Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
ad086cebf34046e81fa32900c54fa809_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad086cebf34046e81fa32900c54fa809_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ad086cebf34046e81fa32900c54fa809_JaffaCakes118.html
-
Size
134KB
-
MD5
ad086cebf34046e81fa32900c54fa809
-
SHA1
864c2ddb9cfd714427336d5b4d95a9396e8c0b68
-
SHA256
7b40751abc11c4b3f9e90dac545a6d78da33c8773d0e684fd89d0f70a25a3a26
-
SHA512
6ede54bfbd84d8d14249f35f779c0e2cad507736d27b35cad7e14544fa6f83a2b1d243b4503a710cfdd8df9f2f44f302b30b224871839fe95ffaa57571dfb8cb
-
SSDEEP
3072:Sp75uwQPByfkMY+BES09JXAnyrZalI+YQ:SFsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ff6bbc1ac901b40ad5c6b975e30e14400000000020000000000106600000001000020000000bbe2ca645c98df0b0e238d804b0e93565de898c570e2c530c9568c85782fd25d000000000e80000000020000200000008ca48a3594b01fc9001749677de7a4dcb034b07ad50db20fe244669b288540bf20000000691a79a75036dbdcebc406dda1991a2fc6d4eafc0409b2f8848e43c90ec1a11540000000a58dcd89e75758615920ea2a7b0bb60e6901db7df7c608c95833f0b0c1bed2129688c92a1bb594613d8d45c588897ae7bf32adaf9ace309ca879ce4fdebe78d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ff6bbc1ac901b40ad5c6b975e30e144000000000200000000001066000000010000200000000fb2710710d9cfed4ae1422bfb4621068f901fdf248ee71b673f8e151e699c00000000000e80000000020000200000006e11ab346ae22086504da6b8183fed234ce4a5babb518f5a9539d3ffebf0deb1900000004cbe451f25f850a90af46e69438111790e829e1f7bc56ad0d4a3c576bbe3868bbda18cc055552ae98df5dae927c009ff4d11a43408b96f194394cbd1488cc1e3d3ce14a044de5ee414da784df063c71d6e6b73b3a60156b7faf2ccdc690ad6778513f8d9cec10cc0be6e19fd6999fef58ab27eb090eb429167a02460fc93822bfd4715a383a8d0d2faf9a406579478964000000016626991a2114af78e2aed0d7f5564d82147a05f5c504e211794b44ab3ace1ad43b735ba8120f1477b122a649eb64bc8a380dabbe879efa231383cafeaef5160 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424591853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABFE1CD1-2AD9-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07f9080e6beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1300 2756 iexplore.exe 28 PID 2756 wrote to memory of 1300 2756 iexplore.exe 28 PID 2756 wrote to memory of 1300 2756 iexplore.exe 28 PID 2756 wrote to memory of 1300 2756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad086cebf34046e81fa32900c54fa809_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8937f8bc89ead8a67ccbd29baff0d6
SHA16fdd4ff40b13dcfef8090cb2d2fc1e8931dc311d
SHA25685f6e08a833ee2e9a102909fd37ac1254f25939e16b52bdd696e4521baf57682
SHA5124c6b6586f8442886e079cbfb0d32e378babc433b1080d37420f81cdbef8cbfdd7dc63ff1da4cb05fe737a5e3f249c32d344750b291e9700e360ed23482a9c222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493a08ed6b9573206f8785a5759b51fa
SHA1f39b1d75517c128e435ba82f473fb0257c52b712
SHA25619bb1079914ebaf61dcb11fcea07f9cbe6bdcaa1e57ca1ee3d95742d9a52d701
SHA51263a68684398ff7a3994bc3e50e529e853d747402da945bcee07d59d0ef73a11ae613714bc8f67402dcbb53c86704fa3c6a6aa47d587c7b03289b9c124b7a78a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56409e25e270e331e6130e8233ac47d86
SHA1231a1548ae0ac2ac6fa927c377308f8b0eab86d0
SHA256ee933ce911e6bd44003a127d487b4cf96cf780adaff65e38f9fe4c47652bd910
SHA51278d981d0b10a5ee8d1b3657ad680d2800275f913bb9cace3ff257b43a6d1fcbc6fb18f4565e969a04feceeb0cc23ab127c3f9b339531053512733bc331e84256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63c69b701d85cb48794dbe9b17b4f4a
SHA169c0f5feea1033ceefb7608ed9868189f8a42e5c
SHA2565489cb7fdc464c0d61717b04044a40efc8728b37d4c386d05c80511e2eee2637
SHA5124c7b47a9361214371559986c77228f9506ecaf55dc76f1c810f73cf0baf15e60126b5fe2bb886fab2188f6bdfd62caa8fb7fae640766cee1d793198d79553816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57095a160c2deaf242b55ae0b722b27d1
SHA1cd68d4d8f7edea962016acc506af5126d72d32cb
SHA25652157e00f8c88dbc4cf6384a0053af1a322321db8a0a23f242d9e44de80ca99c
SHA5120b951b64f7dc26a00849a903ba988e4f512114af804afe38665a3196788fc5a211a2d3c410cf39e35c285b72ebc62e81107a41ae90994b722f77f0a0f2ec6297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166a51af99d52a8b04e724f4648688bf
SHA107fd886554e8864c1047c5861a69f4aa1399a012
