Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
989abdea03f3630145ba785252528892_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
989abdea03f3630145ba785252528892_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
989abdea03f3630145ba785252528892_JaffaCakes118.html
-
Size
4KB
-
MD5
989abdea03f3630145ba785252528892
-
SHA1
6351706ca23a0f5ede4d761b5e072645ac016356
-
SHA256
34c33319360d7f19419caf8a6e2890c2d02faa61a353025128c2d5980b35d0cb
-
SHA512
5ceafe91960ee4315041e113a69ed36dbb8fa72378b3bff107ab1b5d70c229fdbc858628104516e31daf860705cf1703228d932ee180f69d1637223955f61256
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZzBsd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000090653a7fd789a44da7e27215eb243e1900000000020000000000106600000001000020000000090f15407cafbe185d694ffd35fd2ede1e3e6e8d522750999ab561fb4b23648e000000000e800000000200002000000009c2927449d3c7689704cd48e412a0b75b30a8fa868944624d12e4c422877b7320000000ecebd697a37ff1e7a2e0cb4e90889bbf00251f00de6dbecb2c207866071eccca40000000aab55c2ff970e4009475be55e1a10d4fac04294484ea2eb1123207c5dc178223ef2d2607cbc460f314f6c6f081857fdb9d4077885fd387348141fc501c1dc466 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000090653a7fd789a44da7e27215eb243e1900000000020000000000106600000001000020000000d946fe037439ba730133fd3921960740ff671e28d3de7d422b1aa3374d69f7df000000000e8000000002000020000000a46b9b7b9ff7163962ca39be670138b840bd0e88d4c85253729d9a8cf9470a4690000000c6d50de168985320726505f59eb635995dfeecb4baf5def6aa54efce8d8095f2f98920bd3ecd7260509244cab4917cdb87fce95cc37056884df257572917de72c5ea209c5622374f1b768c05806ea09305cc9c566eb3dd0e43c23d3d566b96087ee8a4f786bd1cbb9d856d41d8e48f2d68eb8e86ae783653400b49a21e7ee568df7f5f4ab30f69c77cfc90ca95d511674000000086315225ae01a43fe061b26fc458b6a0092ad39cc0fe23e9aa2afe89e71e59b8f7866e049ca0c4172569b7ff302d7d3b2a370bf2833a34a70bd8431d1d87b42d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E554D3A1-2356-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423766027" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08ae6b963b7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\989abdea03f3630145ba785252528892_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550be3abdf9e1c4c771d3319ac9b90179
SHA1a135640f6eb55c1401a5bdf60ccf260d8de53169
SHA256c622bf620a4d77eac34f5c24296cf253c56f9b9116c6541ede17706847925b7c
SHA512111ee684742216f1245d160d97ccd485793d91cf0bee6b73ecfca0027d7fb07e5a78f5494ab42a5d6f2395e7e8d10d0e82351a8e75ff4053743c6f77545b800e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78439b6731fda1310a1d1fa246b5ddf
SHA113b15be76d3e235923c1d7694f870c1f191a6b6a
SHA25644483423e03ab6c1dd291d64c002bfb2e3f5c18f2460f1e6f8bc1c126cee0a22
SHA512ac5ca03fe536fc3d1f00992aa057cf754cb52f915a6cde13f58ca87ac405ad834f0b1421ee1439d6830b57c9d33845711ea07e268934a81e098af7a18463ae1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f13aab6c110001fa2978277f16f3bb
SHA1a8f6e163b2d73fdc3a6d378d634bea20aee2d366
SHA256470af58abe25da2548e71936886204327a07fb72429de1fb9777162ec47d2970
SHA512be6221a250e32ea0ebe2dc36254b2e30202b69df221570f35eb9b19b548bc1a7a01a90b690dd39514fb1ca2f890da0fa260c4662adb3dec2b33033804aa05f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd99d5bd80cb80332b141497366489af
SHA134db33087105e17b70bc72a2eef437b6b81d1694
SHA25638153d384dfb53f598afc3cf833381dedefd032d2d331a3a1f09922150f9391b
SHA5120d15f4c4343ea572c86e81bb831d39e3a8adef04349cd295c967e8d3d61cac8d1a4949ef31035dceb1f2e390f206712705a0a8bef008d00ed80991fedd89f8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea1a699ee6d80c79b77d3b9f3dbd9dd
SHA1830d789efb384db428edadc23b6991d9c5007923
SHA25641284c6c59c2848b2d879a7bd1fa2770352a109c6d366fc6361037c6e8341941
SHA51294fa7eba449732cb4fa2384376274a50a9a03bad3fa21ea93d9598cf3d3e9ff4c9bba92c4cef58f10761f6b416f858ae5a8fa29870b3ca4c0a31e7f95a65a721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eafe8d1de68fd476cf4746f644c4aa9
SHA1da55b6e745d3836d9114ac34f91227bf8c1669cf
SHA256f157ce5a11e8a34c20bfab553e82eb52f3d0dc37b4ef4c9de11ca638618955f8
SHA5127d8db721d2707722017a06838e372d76dee350690ba6cb873dc37ea8b579ba183747f429b2cf80556e6b458979a4dc0f8d6fea6fe1015c7e8b9ba2510935c4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326d7472fbd5d8414b23724f349ca7cc
SHA10571a978c5934fb7fcdb689735bdeaf92897c878
