Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
3ea6915b939f23b7a280bd4f11ac326e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3ea6915b939f23b7a280bd4f11ac326e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ea6915b939f23b7a280bd4f11ac326e_JaffaCakes118.html
-
Size
40KB
-
MD5
3ea6915b939f23b7a280bd4f11ac326e
-
SHA1
cc094ec6e2395c57f47d7021669b8a1529cb5e59
-
SHA256
af7b97b972cbf593a62ee410d14cc3840f7cc6657fc6f89032c7803d3da0a289
-
SHA512
bf9463c36eddf75b6567aa5206f7d6a2df7cf89934c38de2030723a45d147f0e4d26cfe5ad3f70ff8602a0d722022f60b787b57d0f18a169f07f4f61b580a22d
-
SSDEEP
768:fswWJABhPQK+PGlP6Sn/NMz5L9D/loxPS/3K7NcPwdJk+KclOZpih:fFWOBV+PGbnVMzt9D/loFS/3K7NcPwdr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000aa3c123370f280efe48f2eaedb5f8d4fd496a247bdb1cd86d81a0b3c308acf26000000000e8000000002000020000000e8320cd0089d8694d644ee86046cc4be52150961e808935374cfa0603bc26e912000000073989a8a6d9b7d867fcdd66c8a6f96a02f1c86b33bbeb647f13b64c287ffe1ff40000000f9fe9c2032697cd678e095ead4862b232f4d09410ea699172c507699f57a495a89f066daab81f9a58e92bb2019500b3c45af2e52c4117b4a9776e2116d310410 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a54e84441ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434967636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD232171-8937-11EF-AB1A-5A9C960EEF88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2696 2848 iexplore.exe 31 PID 2848 wrote to memory of 2696 2848 iexplore.exe 31 PID 2848 wrote to memory of 2696 2848 iexplore.exe 31 PID 2848 wrote to memory of 2696 2848 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ea6915b939f23b7a280bd4f11ac326e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ceda0616c21f2bb9245cec7191dd2e
SHA1efa01a0b31093bf9093f6b2145ed393b5a4b4524
SHA2564d1325013876a8c34adf6d96920039468dd683439f74d6239a777f674ec3d2a4
SHA512bbb5c21d453a063699cb25e9098f057448fa75d25c306315cc7ff904e34abeaa419c0a3d95d2f3c1dc6c0a063850f0abf614fec1defcabede07be329fb5d93e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea95f69d8a346ce2ecde81ce929795d
SHA1163a19079ef3c1f69b68b55a0fdf8332bf217796
SHA256f9bcb5095132748e0ce3588f4530017071f8ff23335f65375abdceaf8b392a47
SHA512e0fb94c22326e51a977b9b8168a62ae6040e46e7cadd2d68e9cca20411363066dad07c94501a4fb05cb9da058c20aeec936a8600375a440807f63c15d7d2f9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc30e7dd21ad98a331d50f36b43459e6
SHA1e059fba0d7fffb8b0bf3bb859d24c64462d6d4ba
SHA256bae9fd67a3f6ae1530c1bf5d98d0b9811ba9920398aa1f998bbbd813315f430b
SHA512b20025b021b1269f6bba2c6ff37214e21e8d3635a75a51a27eff19b2196802d42a1c9e2f8cf0a592b90ce142d07ba0da4196330e2dd9151862d901d56161544a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f88f12d2b30293ec5b74bb971e513d4
SHA1a32f24da9a53579be2736baddc17d996e630c537
SHA256f8d9dfe6fdf954b7ffede3e3c653b613c02a4fb752b5625a346244f6db8fc267
SHA5124feb33878c02997ec7bc0e149881947732c14ac3b24d67e2be44bbcc906d8364d2f915e0f90ad40b2e2519794457be71cc1fd01ddf932f87c98cb1b977b6acf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93d85fae77adf8fdd8d9bfbfd66072b
SHA189a4ff37155bb08457d591b2eca5f6ade633b395
SHA2562ad87a07c85e224c22bb7d438e5c0f2c8649d6a8ebf007f7d1d32070538ce91f
SHA512b3aa98f14b9e6e86ac3d086407738ca9568c86b09024435297f6d68b4ac7b6d3f1e628281826404d5f323779e435db553c110aaca762391bb5ad15001bdad506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0f402958dc591444df19fdaaa9889a
SHA1da7fd4fe11bf3a2a267cdb7c447fda848c62e47e
SHA2564d997e6e92f4fce4e032efbb74dacba5d5472cc3dbddc7f358352881f302d951
SHA512c74187c894163ce1d43fd89dc3eabf880fd8025ebf5ef8d63990b4c3f6328e394f703b1ddf13ec242f2f68470f96d1f99f4fd4ba5922f8dcc225dc32870c05fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb3a4689945fcfa26ebb4f46edff445
SHA1f14187e806d7024dcab827dd832badb9f69f1ef1
SHA2567f6cd65c048a2d03fe0faa47785216e5414a69fd6e3bca9d1573f9a5d3fc2610
SHA512d103bafbb97494b0b1196c7360735d516f5c5c643adbf0ef638198a45722f07ac891ba93de48247c5c542fee2af8ea52c81c8ba348dcfa73bf6a5bb87e28b927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54287c60eca3d67afd55f0d1ea0743ed2
