Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
1740795923fe1214b99a97f0ff682a28_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1740795923fe1214b99a97f0ff682a28_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1740795923fe1214b99a97f0ff682a28_JaffaCakes118.html
-
Size
10KB
-
MD5
1740795923fe1214b99a97f0ff682a28
-
SHA1
014679d181e68ab4c404da1f55ffa903bac3160a
-
SHA256
dfbfbbf2a526cdea80cba92e4449ab91c076ee8ae99dc154f985e97ff89e43ef
-
SHA512
91974afdd387ff3ad0429bbc213c5293432287b352c4242a16456ccc999e3f992d4f7498aa7ebefafbda4edb6b502537578e44c0d22a388f6b8507cbca9136a7
-
SSDEEP
96:x/fqNREEXiGIgMuimieudd3IuWddddddddddd3EdddddddwFTpLgXW4YQX1LgXGl:5k1Iru/H1CVpPhUjkMjo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0367ae30e17db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000585c33a94ee9b5685ea9ab2c363df16aaebf87b8128a1187a466dafe19dd2db5000000000e8000000002000020000000f458d203420254141c242461c229610f445d1efbed01e60d6ddea1b6afdfa55220000000866c2db4bb966fa0bbf49e79754fba83455bba04b11aa2a2e2feefce1d71458c4000000043c647296632ced39c88cfab942b6c520c1a829a07d8a266f46ab927d7140498f758915681f09d707ebf70f3e0fa4602459047230d29ff437b206c18692b2b21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434284858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5BC8F21-8301-11EF-9527-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2696 2644 iexplore.exe 30 PID 2644 wrote to memory of 2696 2644 iexplore.exe 30 PID 2644 wrote to memory of 2696 2644 iexplore.exe 30 PID 2644 wrote to memory of 2696 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1740795923fe1214b99a97f0ff682a28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57982b3c0820117a9e4a6eb70c612d934
SHA1c10d435d7f1c2704c0830239121f1c8a0e3f9347
SHA2569f354860ef10745ee509dac581d3d9cfc34ec0441804f373820b5d5ad11ffb68
SHA512ea093bfeade304db9695a8762184700bf6c7ff627d381adde4a3196e9e087d28354083a8f90d2487f184583544154533d3f11fb168e916022a4afe4cf33c998f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e0e32dd3262e6411ff9e06b7bb66d8
SHA1d3f8d1311631bb7e76fb8a629cf38a40f3bc0a7e
SHA256a7a5ad8c53951c28296215d069588e969429b3c989b724a00f64437e7443288e
SHA51220882d7c759ae2880ee4995a2d0905c200bb72f693a585b1c3ba9a1323d9b36f643e55e7d52cce460f7f3191b664cb7a25a6a4fbceb3223a87ca1ebc0d9deefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578537a7415a61bd621f54b82b857e5ac
SHA1dd9817dfa4e5677c5d31b8893f0a6dcee991fb5d
SHA256661abf57e8e1b3a72289be4ba15567ec90d0c1d36fb64475357c2025e7962208
SHA5120c9f597428e361d340abf0e8a72a304054af5e341fed72bd27a98cd0e18b609cd52bc32340a852fffb02952dd3e55a0f89f5ff6b789726ca31a73ec68e162b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac591e1bc4b31a08890ed6e107c57bb8
SHA18d5cfbce942885eed65b7f5837bc8b439d3b1667
SHA256ffa2f8a79a3e1d3601e5446d2b479123c9ec26d1a42769c1bf297f4a353e1209
SHA51225f3d61c093fe210698521988f63722c58977a7d442c529ad01c7c8da5cf277c86a63e52ce075c07fff53f6262fc85ee8d1dbdcf34a211fcf9087b64ddb9e318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f9ea9d11278bd4e5260bb1608f8cf6
SHA1e06116295261da4c7062b0cb71786f44734bc50c
SHA256e242438aba6693e19aae5c92b797fd90b29b9d6d2d0abcbba2f5941928ba1374
SHA512aef0f23d46062dd44ad0417b2c41d231f977c25a9f71bb3242155a1fc1401130426f6369078a896e422e0cf06099b3df6eeeded807cf91f431129f07ee251d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e77aea3a51985b1b8335a20ab3b58e3
SHA1575e3a25803095cf2f5a37b6cae5ac6629b0cb8e
SHA2566cd4da8c73bf7bf72158cc9d89527dafd81467a723078a38d0eb2920a8fccaf1
SHA5120a04b397835392ed0c5585eceafb1bd532e4aa353dd0441870a264403cdba97bf98be9e7393b637031fdd8ad292ec48eb19a7b2c05df12c8c55c86e40f43b1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18f23999b86233d1919bb83777633d3
SHA197a019e3c6189c40c5a601d45d13b0bfa6c81016
SHA25648a5b8f587086999b307e709ed407f4698632d58117290d564a8caf0a1ca662d
SHA5126136a1623a8df52e2e9bd211fb37ca6b64ac81a9168e46b8d2deabbe06717f5cb21fa8a37c897856b25e608756cf80fa9c2f4b9804296a8d4523340c7cfa608c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba1e517eda27ece818cacafee5ce5fa
