Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
efccd3826fa660e906ffc96c52511e8b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efccd3826fa660e906ffc96c52511e8b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efccd3826fa660e906ffc96c52511e8b_JaffaCakes118.html
-
Size
134KB
-
MD5
efccd3826fa660e906ffc96c52511e8b
-
SHA1
e841982fe9179d1ecc55992a88243c3ffef00dac
-
SHA256
ac0df6c0b92ebf41de6288f284c929a2fca32a9c5ad7f085341e0e319284f3fa
-
SHA512
55cd5817ab35770dca42d76fa243be36808f8e4be9d60872f6b54e44e9d017f7fbc75c0600bf7d54d0110a700821254fd0ef525acc9bc6487ef7b680abd64c6b
-
SSDEEP
3072:SPjZH1/Q2SYlBtW4rsvvWxZgndnUnPnn1gn+nCnynAQgn0n2lgnjnFn+tgn0nEn9:SJsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433083771" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000ff4eda25577c4052a6e5455e1efdcf119e4c3248fb4ab362cbfb648af4a8e549000000000e8000000002000020000000ede8b32830de0f2d6b677cda38d80c441114bc7f71c16d54c0bfa7c8b1ce165020000000d50e768c795f39546aec4d404c1974f08d7eefb4c9d86b73733c020231718a2c40000000e8b0f0c284b9077cd4d639c97d5efca85ff55ed3ed510684746368c1c2e3de34cc06915a26e80ed0afadd7cd6ba1e2b688bf1727be4abb77ad6690ba2384b584 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b8274a220cdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75817F11-7815-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2804 2256 iexplore.exe 31 PID 2256 wrote to memory of 2804 2256 iexplore.exe 31 PID 2256 wrote to memory of 2804 2256 iexplore.exe 31 PID 2256 wrote to memory of 2804 2256 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efccd3826fa660e906ffc96c52511e8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2376ea6eac212a081c4a7cd87d37955
SHA10af064a92475c52b658ce972cb7afd2c8b452ab3
SHA256e0ad884946e9b9dea8c6e292e404b74c5ce080ae9fcf143d2e0122e6c0dc0d37
SHA512bddee8c5c985861268cce4750b5dd57010c12b7df45b9a6d0b5dcac8898e619f55c4aa90e1357d7f1b1eb2a35150b3935884ccbf0733b3424d0820c365806925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0a2ea4670f10fd78a86dcb111f6955
SHA15d1fa50470a126648fa2d63364e477e15760553a
SHA25689ac3f390210b8ccf4e51e9bb6315b8585f82cae95286fd52eac1341881a85f3
SHA5127dca06d6b62cc4cde155e385d89ff78089314093fd2b975fd6cac9812035e6f9d6d8979876b5633d884626775032c5679764fd4b2d1c9c35897850c72cbbc0af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42ce95e9fbe133c5d2dd1926bcda703
SHA1d2b3dd749447201d29050a021a1173af62c6d141
SHA2569dbf8ec15821c6ac850c624c2b4321ea09b5ed6ade88ee05f5296f568e0e65a1
SHA512ce95d6bf13a116daa64d9f0ece24a904e460f5fa8779b9a503f388df9a442fde7a10582ad65d840cf80cc54199b5e6cf44bf2257e008e8a009fdc5fe4071dbae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0f46d2dc7edf79ab4e2634f6f1c850
SHA115473839c956677e3afb87224485c430f12fa534
SHA256866cb4228e529167cc4827a13083b249923d02146c7dc5a39ac05e2e4cadbb02
SHA512a2037e0b77317c455979f1469a76e9e26c4a524220837cf3e2eacd00da62b19ce4673fba6c3d9b756427395ddc9c4536d8347887e7b4fa8859eb1c8893e3a966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949e160caafbfb95d5df83dd50d67977
SHA12bef284025d945df533681aac615974d27d205e1
SHA256da2e6b01d791a9bc964f26be8c3b6bc2f0332930588b1525bce230261ecb41a2
SHA5123e5340bfc2480cc4c69d122e0390016bb754280a62704e0faba5c1690008d1e27a80a9c65e9546e53a877df1d16256fb01f763a01bb1e3327cc938cb6d7e73f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adaad62e641e6994bb9560cfa95ee14a
SHA122539acff677a85185003ac10ca7f8b8499eece2
SHA256828cdc4823c6d843c12aab37f8f909030e4ad6d4423569719eda49a32783347c
SHA51266af092259b64c6196f9686077a84d931570faf90b674572b2cc8d68d23ae9ac5b33f350cdb66d48951ae5d70ad034275f80f386abbd59158a6f0fecd7b3b470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9be1db2640567f5fa1e220c4efadbc
SHA14d5799f3efbce145b372b9e3b2c771646552791a
SHA25688d40ed459f2338ca16f3be58dc3b063a1976311320b1405ecd5e8b85b71882f
SHA512080224b42e28dbfee2429d7290efc33763b541c79fe1b69cd383c6ddc39237b7e414cc06a6f1e32c17fedf66475001177122729112be566d669e631afdf0397e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7627aa4f1deb2f3062ad9f33d7e27ef