SHA256b116ddb6da2e2fdc6ae125ec24a047500c01632935b0cef9803f1598332c2f61
SHA512a87e779309343d77fc8b7c5f259688b8dffd35fa17cdadd5f0628242b51737b3ca356cef3092bd4ff2675c3966baee4a02acc41ada263c7ee97761274bd574e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567faec8c2ec786eb2a9cc1943e571d88
SHA1c2e2cc8f80d0c5f83f3f39855b1d00f81b0b5d46
SHA256051e894726773ad24b29e075d3c887f8c1b4f67c605acf8edf515932c8202044
SHA512acb88381f03ac3e8ed9a1467eb27fcf55a6b46adc462e8875b3851175ff4e64785fcb564930c771e59e37b4bf73163923474cec86cbdc722164f639ac485e7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f38959ca9d5373c89b99fb1dc4d39b
SHA1d4f24a374efc69710b9155408b99727eaf5c625c
SHA2565595fe36c13c1210db42d9eea2d49b258848642c2d96438f600f6f8f38040124
SHA512f8d2ea378aefaef5fcd3da1252a2ff6013a1e0916507e7fe00bff23c5d3e07df489d60b2d8483a43ff927d1cdf5efb831524a346d2be89c2239ac17f3a8e55b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85b44eb50992c2fef8eecf08ad9fd34
SHA10b501270dcc660800e8463b8e63e719c3b8d125f
SHA256994e106f082345b26bab019eb0ec65d4e5e527c71e10a41a3c2545587fb28419
SHA5126fa5cd5bfb27d4a15c38b5116e2dba976613ba800c11167519e1cd325ec90c5f66d1606025ac6e240d27da00a25084bc80f41f0285a12d5f7584cc57607b33a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4e44b6cf655830c363fe5d601ce8ad
SHA16d2b32b71c0703d5630689f23edb16ac20a2c570
SHA256a471534949cd3e5acc5ea722326730852f5472074697a38940cc530d4af3c69a
SHA5126f2f00016dcfeb792e785951907888d63a65da94a26f5fa018a70a23eb395d241ffa47023de73c0210a3e4e827afdcb9fa0ec5f22a648bf63024e2e160bf2107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456c543e0fa67412c260988362031ddc
SHA1f3a8cbef937fdec0bf004df66254b5b7b4eda976
SHA25626dc0cea7efeb56c6d15a3be4eaf66ea5d45e1bc91b924072197c1ca59172bce
SHA5124975d380931288c364c6ba120914fd1464b029b41f80b6be001e2dc09914389aa531c8b2618946ba041ac51de2caa8e87edaf9640261fc446e56ba0e7c3d26e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c2d8042bbd7ba285ab45d6383b3995
SHA186ee8f354e9681b17e97fe9ce5b7286dc093dde8
SHA256416c4cfddc3ea675d7e5719469232008b59a855bcb12945bcd5f3eac58a8cb32
SHA5121b80ade85fcda76995b6d805f0b6642a8a71166e515451367c9540944469735fac4b13794f060b90af1d6b2e2da61175716c72e1f21a2780c36e2b51068760fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f51819c821bbbe7196bdd70285553b
SHA190d669ee734e19b4f13aeb7a9e5cdf06ae4c11c8
SHA2560f4cf1adc3c997b74c71ff0e79a8b74c5d4828df95f00d05c32f61b6d5666259
SHA512fd8871116745913d5ea69d309592203365a1aeeff99cd3a7365edb80e4f2e5152339ff4932615fdb974f7bb5ce10411325573339c16faf93aed085f2545e6ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf2f335a359fc040fb4d98ef7819302
SHA1809d9f48f1ba6364b7c02d674b07266623b09883
SHA2569154fefa60b6f3d056f400dcb9f7e37a306556dee00955a89be85f12ac45701d
SHA512585675db314177b721fa84286d0b82924d419c64bd5061890e3d6af1e97f46da7c8376b33f809748b75e1ed56d9b3b8941c864b86987dd3ac98d7a6e678891c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b710b62cf45396bf8db71b5d5814798
SHA1b1d0166b90683a54a27d6900c3ef7e228419d75f
SHA256ae06a8a207a28c0402d264d9159795a3f76ee1a0887be0aed86fdfff154efd3e
SHA51226aeff4b703343fdad1e116a680f2f34f5495269f93b5a02c79b52978e7bebf170c174047229a51402a51f699feb8768c1ed6afaaf7810df7359bd2218ec4004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad0b8908d883558883c7908bba8500b
SHA1fe58324be6bd3eb3c3072ebca935e24580fcf9e7
SHA256ef9dbd40e6c48c5ab0c46d2e7ded7105222aac9d48f63e04c3690db11e94edb4
SHA512db3d1659905d976b5c9e9ad27bf3c9aa30cc40c760bf2f678b9cd2586e1cf57b5a5c747f98b4f9368fc98111bb3010b034288cfee471511ddaee0742a8be5d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4130ce1ea43baf8a9361acae2416e8
SHA198039769307b626892602da4646e590f52c0da81
SHA256f54dfb13cd7a8556235c3172cf035d5545cd12ef6aac27b0772aa73895dc0a69
SHA512a0c7f797877899cef4fbc76e84fab3e38c56b0ccf118575644c274c80ba4b8bc81e7295dbc073bbabe303e9f3703977895685627f5fd21f2093f9c1c01c82afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6221e21abd4948cf2197f53997b1db
SHA14bd2043d0d92d3b9e20ff9b14778e4c17abb96b8
SHA256082dac4823109c30eff478a23421ac27c93a758796b2593e2a25c417a010e2c2
SHA512a3c24f30b3b21cc853f6eb0b8819710f28837c825330c767c0ae8f77a0d25852650730621ff8779938ec5b63269afdc97d8d949f0eee3556d8140d639cb6c8d0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b