cd95afd4a1ecaa169a03b64c28e8e5c25503f7a307b61800ab13099fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54651fc3365b4cad12a03e20b683d22dc
SHA11a0ade9689e82f77d9dfcc782c7bf02f34bc3395
SHA256dc435cad821fb01b7d2822d1b6abb7b5fd2c5cbb053839dcea325aba41fea850
SHA5126f8e2736a87deaf8910146b08945607245d085a611cf0cd7e25a83a139e59126e2a9ee93b00eb3bd7ef85541dab138aed421906e8aa97f376e1374df02a04a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd33c221863027cbec8ac0dbc1ba156
SHA12120eeea5a73f8cda5ce4eebb02135ceab0be815
SHA256c5775b3c372fc3070646d2b8aae17cc54c02681a721fd2eb1df0e82ddbe7b03b
SHA5128366f40456375aa16d1c58f999469f21c7f6bae2cf58588eea35343cbb93ccbd325bef213aeab59fa9af00937a796cb7ae0506174d315b4f649c1fd824299ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec250e06a04017b9d77c6082beff5725
SHA14e344f7a5e6f378e4b5f5b122babb1e6b16dd465
SHA256abfa8458259003ea6df9468e840b875b2b4a191cfefb94dd5c437ac8a9050cfd
SHA512efca74632082e0dfaadf55cdcc4e52797de7623445b9df10a6941c35215cbc47b40dbbc02b5939d6e024f2bacc8a3e3c9c6c1aab2427858334ba307910657ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867eae4246b2caef41dc0ff270be4e77
SHA151535b6ab087e2f0a6d4e3735f1117beca8f75b5
SHA2567321bd176e4dc3282619f6fb2355ca7724998f731b647b7252a6ce8ac46b3e6b
SHA512a670645450da99669a776e010a23f8ca16993aa2abcdcf52c1cbbed2d3c1fbfc6a75bed8092a2a051da900121b0ce9fc4e4c8b74cf4fd435f016734363645715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b558a17c9bc22e8b7e894a23763ee793
SHA146fe062d54ce4a9e2c2bd8086b806912c956e761
SHA2566ab0d7e4023adeb7c32fe29a2f6e9c4e69951f69f029fc897b7ff8be679dde8c
SHA5124f2236624570b1ff6f6c8bcd0ac02882654f6c7bc7be6eb55d84cdb93699742079c26c2fbd21dbedb56bbc9d74dc8438555298757d63c7e4834044b82b7e9c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265597e9db8387eae8c2167c10f63f23
SHA139918c7f8d580c105f3d538448260ebd7fde88b5
SHA25608dd4d096d2c278292562e46777f6f9a4596c8ce3aac06470c1868b2e91703ff
SHA51293f0e04ada771832ecb94b211234fe584654cfb1ad0d9ae68f929986be4a085c027ed1cf10f565ee4c159cb8fbeb8339444ec3dfe9611592794901baf1e69f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67271d0890e0fa314838ddde763d823
SHA17b656b67e81ec8f8a50686b47667b44e2a7853fe
SHA25610a9f2ab4fb8d0d19c065f2980fb5e677af79e73b15713abbea9fdee39fe381f
SHA5125eb51ecde3273c452929045dfaa5a2e3327fb3c68350407f9302242c16f29882b589a7c45923e245fcf337a859bfbf07ebaedeaa88081bfb556b97d29674e0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638d8c7cb94d6f9ca920f5b8650aa412
SHA1cad9385d781090be79d28dc3388a0b8905198850
SHA256ad0cc944890ad9872eef8deea2035844f0728754577f29125fc91bdc844cc2f8
SHA512e60aa54d3da1d8402a374281e8624eaa2b54f26e797d8cf3e2117a72e3417d5876d517b840acf8aea9ace6e083a8df94e2fc5e5561712f1c6abebd0d64522fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e134c55a832aba6c7a5340079925cbb2
SHA16f911b3d9b0d0df0adf5dfd54af72dc635ca18e9
SHA256da722cafb81d4591d20e310deff9de9675f59e8dc4155bfe5b945a1fdf1e0992
SHA5129164a8096355b6a09f32257af1d3d4f85b32e1f5c2f5a00d6932af56aecd5fd0df5d6e6997ddc908b771116c72d8c4945497479239cd41b9d05dc810ef10432e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da118ed27f8f2558842b8a992784b899
SHA191888abed23702a641269a5f076ec45124e73ae1
SHA2566fbb231126e34cf5c119ae4be62d9141f84b24516666e227d5924393a24bf0e3
SHA512793bb51c6ef1b31f326434de2367c1eb001f6c432879cf464fc11dcbb9d740e9b355dc9c7c94bd14b7e909136b903d7446c855a4e5d9fd6dacc9e82680fed445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d605f5646acf5013b4f4ce0ea25cd4b7
SHA1926cd97fae5c53f0a7bc03ce3009ed5585d635e9
SHA2562c9d744f6b6a61852ce7c7d4727894573f306643dab57d69f5e0535b02e17bde
SHA512748e41369112f54b761b82fc315f6743f0d969ec536434edb7f9b0869dbe67c4628ff435b0192cd97ee7daa65be756e9c3ed688f08f42370b9b6ef1c8ba44ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0154a8d93b97522e06cd76547a21c4
SHA15f166ba0cbd0257ec20b447d02446de52b8b0b90
SHA2566ff9424ffcd8e690260d6998c7c52d4c521c7902862840f9b4a55bfdaffb146b
SHA512939683f9665466f03352c825dae1b25025ef9ad811d86f81fa15e9ed17737cf6a2b84cfdbf2bb4ba7a3eaaa4932f65df09f97b4015f93ec2aaf7f11043fcd774
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b