SHA18980e8c165103d109895cf5ce09aac557e4523b6
SHA25664cfbceaa7355ab4b32e73fb0e2ff54489bb28a33697a414cbc71679c5e34178
SHA512b9595690b057fd209e747a39bab2747abdec0d58539abe5c9bf490cf7c3c706f00c802abd60ae16f9519c173d0117bbe2872943dc457b887db65ca4f86ea6719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1dd6dc07127092bddcf282c3a1a2c34
SHA12daa405daa997bcaed04533e597b2a0d9bcee2ed
SHA256988ae1a3c88be57a0c4ad18414acc22fc8ae6abc71d47766ba1ca8cc4c527215
SHA512d085aabaf5a54a61015d1b6cc810a5131d009a1a69209238eebc2d12b19f59dc47b6d78ea0bcb92ea06a500abd7f104281a83f341cdc635b90f77e1eb3210fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59784b0c4f53401e8866bb244b7f36e
SHA103329aec0412ce77818279c25f3df1fd100dd50b
SHA25621f0a06530d62b7d20f66020443a9086af36081a29ff4d58f7dd150b4163d090
SHA51239bb576aea8037a61fc44e22311fab4b4c94401032a7245353433cbfa4809276980d0afdaad400833add5002d1a0d9bbbc32e0da5855d6c79034925efbf85f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21745cce759db7eda4d24584fc37efa
SHA103839686d4a2bc5747fc883d526eaa3284d50abc
SHA256baa55715dff0c5612180f7af2695111bb9b60812a1f26c68e3348dbf9b8948b0
SHA51288df14f5840d52ee99e651c2d4e25eaabf0d0599c46be7900216512caf0a5809dcee44d5cc0667657070a4336b0fabe106154e9a0d2735b590456f9aea1ebfac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b56109ea97e2e92713b9cb6168a9d2
SHA1fad1c5a72f6043d7cb6671f77a031d3ef6dce8e4
SHA25635f6c29c581f3757d056ef0514456dbb76345764ffb7c5cd38f67d6c06aec4af
SHA512e4b078786c86e460f9dc291a30e80d327d7d3cd351861c79e2bd70a0d9a90929960b773f05ef8e244f60c4c5f0cbf2c938f0c5f8543649df4b3d36800fecca6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e3b5022476068a35eb40703a6a129a
SHA16b256b213c35689daa66cfcd9449e388db599a46
SHA25626356fe36b00d5b09bef1fdb5625071078fead14b57ab32c657a9c9bdca4bd22
SHA5120b7ad45c624d7a4cb60f8b60f7ab53b077d346c231ded99ec9a7e130d257f885d9d68bebfd1fd965c2d71d6673fe2dd4ca27d6c11b00a447bfa35b5378c0cbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510282c85c22afa754061b8b05abc2a3
SHA11f539d230dda4c8ebabc24ffa5fece0f828fcf49
SHA25695c901525c20c1c884700ddd8452736d1016fafea56f4faf7f683fdfecadb2cb
SHA5126ffff2a707397c8e69e9c3d37ad0242e6e3d2bc752fe45d30c1e4d99f0f48c33e28035385d745add4767540cd251233c4da6355a608be8fee09f4b6b0b04253c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8010311cc59a05c9c4a8a201cf51dc8
SHA1610aa07ad724940c1cbdd7aab8a196e9cdd3d472
SHA2567dd33a75fbff53bcc4fa350906af65e51a3c9384dc28f97607eeaf8a08c9a3a2
SHA5126aea875abccdde1020cea75a204ca05a1a41ef30a9f913dc3750e26b20a94a2b972b8daee923e7733e72d9097d775871f82c83b88f2cec631f76119f750e3af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043346e320ef8338f5b83c42e4959e18
SHA1d91262878863ccf5bb65566ecc9ab96d16a889da
SHA256a65afd60f1694d0862c7a4b56ec4ab82067a35d0d0624ca0994612a03fcf9c89
SHA512f492378252713822a83354a88a5412727b449ba6bee6981b7d37b59eddeb4edd0037618accee53a0f8d1f6f44a75f8a297270ffa8f01905d55834c65d997851d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f69b4a7e9848269e27e0537b4dce9c4
SHA169bce37f1e03ae04483f283346df3517719adf3d
SHA256f51944fee10fba717c34de01b8f986a1557db3869cca5b8c43743890c9c2f7f0
SHA5121562fead0547d9a737be6213153e6f01eaf0b45cc6c07a64baf59356fb155a47b0d020bab240989b18e45c00f58fe279e23542079bc32b4957d8302d11a33cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a49ae434c64b6d1a37aa287097aef0d
SHA1323ead862eb335e46b456a6206bffb00c3f82f09
SHA2568df0b430382085bf0494b40100fe77168d4a9b5b6fdd98fb1d6a2af3f6fa4e4c
SHA5121e5f25af7d97be1a8cbb71c1282d78de9f7b677484d23a842cb1846cb11da74f65b145b95f87e2823a33cebb35f4e8be8ee287b606ea17b42526ebbfabd9de55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f1d83e63ea3a62142c0d469e18d131
SHA1824fa520e893bd24a6f8c0d2a95b4fe0709107df
SHA256237aa68db8d7054322c3c2ef83536e2a7d8196d92c4e7a29e8e38298acc37d95
SHA512ac3ef8cd5fb1fe690ba1cae387c1633859891ff26edc5bbaef2d68434cac28d058b4c2b17a81674a3f3279a57274b96bdbeb536501affde2e3da1661f769d83a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b