Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
ea877826b788c59932ccb58a138c50de_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea877826b788c59932ccb58a138c50de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea877826b788c59932ccb58a138c50de_JaffaCakes118.html
-
Size
139KB
-
MD5
ea877826b788c59932ccb58a138c50de
-
SHA1
4382483553e5efee21fe07147da53645fe7d9c29
-
SHA256
3832a310debab8245ce9f5c44b35b453c4b298d8462c5a9b808f8985a7626ade
-
SHA512
de0f2614c63329e77173f74eba404601cdc8748392b88458453e215b3e97827f0e3b99af34e6ca2b56512eff9185dabe8aa020a5cc5e186478eff498c1d0b548
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcnzpHAljlLwwuVe+gcZjiCgOp:sIQZL3+gu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000091f555dab6b1a13597d6a00d6c9d3b8a611b83280ed885e9639b7c84f8f5318b000000000e80000000020000200000003f047fbc51f953898138b209edefd91a0739903b9f5854d17cff33ebced3954a2000000099f5b2c074484c7331a61c1c238ed4e1a0946e61a97dfffe77527ccbe399eebb400000007dd34e2907659186d10807d3e17a82b0ae888fe280fa591069b5d764cbe564bf4d749d460a2bde1feb852e7984289b7237d92811c5ad182dd53d76aae6570be4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9020f1ee460adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00F63191-763A-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 280 iexplore.exe 280 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 280 wrote to memory of 2180 280 iexplore.exe 29 PID 280 wrote to memory of 2180 280 iexplore.exe 29 PID 280 wrote to memory of 2180 280 iexplore.exe 29 PID 280 wrote to memory of 2180 280 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea877826b788c59932ccb58a138c50de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57864a06081c88245d08150c325f57009
SHA1e4d861a272132223f7b78f443471d1e11ed5c604
SHA2567ef154828db6c2e7d4dee7fb2d8f294919a61516df3d431d168069e72e473d1b
SHA5120cc750ca94cafe03a2f7e027e55feebb3fdf65c06fc173cdbf6baf4f95933f0d72c15f4d21bb2f50cc0131912ad931d2cc2ed3f662cf07e6b8a756a73acb24ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf96aa1da904bf81dec4da6ded9a784b
SHA156ecb086d2c0bad7b153e3e99737d010f045999a
SHA2569783c37f06679abee8ff792374fb8644ef9640f5aba4eb808585d02f45715d70
SHA5121e6115e99124a41c6369ce3ad596620436d0931c7c4e51e88a0d5c9e38c88c17cb82864cb99bac9b77d7d1f2449c36de3c9208de996ab24a9eddb013ab2908db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570030e6956e8efb79b9b5f0ce8579f35
SHA1465d4fd4193beded0b00117a74911504cf4b2eee
SHA256cd0ab0e42b416b756dbc5dfd4e8d7323d6909d97536a3c0cdc3cd8b147e7a44b
SHA5125f660d1e42a878c3fce66f9676868495ca6afc69478b8386349299fdf237c3dcebf1b2a1e2c37769057bfa9132cf6402b50a1416cce54df28ad803e06ff64f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3eae2d256c4fd7d605545a3ba3b466e
SHA13b8f398d427e0e074512d4103ee5695cccae4ab8
SHA256e1d17236baabaca45eaa7df2a00ad775564334693e568dab2fb9f72ee18d9dac
SHA512ff73ceb3a3ad062d8982185c40d03fb58fc377eb38818c66877428b67ce68c81f3d63e3dc993b5129854a403d1a0ab1a66facd5bbe3b80ca82ced62529ad59f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2fa316874248ec8d903e57e707e5d9
SHA13898a9c17c36a648bbed13149cc9b43ba2b5921c
SHA2564e81b802ff07652acba26fa0e389030305048a78215764f91b1bf03de741b8c5
SHA512f3e8287bed2336579f50310d7f87780936be94fd4a1951ed271477de531e673d96fc8f39e3864e99c8153bc8eec5064ab15df8244a6ee3716e2d62205d2ba17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd1bc2c85855f38bb69d56fd108a0fd
SHA1f48f83b3bba9ab5ab43e74c1567a9a3c7e5c31fe
SHA256963b973d717df2acf7dc3aac8cb8115c478e74852aacec0f9bff8a7aed621465
SHA51218223ec96fe18b7bb7662472484e4e101ef76d44d184655636b8b83eb3f277ac7460f9026bd89c882962702bc7586ce303f757ef103fc334d12950c726bc62b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da31141284cc18dfde41e9a379301072
SHA1b7d9e46f4d65680a13ab85a476e7a39f6b6e5527
SHA2563f0c06be867b229d1d008d37e77922000e7f258df8b91621b2bdd5a059084534
SHA512578a9f25f988481c2dc25dd103181e52ae28fa1599963bd27b9f2ee169a9960eea64918165ed3275ec8c6d364ddd7fb8d3f6f0481474b006d29b61505dbb4bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d521bb79f1b2c17108fcc1eed89181
SHA1b18a46a24437b5990999758e5968e98fb37bb976
SHA25606ea3c7f1a6c1a4e1455a4e58d04ac5fca42ff4648941b2852bbbca4f55012d0
SHA512b11f550561fef8abd2e0f4e87afcc95d9491ff04952f25b8c8a5d6d69b4c39b162ac7fe3d8fd285556588e2d6ac5c3b7f712672be29e05a94e611c2608e2bfbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea870a5784c1043ba8b004add08d9710