SHA1051a4da630d10a811d0527fc53d4ef1fe4dbb406
SHA256d5d82575edff8abb3fffb736c350af439cd5c3714d0c923c822279c58d05d7a3
SHA512db446b7cdb6e497d514f124eda1200affa6fe7598c44f88202cc3f7c4c7e86281ee3ca1e834ce5d4cd0176aa9f0fcc715345fb2944e48fda544324e14ee07792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd767269af5cc3d0f0ad7b83ad90cc9
SHA18ea72ffee251a21bef5962510f42af8b79d5d6dd
SHA25692c9d145a4e478fa880d5c556a57f844ab4e221d7de3eca071092dd55a83018b
SHA512f39dcb7643121e85463400ef140cdd0d9f9ddd9428b6e23839533ab035d043096dde30b405e397da2adfa38ba28dd4a8e418f3aa4c4168deb98b8fb4bc9f9a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cf25145a809d93d44e5f4c6c1d62a6
SHA19fcaa8d915fb0a6dd7f5277cd039d81d9f964bdf
SHA2568f90a5b26bc41a5803383ccf59242179f7f0abb2ed782e2a5b1766c780472e6a
SHA51263265239b041fe307e11f715231935a1ba4755cd22ef58ef922021d13a5770cd51055a97fe1b9b7db181ea9c124f779e07703d5021f21cd35568b84f4913f5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6846ad31301fa8e95068c54ef7b7173
SHA188b27dbac4c4e968737d818480615bd5eef583da
SHA256ae58d1c2c1844a0e2fa5e3d02ffd6d0b1a9246b1e66cdd83e326d764f95af40e
SHA5121ef3c0a3f7d86d1a3f24cd19197092db7e6a7d0d2bbf03de94bfd3c739bc8008c625f905db16144e88f1b56bae302e01762e3db604373b4e94bd0f9a8a1616e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8088d752d4b425c410b87220866418e
SHA167997dfae15b96859c19f88f44cd36d746efbb1b
SHA2564154d15ff6f831cdb57a761a87a3ca368d2b6710dd9a6900ff3b293c6f11c1ce
SHA512ad60ec4385747497060d8ee7213ad40d51c573595afaba278451c140d28cd7f79d9bf7cf67627c0efa803802bae5da89c38cc33a9e5e30c41db518cba4e1b54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a205d46006977ad6aac4f744c53c3cc
SHA124d1ac88fadac25040f3e97923def4881dfebb69
SHA25669a98ae194336332c8db01d2ab35cde278b7ce587568f1ed05ad0db3eb5626ed
SHA512ca1140b3d2bba21b105606f40768ce62e8497af6f2744aa027123bbfe8efab348a6515d9191ad1b5098d17d66edb453fd8ecc04fe9f98ac251c679dbaebc8191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54346882c4913de5f83790c59325bb60d
SHA1aacecb769b778631e4d8bb896d4d54d116b16c59
SHA256627711660576abdc72bdb2dc02736fae4290369193fb72169d8c2d0fe49d7a05
SHA512f19a4206c588d8356969e3cf0e996f90bd46e47a9577a7e3bd63528879f9e7495b9d5c6bbf920fdec2b3f354505dde00f77b2d00df48d471f5e4be67455b6683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ecc4772454844537a1cb7d17f6744b
SHA17a41abef3811f10bf240f4c0511cc7c4387122ec
SHA256baf9ece558a5ccf382a8f43111f0bab236560acade1baaaa401ea92f70e4d97d
SHA512879cd7159329b1bece8234e568bbfb350b00f99aca40b168afc6a175cd7643474b015ca5bd38543a9ad8050294814d7dbfe6b0bec5db5ceb3fb893c2f49fac0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53223c12c773bbe8c9a658d4414f5bc83
SHA112a7b1e2da37c14820019912ad69b9e5df5eb387
SHA2564283207ef3979f131b9d4866bda40619e55baf8081cef11574affc7eef22afd1
SHA512f8ee237856fdff5f5651d83457cfe6a12ece4761a9a5d6636e261439565cec3facabcec6ff648125deb92ef64df3c0bafb8079721cc72ab1717ab5073d81810a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b651241ba3f91713fc3ec4d8693c88
SHA15925d8b9440261ac83d12334d4b90e85164437c1
SHA2565f0092121c16d4b8b88ce2a79517cc5735caf89c49074928a457173553e0aa5d
SHA5126331aa5479e65460e15dbdb499a403817a81ba8abb63fe6bddf51408e872abac97a8f681afd5f7d1ffb99e5a2ef1236e586f657fda3436839e10fe7596fd9da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee74d68f761c532674d592437983af51
SHA13e7b00241c993099de2d0021a7b5ed6a47d4cd5a
SHA256f26f4681c11aad3ba4e29319ee564a683704f531456b14113eb926df2ea49d77
SHA51269985e83c50a5d03b70abf28b88e3b6d0e3f279691bc5ae4dc7f6c6639b487dde6be963267ae2b3d2d3e832d8a253616ed5699d5fcf504b14d97c42ac2a7dea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc5355ea4bcf64653edbacc16a3bbd9
SHA163bdd5ea5d8262c054613026d428d6dd9a7a83c1
SHA256d65ce34e3b5568213d372376ffee89dedbb30a8b29d66c4d6c65d4fe71cef4cb
SHA51272f6ccc873d3e17841ff5480375c552e9d8e967b9f0bba22f479cbc4f32db890bb549a352828452f5c48f8b0d9497cf6f2cd46b5b8399891adda046dacee470b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b