Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
eaa366b205efb4b2175ffc6f9e474a61_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaa366b205efb4b2175ffc6f9e474a61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa366b205efb4b2175ffc6f9e474a61_JaffaCakes118.html
-
Size
14KB
-
MD5
eaa366b205efb4b2175ffc6f9e474a61
-
SHA1
0ae326d935e87d57a6db039005f8d21f4e001186
-
SHA256
74bcb483f22c33da3aec454ebd7d93a46d3f96f4b580f36f1b07ae77d218741a
-
SHA512
f4bdd585b4cdc1dd1573eb9e428764de2e38e1befa1104cf574603d4c7cc517fb0bb209b8a4aca37baf6f0aae0bb74fca32382b2b9548a4757c70897a4f81479
-
SSDEEP
384:8dqzrdUK0/eHKWsKLO8jBPdDBwFOSKDZVGqc5fHgxOfxWCK/rrLOJAGvoOT:KqzrL023Vg9lg2p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f180182bd836feaa45a16f34b4edc6e980afcb11c8256b73ce8ddf48c9f93728000000000e8000000002000020000000dc2711c11e496043fa63aaf7c21cb63b5b660b8f331eccf117758390aa3f031120000000614da13240e7113d3ccfd0b08ed4f9530c4cf52c14f3913689f742ab42ec66444000000027bb4381332284ca5199b3840e97e4a15d1a17505f2f71138cad0b5fa79507c95647a08c7fe87a7dbc348b2521b7b58dbe6e07e171d7af840d0415cdc0ece2fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884217" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D615A091-7644-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000026d145b599e7553dbef8e0efda37bd17bae3104d168852daf430dff61906b8d5000000000e800000000200002000000033e3ecffe9819690addd20ba3173f4ed047f2cadef77605fa26f681c9f13eb9b90000000969be42cb0862d471d58f4c6ce77ee55da87c950eea2d867e2cdb8bb3c7469d41a99dabdb160fd8563376bd8612e287e2c7fd2d60c0d23d94361627d3526e0c61a20a66ebbfe847144d3e3956877d445192b65a1975e9693de1c5b43aa892e4e3df8f96514eaeae6b1f0f05478a7bac522a1f9b0e5a4a1ee65cd4643b302e781de7c92f7d2327cd7e6ed7ad4724fce7c400000008c9afcb11a8e56695a5b09471891ac090327b9f9d5d6342eee00ce65a4a31d99df48a88a2f7d16899ae832edfb9d3e93a4a9584be1cd47af3c28e14a45119ff2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0731eab510adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2724 2176 iexplore.exe 30 PID 2176 wrote to memory of 2724 2176 iexplore.exe 30 PID 2176 wrote to memory of 2724 2176 iexplore.exe 30 PID 2176 wrote to memory of 2724 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa366b205efb4b2175ffc6f9e474a61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ef425cfcf5fd38b902cded2fbaf11d
SHA1bf711b6dceaf01a912db79350b4c5c32582c7240
SHA256e796cd0e89bd74c6bb07b1a926cfd2fb527b8123ea36a95be55ca2c54fc4bf45
SHA512956738d93720ea8f3d508fbe51f7fcb5d8da111567ddee1d1c0989f788ccd183e14b7a04c3537a4646121c32de4c175b741253a7e114557d2e582ebafea0196a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5ba38c4a59d35d5a2045cb0eb17d9e
SHA1620fe129cdc9e41cbd28c9cc3ddb4a014bcf7404
SHA2562840e2ec5332d35c146429c52029cf3906a6b5463fa995710ede9351ab656baf
SHA512b2907be2e9c59c2dbfd3ef3a545502910b36618bf3caed9f813bb8b4ecf4e08d380cd352c0500a68af906f25f23a49aad2e974f086a94c15d1ec770dd718853f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9ba4ae584cf03a0271f4865ffd670a