SHA10d6c22f71ca3b43f976f454257b33acd6d559816
SHA2567e839be02d82b942f1d986310c1cc8866a10c571ee858281262172bac199df1e
SHA512b3b3cfd107ad3c0021c3f5bb61ea7b352d30aebc8e5c7c6662c7c034928297d85697b0e323a3d50e3d8dde7ecff4bec9a4bf461693c6928ca626f8cb5aea3c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f0686deb220c612bae62dd3730c364
SHA1fde052e9604e8828b59506ea9f8d5c8067005f34
SHA256a8a9c32f176f263c768bcead8dcb4087fb83d9de7e14a4492fe5e55b625e21f6
SHA51241bcea0fa168f06eab41513a30b772344d2f7e04928e8e7555111428762ec65b27244a85ecb5a2b9a757950a0b812a65ce25c3038b646fbe48ddbe8a1262955a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f833b888f5c99bef4766399dcfa83325
SHA1bd842e3df9c4c3a3533a125c1c7559db476d1a23
SHA2564a1a7c556af7b79e5604d259da8787ab018aa25921c96ba67d106e990a59fb37
SHA512fd8510710d72a5d954c74d247f8434d47956943c1843273a99ae7294d79190b4d5c3adaef918e3d2e284c112dfa387bf8546727bc4cd5698f3031c1223f9fd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974c076e6327aa0de149879925914da7
SHA179df87f899415c1f26ae7b583abf95ab9912e3a7
SHA256a95cc47d3baccb801b9dc1f4f763b631904d65c1b163b77d16d9a081cb37c980
SHA51219809ef4f4974b5b51b7299113967b8971e378608a5f50e35b11c08c07d74b1cbe32aa8b049ba578097ff68415da5f4e733ec7bf3502d23a7a4bdddbd6080e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb745625be48475b91503af4f39c9443
SHA18367c98120d75d09590de860973e31e9648408f8
SHA256caad189d1c1eb03e5409ea268dbb75238d4dcf67a2f9e9e93789969376a375e2
SHA5125d56ffa85e49f69437f1e34c47119fe4a1e2b19c9b3930a103a127ccfdfa47c87cc6a741f3e265682d3680035015e63d54c99e11f81d84a25078cec12a823b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f822ae61f66a5d1e07227c603b6f62
SHA1abb7670e695ac7bb44a1b480c39cf8bdc2972887
SHA25670e438e2f0ca8713e29c22f5c3dabe216f50dce79679c8e639ff3c5ef871f6de
SHA51246cdd323c333047cc139e5426f82d37a49497b4ecd20b516fde66af6713aafe6c7597619a78d4883afd86620b7e5a3a45b3d5f186d5d69edba29deb353667393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebac4f3f50429a9c2cfe083834656388
SHA1432db5d2a5f94caf72a27accff7fd3fe29773b84
SHA25699105e6a026613e15f37178910442f6e11c93c876ca2d010b9ee6b3d060fd48d
SHA51290a7225fb9fd696e331f2a8ddc7ae332756d95bd91e190752a5d1fa498857f4a4034b3debc006eb0eac189c14cfa2d4ce61872d3285cee7caab2e76d143cee13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11ceb0ad237ceecdd029f7395a878b1
SHA1a9fbdd83ced2f3d686322be795702c0659167b0f
SHA25627db22b2c9b3eb4b200c7c8b428820f27835429407de8538ff1307816433ef70
SHA51212a1734eff78962ca10ee2884c12452a3d68ff5d611aeace0b991ed2c7eea53a6bca665196d17e4d5f7060b7f71055acf68fa22f43cc2f31856d7c81bf61746e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969223e0e314620cf49a7cf089bd1c27
SHA15a0fd2202b8943acaecc0c4f2ae65533515f8b0f
SHA256bfdac81ac47bbc0cc123e125a5e61f43e58be4f32f0ca4c672d8cbac53658ff6
SHA5127dee618f408bfa0fe7ae6b2d55ac5c5a2dd94284d41686ac6f336dae187db81241e2f92760b15bcc8d759f7fb4d19406cc35f24c4a8e8a9527247375eec5dcb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52181cebe49034c97ae4b1dd70e95bb43
SHA1ab2c2eb8621dff8f6e6468db7669475d1c783024
SHA2563803397a9cb36e9f5e15568e75c1d5bc4e06b7e5fe173c4cc5b8bf9f06b46cab
SHA512f7056d55a6282bf6e5ac67fc90b7f6fd4fe9118564aeaf09d5029801f6f25b508785054b069afe91959905b578eb1acf9f424123bc12e12b8e84b16d9e78da07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eeae70124e45dde109e349c6d8218c1
SHA137ad48ab5c32b09956f93232fff40aa2cb97ce08
SHA2561871d050b7639dc4e48c3d9e8e9b1bcc56b9fb7d09af1d5631b5f1f9196bea73
SHA512376f84cf2711ef52a5ada30d3aab4ff03bf53082f65a4670bed46571e25608d11ff6c6beca99112fd9a818a16926a348f8cc23af0a8e2f2cf85d5cfda135c627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f654fa2080da0c2dd225aefc8e065bb1
SHA1741d60e8aec2991aa8a502d31b45a01e80f6b461
SHA2566de49d676327a9034ec69b8d9dbd71cb585e2c259cf80d567b4c333d01d9de17
SHA512057ee03527d738e6ade3e6e204f839283116579dc03dfbb075b859a45765fd9d84431251e72465fef465ce0681d5868956fa681afb830c68ce17daaa39045e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553aab427e73476521a517f291258864d
SHA134fd6e0f8e87885c1715ebfa489c1f8e18bc7d28
SHA256f283ba264d9b4709641f62b0e32e7b3631cb53babcaf1a80329e8fa933921d46
SHA512bac494b6cd5e33d9b85b302e1ac475c66377188b188500935c7f6703ee03b8325a81ddd30a51ed4260c77ef6c20d058f260280643c722173d97310c9593c5496
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b