SHA14f5d02a8b4c582d50ff05599de65581519497d97
SHA256f40575efa072a8b38762cf432f2870503a458e4de5492d889e5075843f300a56
SHA512b7ad61b16511663ed98c86bb8acffd4e1f8e52cf348523f032455de03b6e12fd6a628f6052192d1ac20405f358229141ea96487414a1016c11b98f6264f719f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c65697ca4286c4f975f334381bfa44f
SHA17e136f3920bfd0789f8604e5c7dee399209e0100
SHA256b98810b3eb4c2ab67b9f86a1ad4c2528e9dcdd9d0ca1c971119f965feb86e8aa
SHA5122480f6fbc96e6fd8e835b9d9c946cb6bbc35856007c756f021c2e11dbdd86b1540e8649a31adf8100252e68e393f688a9c92e4449b826d2a9cd60cbac1111c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56db08879672496a137e9c3a165c3fc
SHA1bdc84c0e850cf83cc9af23f55e28072b68436d8c
SHA256fd7cdfa063646fe7a1d8b35c3c5166679dd9b71198e36983c4c9b2a9f0fb0d85
SHA512cf9c42ffd11d610580891c71d5752d3384e319ca64b9a3be5a2d9483c79d48000b3f18cd41d995c17dced1cd3ab5e9f18c52bb1f803c96ec86a65aa1c427a753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb9b24a6652ff3f91a9d017a411d8af
SHA1c3cb8805d483b3bc300464b2a2a9cd0b04a4f00a
SHA2567c9a23ff064ccbca74491c4b96c3b832fd69e27b4e09d591dabcbf72c78b52d4
SHA5121be419102eacd1d0275617e0ed4a611047a30e5e573bb4f73df845212596a9f783db44ec4bd6862298d01cccf102c52c691c04aeb6561411f20732252ee552ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53400f9258a0c9e3bcb8864de48df4381
SHA166ea9afec4d3187c0f3287238f6b6b49064f1d02
SHA2563182fa6cb60d74b5b380efb5750a60f581736e665f23c6bc937d1dbec50b1bae
SHA51212f9e4146caa01d2e631874475ceff8b5f2cf76f49626d4a6c3824f2614d58b997fc2d70f10f43888092fd74a06bc9456b4fd8110a4eabffdfa5dc3b8e126e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100fbc614d7b776516e7b46a1c451bc6
SHA171693317fe0f3697757684993bbf2fb3b205ea3d
SHA256a20e281e380235af874bb05a5dd6179397fa145ded931f47f85d28a2ad81df76
SHA512632e2aa6fe849b3c025651f2d29a80c0c2d03d024e9316eba6a6c7ed0d4f68492fdb6b1bf666bf6cf33eab2245af2a5c607eed57d03ab1e8ce142116863bcda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833fd3650cd070af9771c255f2a4d36f
SHA13a077918ed14ede46cd79c2186775c3173b171c4
SHA256db4e0ef65d9533335cdecc08894883afdd2e56ff773308ad3d5f650dc6d9532d
SHA5121520868e7dc0651aae284a90db62a7f59795d80a2e92927a18e90f3bd0cae8a246f66328a3a7794017dcd95a16aaed82e21ec413134f2780bad42ae4d5efe63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed22decabfe6240e7d00c2754bb0523d
SHA1941e4071edc898c2f6aa394d5c363b0ecf2e0071
SHA256535c9dcc86fcb04772d854fad83563de4f0382989d1e2474628d517395f776e6
SHA512fc598c183c924c334fe5121a55d63be8154541a8cb269ed365333a8df974578aebb23ccec2e526c0fcf35d8326371d22e4916ccd8fce27e5110220cae2cdf510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ab858ff40a8f17af2540fc392421e6
SHA1372e7512c5827b3af8f901e2371bd1c83e6cd789
SHA256f9f139fca0342424cdfba16b763779204c03a59c04ceb6a37f9b95f786fa4f11
SHA5123743d72a7395bc9a56f96ae48e9008d0249d8cb32ad4eb78346346092d6637bd01031fd3aa47e45b70414b6ee9910fb6002cf5ea81faa7be9849291ad296ba86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57359dfc6b3bdab378635c595eab0a9b2
SHA11e214d21dc717071c1d8830e5642b7f5b158378a
SHA2564551c10b5a1f6d5b618230eddb9b73c72413e0d9e457f8f5ff1e0b6fde43ac33
SHA512491bd24be10f4fca21d402f650574d3581c6befe412ec7911ec798fca12b6f3492be924214233c0f8b50de4d2620c5b439719c525171475e358d932a9a4b47b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f980ff34972f99fae98c5774db93f19f
SHA1a760b535179bfef005dfeaa1fa7504cb73f48661
SHA256dd2bdaab1a65dd65b4133c79c352b751a68bc0769586a06c050e658d7d86db3a
SHA5128fa3da708a3fa87b82d0aee7fe3ae6b5f4bc056051f09333dc94d519d716077d7aef2b35fe290e94090867a56aa6344bf4fa76fc926b1a66f11fbfad312e573a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b85b0856673cf4e9bb49f6b08984e2
SHA19f146da3cf90b30b446759ab069bb7acabc41f52
SHA256d66ccc72d27524d0c738de526d419e75c7ecb0aadef09603189a5c0a5e81df88
SHA512400cc9637512c663b5e86d27f2ee9ea1acf8eac39dbdb02bb6a91ff68a1f3f9b7245c18ac30f7164949694f2f986b5e399305c7beabc846ce4648d7745f13dcb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b