Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
eac82276980527f791f9aa0fdeae3167_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac82276980527f791f9aa0fdeae3167_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac82276980527f791f9aa0fdeae3167_JaffaCakes118.html
-
Size
32KB
-
MD5
eac82276980527f791f9aa0fdeae3167
-
SHA1
298bf374d0127d1c2beb89c713cc66342bdae4e0
-
SHA256
15a60b4307d6d6ad59583541371a60632645bde9563a97e93c8d8738e9aac381
-
SHA512
e7f8a6a66aba1c18f81bab2d597038f60b826559bd949f659398422284db83afef4454a79539067bf4b1b79f33ddfe51dd2b3a2904a2c2b04190e1e4d9a77a79
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhyXIb5nZ+rwnQjxn5Q/xnQie0NnbnQOkEntXPnQV:ACk3GDG7GaGNG9qG8GtrQ/OWSlEQ/jLt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b2e98c80872db789f85a714c30d872f050fc81b09cf710aa2cbeff071c3b602e000000000e8000000002000020000000768f826bdce59ccde3f5793d8b5040b2060c294c2231d40a1b312eb590984a28200000009cbf001d65863768099fd3f2dbf1bbe5977b3447a47af26b26374ecaead0822240000000c7cfcc968a3a05a797b6d2a7f23e149a025e669a5e92a3a3daf154304108cb71bc4f2e30e163458d886cf2a5a886a5c24d5185f942db1b4af92b7ce5215f5d35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890056" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EFD13D1-7652-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405ab3435f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2812 2112 iexplore.exe 31 PID 2112 wrote to memory of 2812 2112 iexplore.exe 31 PID 2112 wrote to memory of 2812 2112 iexplore.exe 31 PID 2112 wrote to memory of 2812 2112 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac82276980527f791f9aa0fdeae3167_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5c138b7bca0df07149d0bfef7b32af
SHA15883eff261ca994cf9d9f042d502aacfd463ef69
SHA2562fd36faf73b73d9b7aebc1b4367761642a7a8b37053dc323c0098b1f5cfd78d0
SHA512ce80cbe4220df5e03175e2e545fd092e0e00f6f86baa553c69caa783562bd2d17ecf53c24ed568f6493ae4ce596fa73c579bc6b40e3be12769b1809aefc9b161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b0bba81612a9a75ad1b0c3e66176d4
SHA1ebc99708e8a5f5d806ff53cb249ed34f3ef2c74a
SHA2568b6506c698ac774026812ba553534f87079cb324e6b5a34a1f4b810d17253d01
SHA512d94a03aa3a3d2f11c6178209c20602de809b1d8a5ff95e36aa49f74737436e566c396902918c912f7cf271ce6a50454796cda028b0797474d63c844b2a022c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b766ac740051a861439f6bc145086e
SHA15c2769f3482efa7a315c8eba38b1788510446684
SHA256cb5971f9fc3e50c7590052e9724412804184f9ecf25e2988501850bc04445345
SHA51273cdaf79e35025b2af2325126baf5e9824a3644ea481adc67b082f74733dd095fc1ed3ff2b56d36b7dc49544b1829dae1c70c82b9c62a18510edad303f23c240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55795e2c208dded98a0ce018d2ce48885
SHA1c4b87ee206a462636d71b16b739f5aaeb98093a9
SHA256438b16eae0a6e0670993cc04f71b1ed93fbd4a81bdd4acd750bf21aea8813bb4
SHA512672242aa616ff660d3d286e46b7ef827848d21886029e3dcf2c64e0a7cdad37da361e36ed4cf8e7f2e0f9b159ddbb4c8cb4b2b96931f62ee1dbb7d6222e67774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539347e9d8a316a3fab8e29f8499e8f73
SHA1c256e9e299eb08cdfa9b8e7ee11632204a9d03c5
SHA2562cdd0b19cb43a8dc4a13cdf98f002f6a0843df1f202f39bd6ea55d0dad399564
SHA51235165a00ce31622cf54aeb0090455afcb6e7066434697569c49fd40a3a867833f06ca4a6ffe991d6fabdffe66e7686c4c2921898be7629b85b4cf828a3426911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52560cb12c0005caab7c558de19f35422
SHA105e6156531b199b95ec2c5338c2d82804b33e5cd
SHA25662b940703b568149aec568f51d5a7e4243f532b8eaa21ea712be90922bfb4c9c
SHA5127a04cac970bbf4a8dbedcd1ebe227f9170ed9056fc60b00548d6d2424f96fe65b88d71e1bb4a3d72b3ac6cc57be2d068d9acc2cb974c26a0336be819d35b76fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a749d4fef69af425fe36f4f606b13598
SHA12d1862405dae269ba73be98876b9a7403a872949
SHA25611c48d22b4a87279f20f84b1bf2f84b6aaba29b2f9055a6962f7e4c046e86731
SHA512a6b3ec9d8edb5466c96a8c5d089420a4af51da848ed702ab722cd532eae972ba1570b8290476979245e3bbb6383a30f2d2afbde2ae2af98833e4c98bb2db056a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680db41fc8406751feceba370dda46e9
