Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
272ae8a806a63b9bafdd691ccc46681d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
272ae8a806a63b9bafdd691ccc46681d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
272ae8a806a63b9bafdd691ccc46681d_JaffaCakes118.html
-
Size
8KB
-
MD5
272ae8a806a63b9bafdd691ccc46681d
-
SHA1
ba33a9924acb92e150bfdbd97e2ed8b6ca4ec131
-
SHA256
3cf88ebfefd2dfd5ca026a9e24f6c8f59c3cde762df7fa875d4800367329f294
-
SHA512
e50b967ec4746130fa32759a3f1fe61e71430d069d9a3f4adac9587b6305cf98f8bb9e737090da1c735b2d23f3caffa73fcdaaf84604dd08ea1dc1378b1ab98c
-
SSDEEP
192:GeryxrtfdeFM0gktYB/odBYJaQMArfZfWfwfHfDC8fCnha30rL:Iff6+MArfZfWfwfHfDC8fCnha3w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82B6FF11-8608-11EF-AD2E-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434617526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ed3757151adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000001a3c9354f6dfcf49eaca1ce980f54fdda565dcce8a6a8c5011cdf65b514e774c000000000e80000000020000200000001f88a08214e1933d24d160d8afcc366f755e4ec61e893f0f2d43d3be41c8909520000000a8494e8dc38584e517dea4b10d97a1d3596c36e072383594b696e4f71af1582c40000000f698b7296ecf2f873a27e04d972922c806d5b072ef9af7dc5ecad9d6cf16cd16d779fc0f5df9172d8d8d681f669e362dc7e8053912ca686934eef8eda4515d30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 3024 2076 iexplore.exe 30 PID 2076 wrote to memory of 3024 2076 iexplore.exe 30 PID 2076 wrote to memory of 3024 2076 iexplore.exe 30 PID 2076 wrote to memory of 3024 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\272ae8a806a63b9bafdd691ccc46681d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d922649d73a6e4a97c897719c1b6c1ac
SHA13dc032cb5e751a834a9242f5370b6bdea7a05faf
SHA2568883b9c0b29b1c6b4de1dd9c0e8886e4ba22ebe171a0f5464f01f146c1203c02
SHA51261c52bbe9a15ca08685196def4c7e18730bf6760af15944a18c0ca949dbc418f503194bb4e5622ac5f25a0d197afe0cf772b9acdb13fd163e85701da7e0e6a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c6daf671954634caf078cfabaa262e
SHA19788686e2ced58922367d0682e9dd9fc8188ecdf
SHA2564fe292d14121a05036df13d50490d0fdcd0598cf7b6ebe328b534d417bccf6ba
SHA5126545f716ac3ca6004c9004f56d369f8b8542636c7a78164eacb977de214c2e110d53cfb24dca81b6a4ef3c2c256487d703bd6012d40a1091d4c02c13438103eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570635c6b770431203215fc4a347b1493
SHA1b8ad4d3161f3c0e34227954fa37d1f41f2b2b21a
SHA2563648aefde526282dab3669276135a9dbb2519ef29e40b960c12711bf07d91628
SHA5124bf69f74a2ff1daabb6aa9945f5889622bf7025fa95196b1127a603034237cabaa1613731cad2271581ea8c7cd34494aaa80979a5a02e1752d6aa8e095826986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d4be7ac060866b8fed21d077cff97b
SHA1648099dc86b1ae5a0afb58c7fc4298040c747fc4
SHA2563a95b6cab788f0c304ccebd49d2c9673fd23d78c495971025b04f4228949e023
SHA512d481a0658f0ff203a051d0c3aeabccc36ebd98e200c1fd3f179d61abedb6326e83b6ca46cff8efd6eb581e6297c2e2ccc6298e5c264f6a77a05b4df2e7d1b1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094fdef4935e1687147c8af7fc077c61
SHA12b9e094b963bf7a114e68203981e648b635678e6
SHA2567a3b6d33f3aac391d4111e127daa0c30195f3fd036294eeb548a5ee0a551dcd3
SHA512cf913e2040c69870c05c215bc2821ce222908fdbab27ee1256414f8d61705426509f05ab22c98de4e49b27c768b5f81a113d6140c555e9b78c551c682ca35578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c13346400571bfe9642d0ab29279ad
SHA1186168c562bee17d61eb3c83f5789569d83c6437
SHA256d66a82e7ef6e0337a1ae3f5f21ba62bd23ba6f2985525bf2f03e6d793bbfead3
SHA512f8e436f683f20a7eb75ebda2fbd0a8532c741e5bfd0863b78ccfd75ff9ea467b35a167223216023141615c88abc029c14563e25ada827d266faa5b1816a1d126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fe1f6e5bed74b3c9b1829cd114f6db
SHA1763078967164b4d6cc8080aa3a95610f35bee73f
SHA2566e70d9ae27dc087b40f058049ec94cf6b9dcdbc67eb4a409f2ddcad54831f1d9
SHA51292e21a87dccd29cbea3b7f2bb16a0820b1d1aaa5692d7117247c001da07a84a655afb4167e05d339f96402aa0025651e4912b36b2ab1e2a62ea332b0126b0b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c728b4393865208d526db5a918fa0172