SHA1cb02fd50b5894167c351a429c005d5dba5579a2b
SHA256a461823489a3d91560f9512ae9c6b6246937e5d6feb59f9b981b6f5bc6260c32
SHA512167bf52d88fb2fa615dddf6345d02f12b3f97b4689f0f9c2a2f569d11b2f94b8b8a4c9018a0f8308ff433a812941655688e05275c49e6f4513a003021c6ac46f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52df55c37089d7d54e323d9dd220d83
SHA1301ee7b26cc87aac3a376b260b764e0fefcf7b39
SHA2561a3ad15304b48d336287a769b8f0ab3fafe7ac857ffb0bb78441332f7e2f0875
SHA5120fe038581f7271aa904c1b76385dc897cd37e6d94489164df76c6c99325b16088bcca45104c574ee4b1af63926a3dd024b257cdf23ebbebb479cc0f971e86940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8eb34624a56538bb3c13e31b5e6488c
SHA168a4d567411588ca82c9dff6f0d944c208e2899b
SHA2565a058e54b17f9f0bcafea0f2b55d961dcb792eed933827efc6b406b1e8378880
SHA512af349ee77debd1db132895130286f481623e5932cb9bff19cdce5a47456ae66360de4325ced0b9817434e3a42a19002bedfe3e9dc435f2cfb0b5f6e578313023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726352e411a8eb9d0bd22d0b8d90440d
SHA136232bad8c65526d01dfc7aefbcbf8e249679bc6
SHA25646f788522517713d65a6a1ba819e78cd0050dc36fb6e3507e59c2edf4aa610a4
SHA512b260a7705401d02106700064866f0c158ca0f6338f5c5d048cb6312b0c01b86c88ebef710d646b7e05709baf1156c726d8c257667310b38918d6a08248c2fa21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33e1ac85470ae2ac11f6084381fd2a1
SHA1a5468e46510a0cb1375f0beba340edc97bb2bb9f
SHA25655e8a5e9454acad43badf72c15a778dd447505153931badc672f71fd7fb4338b
SHA5127f2436d61999379fc8cb37c0f29188d7259fd1a53915b64288deaea9ddaa1e908d99c3684ae4d22b66afafd2e41e5b1cb6b703006f496bff95b60855375299dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5f546c803f6c67fcf91086296cfb64
SHA10a646a39cc1a65afc23dfce154984128ab7b1ee2
SHA256e5ddd4eb9e0beaeeb918c69cd9916bd291fb756730a121b329d9cd5b9af12ea3
SHA512fce04491026653d9458625bcb30afdc41b8cb1ffd54c56020ded61e1a40d8b7c8e8b54e6e384dcb6e3245c351dfbd018106bc3e230066e356310c39d212468ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf369512c5b938da110939b65449be2
SHA1efaf89214423bff9190044bc1a7dbfeb5f95fed0
SHA25683b0ddd07022ee755559fd6e3e36b246d12058d2f20f023cf18bc0e06a1cb296
SHA512415421a53b6e839192479595786dd855835f92deb6567bc2a5866f2c7be13d2c1bedf1c48f1858bef74efcf706cbb4c718d5aa5ad19ce3160347837ab13f3f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f754e7cb4388f29d620dc26d5168bd9
SHA10b8b069dad82d441a283355dab94f885bfc787bf
SHA256ed7c34bf83e136f493e73dab9b01cf4bc2d5ddfa18250eeb0ad037acd13917b7
SHA5120eb9bae274f0290f0b990370772c446eca3cf007ee7aa035e4d1b1d19c3a0e1abe13935354b6a29cf920d1d24ba34f859636a4cddd32f56e391fc3d1d551e0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee6b67c5f50d27f5329d049b301c00e
SHA11f4c5891f79c9277db6441de7bb4229fe412ed95
SHA256c2f78c797e6dfd3785863213d650bcd79782b09b69df8bb0a212f23e559a8864