SHA15c3db230a231e9df641413f03e91096bb0b88323
SHA2563eb1693663c8276b642e80c94c3fcb949305b586b645bda5e177bd03899192f7
SHA512b7ad09939744641224aa399235ac7212414724572bb01cfb923282ef81284141c274198c8354b77ad4f3225fe5a191902b3952ef287a40ebad739c0a44342ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678a133836ccbe8148da2ef21d371308
SHA1c53494662355c095e511f84b1ff0307bdf3b5ee5
SHA2569bf06897136ae0754ee3465d51cf66c30efc6985fd333f58bd8531e681a7310d
SHA512b15966e8dfc35b9add4c86aaf2e30d2a027d256a970476489a9d32b3765a21853858a9b59b6ff28c119d6c9dd629afbf3b57652bad5e49afff3e25033ec69988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0afdaba259c87c6c1f224c53557b14
SHA18eb55eb23ee2b5960bb19f9de1253f1a99a545b4
SHA256c32dcfaec287901b3862e67067c4e05ec53c9f3ae5ec0c962ca87240a743d40b
SHA5120c3ce025f2a4e6ee119990caa76ed8d7c3ff04123121df26ad4fd6fd34cdd42a4f8fa729b19578fdbe3fc0797c658907e1d8925f6d51fb05e14a62a43da67f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952de463c573962f1b6175d30249a1a9
SHA1d062d22c3d06ef84508a43e9cacfb4dd37d19ed1
SHA25640e4b1ed71b2058fbb91ad391b4eb0bb51062955c49c646fd0057900d113afe6
SHA51234d77857ad7142996001558bbb5cdbe25b3f299db194af127c11a93d5c7725a3f2093bf18f9f3cf363c8804cf3634ddf12b491f204a41f5f9d55881ca704cbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b6112afd0addda8b3da794ba92116a
SHA17889298a287836b6864e2eeeb08575ca0d02886c
SHA25609811f9f665f9185dc035442250aee7f95b7eb5ec74c9a25a69d4c7de620c42b
SHA5122c9bb933ba71e2c5f9aaaa24e333dc19b138037c22a0f9e0aef93e9318d273fa5dd48a56c1ab1541b6599c5de42355fd8558c769556808c5ae5c21b275561557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f51f4390bb0386d25a5dcdf1d1183d
SHA1a9c0678c37f0be206d7ca972601fb85df07a8a99
SHA2562bc027095b158dfd5a3f5ecde37821141cf335d6653c176f7fb382dad004eff9
SHA512cedc0a0b094731f3c070a2f506985316c9646d1101124303d17befdbf79d4761e05b158378e3adf8de3986ea3e905a533453836e1fce6b019278ed7189dac8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3f76765f3d10f2ef759b077c643941
SHA1672af713d4f3849bfe0c8eb7d92307a45c406106
SHA256025c719a565154bb5aff24fe997dbc612acaeb1821708b8724a7ad4537cc9101
SHA512bc6f3b3414755aa3a448a32935d2078e098d4d111f78593fddb4e52a978fbe0aedec09923d2b05c19fb9ccfeca553347b3a2be70518368203ea8d1ae3f5287b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b77acab41ff8481fde1b39e6038cebb
SHA10f5b684ce53b8c604957b41dae3d026b5580e896
SHA256840d29b24eadbb7c9e3292ca130f854900922d7625b7bcd14ee3a10306765e33
SHA5129671bbb0abc8731489f85c12d9c0fce17c59a0d878ec67ba035ba2fb18c3e4c57d7d29d41216f434d0ee4df02f54b5dc3fb9eabaef18f18ab2973486d94644b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659ce4a2c041dd5a7fc3755821ac3bc0
SHA14ba806ee673f82e753a13b6b8ec98b52d069ce42
SHA256fd707883d4be10685ec853609bddeb4d1bc6eede3140891e4bfa7f10d5dae07c
SHA512e23001a8f3a03541161fe023b9cdf10b3aa77f5449df9d7aa4ff0a19653c700a8246db9ff68a1b2fe76ea9cadaf93ccdcc796e169dcf23a901f75a5be2af6eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839f516716e30d17d22f16e1b513f5da
SHA16cf4ea04103f7b91aa438c5038a4c439facbacdf
SHA2567bed25ce5a434a170fc2247bb64c5fff63b4f0765cb48d9d5b9ea2f338b5ab07
SHA51242459c9d120902d789441549d0b4a209bc95c6568632326ae520714eecf9bf109328a5ec40903b073ebba1eba4fee0716048cfc3a6e9081092ac0556fc41c97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57351bf001e9d46e79889c5da1903e396
SHA1cf00980086750ea761b750df25a57181c22abdfe
SHA2563f16b968b320bd6f7d3dd36622563ece2de94bbb6323cac43a8f38d38e5b196d
SHA5122b83440b7a0e5405891777c5ac9b550558791b2107115f9269b72865ff11a18ad395a5886e8e9a95d667d8c5610fc2078a065d8576e35210b58d8aac946701d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2fc9bfeb6fe7ff622b57b32afb0fe7
SHA1bdbc90ddb19eb45f200ff106bf7f8cf2254968ad
SHA2568f350f94eefd13aebc56557e626a65a44f9b9db6b0de79f85e330d171f59a100
SHA512f3a5923b4e5950263b8f0ef1ee98ee1d66eb8d89c08d138fd9639bbdbeca64be0454742b21b4af45859758df96ffa55809f75f4c1da805b04c10726e5274eb55
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b