SHA137c4359d57c5077bdce81a3f46cffa85b1758ed1
SHA256052118e85b346647180e12620af520048523c243f1987f9d2d388e50216cf5c0
SHA51293f4daf68e97ee13f8f1f0e75907c94b47945c071f5985e2331f11cb1466fbec0b0118e9b5fb99a27bafdb771276073de96edac94086fb5c879adaac95d753a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e28254ae88c9fc75d5df8acbdf9afe8
SHA194fe508cdb9e779a5778e03d76e50bf88bbf9d75
SHA2568e7f3b5469efac6fc03f65ba88e92be9df850ba8267f27f365c72c1cc8d99d6b
SHA5129e7eb244cb773ecc1db7d68e59a9930031a93f132bd9d2c8d76341f0332d3765a444eae12f68c1c4cc37b7ce6f1be3171671fe842b239eefd17738d64ff0056b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503095b6a783ac86581bd99a36f6ba0d0
SHA1a7d79db0d7aa6716bfe9dc8bff8fc8f6b9c6b90b
SHA256820109919fe6b44999da96d7f3fb74fafdc8d0efbd1c8c9849721310608ad579
SHA5125760e526a0ae808f34d4fa26f4a0c5fbc797ee7f1b71081de3445efe22fa5a09520e2039314f73195faa40308b080c8bd2ef5278196b0587327e1a0371741cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca88ba5722112115713309f42e66a765
SHA16ac0ccec11a8414b0cd34b16874332f8344cc13a
SHA256e320d3a5f2b4d620575b9a57c3b59ab68cf5c66f484752baa803f8dd97feaca4
SHA51242642de071cf276b4b968b9207e017d5c5ae2b2e5332f8cd2126550b6386b187693b411c821e7acc99877e26984daeba9d4cba3feec9da35fd2fa9f07be28ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e411a1739382274b56914c77cf0e0f4
SHA1c28bcc68fd762aea60033042bec7dcfd507e303e
SHA25672ec0623ea3c74870bddc1a4a57ca7e8e8bd7d291a5d7acf01ba3505c86688d7
SHA51227c1b784448a9e91acdb3d18c0451c7af7e00f63a81ea5c7c49de438a42cd280be86b2ae9b8979abb311ae378c79afbe151f9f61f252f327d12f0de9b7dd77b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58620960fcb10f6243e9f03a3e600a80c
SHA1e0ec0e810538bfabb5d598486f2803adfae4f23a
SHA256f4db3fd83c145060a39fd5483802c0b8a79e5cf38717860d40e2390e91afb40e
SHA51290ab9c55aab66240a7ca163e4e3975a21c7be760b7847803699e7f53231fa97178b88a56567ba02774d773769424461107d696679c8fca3c85a67b2ff47359e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51952be8d2908561e2a139dfdaa5d2aee
SHA1fa3a3c200c7b314c68e5639f53a140107437b106
SHA2564ea0b3438b2a37c48c6c00308744b0e22dccebff25e4e6af61aead21a5988677
SHA512fec67861b1bc7fb027f82942f99b87ecee840a403403fbfaf66332c9f728580d4c4bf32447a557a7d948c10b52b5bbed3cc47fadbfc7c269e3679ca5f8155bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55102cf4779441b580fcde05fedff0c4d
SHA1424408af80f5922d2dc8318420a365d1c1861bb7
SHA2566d71fea5f258f025ed50f2091cbd7edfc2f402aa47d3f2bc9139ae61ad1e8a20
SHA512388560f275f2325ed2492171ebbf1e6d354dbf9f89db20c45a650b8e0ccf01cac71a51d969cf878c765898b3f310480db5e2e0cb576ce852074fe27282a2fec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117ad8406aed9862a6f93b8883b18005
SHA1fb76318e4e61f8db6f43986129cb23484a613c17
SHA2569bff5e75ab3502db493b43b84ba25efe19928ccbf03f1d083ca07a31875d2968
SHA512651b32900ffa935b15e0628ea2b95ea839adc6edf9a8f98e4447f6aab32fbd75788e64da750b23964fe6bf156e10ff9fe95ef42ea7074fe28bb7cf7c9a9999bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e58c8610d76c312f89494e3247efe96
SHA1028593c6a8c983285dc841276a054f2fc9bec731
SHA256548bfbc0cdc7a6ff7004f47b68dc1fc6b37feb2a957e11776926940a3e51d6f0
SHA5123f71950c63efd40c35291e47dbcc9c7fe49f5c2501e977c4f69718a6af8bb292cf4a4c1ccf162b6dcb006ce1f8de40cda867e293b0c8d1547aabec8c3dd515ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485ce8ec5ba5b7d38e21ac1c43bace93
SHA1621973ebcca4af957898f22db00dbb3565ea6d9c
SHA25666caeea55bed50522e1fe853e8af336945db6c9f8a9309e6396ae4db47f74f75
SHA5122bfc2750345a48ae32d8e85744b3a95ba6dd869bfc30247007e2b230572d561f712ff8c52ab67421deb5ce2d86bf47a1ca58400a65b625ccb86659303d3e2ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53904871c9a9b511fdc4e7b785b4a4926
SHA1e04a17e93f6cb0461cd24220a8e90353b20b1b47
SHA256d1ac7c6925b1719cafd5cdce6a52bd4a55d30953284fbd32063cd97c8bcfc408
SHA512376ab9e9e703d3ef1b14a901a8fd3dbece1910c5ebdf8e9112806dfaaeec005578b9e3fc5bd87a7bc2ee11d0958bbd8ebe4ea311dbe3cae6f57a4fac8f2b3aee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b