SHA5125748fa434a58b7c71e3081c72b8c5e1970260500dc4e88a724b0eee5b754b7d4952d97925b666e21ec29f6b075566ef80f5835a6fcd23ca06a715b3ede746c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b096b81db201dd2278dfcdb7d5d22dab
SHA1dc1ca9a4b66397e35a86243e0aa8a1f7617fb356
SHA25634b12be361815f18686a4b074da3f711c529a8466e733eb58a64599a3787953d
SHA512d8a6dd700d2cbc756fce487eb9c46ad101937487848cb76ea16b16bf0b6644b8341562777300ee79d774c6174bcbd8ada97d1f8a586e4a0236c95c4f38347d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58375ddc10ae52bc6004f0d9cdb94cb9b
SHA17ffda4b0dde118a1e5374c8f8b2c4a68b39e4ba9
SHA256f3a057fd51f3f2a542068f4f664a25d58fb25eeae3d4e8920c4ad45370a67876
SHA5125edf08338938b96f7b1cb8cbf9266b4aa6d9942784e10f5cf21ee8a15968a00139ac83ab765db47bae5000ac6b1b301008a928b03e38b5e43251eeda34063866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cccef800f532b813d7e2deabf4f89b3f
SHA1cd63bd633b1e8055ef199578239163f09467a171
SHA256360aa58bab40e88c3d1da8ed1ac292808f5671ae54ee648038546ce965782b0e
SHA51259a3610c2534441420b25f7927600dadcbae23d41a3b88433cdaa55e71742b6623e5676bbbf2581199a21072513ff30f827afacecf5a664c8de6b9fac9b4c252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12d4bf12675f1486dd9d1ee8f066481
SHA16a8c19ee5b0a3fc5cd677afab99b651342a6cc5a
SHA2563b6ef8b06ccb3d31d59f61df7b9fa77b34722adde985003201051f4698a4711c
SHA512d2786169db17bcf604a9d2ae2e553b8be0664374200071b23665bd745a6231d1162e7dc760ec0059b70a3a57e9782afa3c74d5bb05c36d90b5e87bb434585655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55febdd2ed67a43c2fac3f758c9366dcd
SHA190491faaac686d8add79065cff8f62156d09d5b5
SHA256c51835300107fc4f5c751b31b44d88ff0277c15039dfe856ac4d39e6d7a4137b
SHA512d6b47af2d5e5ccfa3161527486cb435bb70eadddddf69b158e89cdab0d9e486a96c8437616c90e226ed0075591ed08d3972e740f5d3fb1c4671590500c3de2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503edd3a186d08f0f82e695f63eb0bb9e
SHA1702b865756174f5af7849d563d2310f80574bc44
SHA256e877164c74b04b4f2af64b98cc983d626a2247f06defe25574cd999739565cac
SHA512a9451dc693d60b1caf7b977e1b58f58265b5d321bc1bc365b376b709a4f1d60a87b22415a7a06e7ae6f60f42fe91bca3525d8a1becf106c361df77da124f6b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55685f7d28c042acaeb627afc51b9569d
SHA1120cfeb6a472daf7cc6125bf0f0a48320dcb331b
SHA256c0d7755f2f331ed050bd102eb3d2cf597182d1e10636d8ea523bdeb6c7815b9e
SHA5127e65ee87390cf2d41fb696db0f9105ff5c48a87c9a16bee98be39d52f17316c45e0ce1a929f052e761cdfed1da8d7e905809485e04223d9a1bd5f932627f3040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db4ddcfa1388306aee8d402c0e9911c
SHA114e079862dc8c7c3e6fa45c0f08b3c801fe5c713
SHA256bcf02e67c2bee02b15eb1be0bdacdaa3e8b928e63b4594631af1866cdff95165
SHA512fb18f093d106a7346cef350c00d60058a2edf0c528c7877fd11750f7deb0c40b3209efaf19bcd60b7cfd99d305671e08ce48c30c288d622f48c795e87dbb24c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b