SHA2565524ef8ca4fb4f16d3ddf4ab7dbbd4c0886452092bbbe6134c73b73f179e31ee
SHA512ed6e8fe485bafeb15753651a17fa50e2d08425da68fd3843f743c90261f55930dcfc49151c0956c2307ca0321f3cc457bda88019edfe246a9f7bf0ce8c7c9dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51603f3ec1150bfa2902e8125c3134163
SHA15ea3caaf2c1a85f291cebc2a3b129a7715407cc1
SHA2562d6a5e874ef1e8d87e0a00262898f2577352410e29d937fdb88da650c1a9908b
SHA5120a8677154b48067cd26207d725d38c92e8d8d12f20d09ef5afbc7e561d989e62f4d0d583c90b0585f16c0eb81d830a5a828775d0f3b7f28387f7b52b57c271e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387cd505289159d486bb4ed0f85a300c
SHA1d4cf27cb3bf2254552015b887bc57f4d571581a5
SHA256af6d7dd1fb8b1674362e5e8b727d852b4718d64d0b0d6d8866c155200744c87a
SHA5122d0c7d79b8bdd102e7bb6fa43f4ffac07df56fb49247f6601fa3c3d40bbc06389b92ec0c0b08b51b9f7fac20847f4013fc5c1c78b0e43be245fe96dd3aabde1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501aa68a375721110b0da12f01dc2b7ad
SHA1ae35e462a5b6ea53c93664e48e52a4064a8d6849
SHA256add43474d08f7769d7552b18f9b5e96be33c595c175f7bbcc1a0fd6e22dfcbf1
SHA512c7c1d8fd99b2318cd49ed6f0d5821153af22519025544129f49589cbf8944292090b05c01f5b24be44313aecbae76949ac9355c3d3388ac42297ab4581283c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e04f8699f31ef15080b393f859c384e
SHA140c3c3aebae6d065afac919d8707a1fde77361e8
SHA256198c5a042a13a6e1eea2d6fcc17ead54a5046dd5336fc2093884b717a5ac335d
SHA512ab36114318379691a64bf91f4696dd5b6731ae05c74128e390984820d4e3f97b4bb12f604a4f7df2e1be0981855145e275651de0c6e25baaa14d0f7356d69f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99340fb280a7e225db0c5ed2829eee5
SHA17894c10bae8dc0c25d13939d10c71d24d23b7def
SHA256bb97aaa3d1fb8deb9d97ddad38d5c19552ffacfe9419ba9789471568381433d8
SHA51261c56e5d9f16660284285f999621ab182c452dcce6d6c8e3a55d1148da924967b178b9bbcdbdf0545eeda3ffb17528affb04b9e4a75c15bf587d330debc10d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdbfc3566945247099965434404b24b
SHA104f485a40627143cebdcf0fa25e66708ebf0b316
SHA256e482be4ed7c351993a72118f3492f4805bc84928e49348eb4d5eb0ddcc590eb8
SHA512e6f84f94e4afd89830f475be71d4d263fb79a4e420814aaaf8fb18e357992400b46dc8c19486f72d7cbd495645a62bcd1ec490974218cabd4654344569e73a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c837b217942708cfdbc29dd1699e2d
SHA1c9273056fb42a43ed8b229015630e41f2a38b377
SHA256c8d719a4df171266e5c5aaa638899e3d54876ed0c4472922df729093d91c9654
SHA512fdb1d753ce9b0b637985f8d8dcc6cb9fdc8e500d458811c250c2c77bfedf6daa17342f2536b474a7137b734e2362520aa47ba647817793b31549c667cebb882b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149a39c0b6997fa5d0e0abf5e615e04d
SHA1f3b8df2811751f6c4b1cf9450ebc8dcce74f366f
SHA256838e9437f5cc411322bed3f0dd01a751c6158a3bf49fc7db7d83347904290325
SHA51276ff97e1a116cd766fe5f9bff95b0af1b1d0369ca13fd8c84ca4e861188bbbce1b7b716c482600e4a90c0d38bcd8eecb385923022ca782517b0061a6f0fb0dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b834fc189a7f91c11edd2c52e2ce4a11
SHA1fbf8677c229efdefeca73c98c6cd50baf51ea1de
SHA25672c1e29c71fd142730e7091646c8b751b791fa0c233e9b4969bb6316d34f08bf
SHA512d7fde4bf789cf1816abaa95e12460582340203969a7c332d40a6c74bafd74c370cf1f13943a90765305342750cf8ff24521242152a6f6fff30accaeea3930cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f964dae3feff5a490d248b15a03813fe
SHA164b135fb649ca4e207fba5b361b7f3bafe1e1c03
SHA25699176f43c62739c7d83dc5b811f6c93069de62cc43e9bc32de496013c6efae82
SHA5129baf0f41a7a98d2324222036345ce540dd2cec2f390273f0cac754922662740d234395945a7cc0ef6a02987672fbf80d6d7e4466c71a02ada1c507aa20fd34b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141e91326756685ac441bf7d6a27f5fd
SHA1646cc9067009b720057494ccdb0983bb571cdf8d
SHA256c5d0b5bcadbe4aef141e7e17d01000673dbd5358e5fa70e5174be6e565e1012c
SHA512360e649b38133bf63ebab5e135f1d92017f28bf26083d4087ecbd5542c386699a3025624574543f4195b6100dbd3552661a5c76db192d7c730019ff4498cebd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b46d545fe8f1095e77b92085979656
SHA1b33fe018e6ba30c6809248e1bd613e6239012063
SHA25627ad331b37909366d68eb2ba64318d9a75caee99689e33e71db7dc2e3eef7045
SHA5127764a41880262594304b60cd93878c83590b6c449fb60fe5500c936c8f80d73f4749dcaaf57c72daaf3a1fb0e491b91e2a4711eaa80999b43ecc6bb9eb032f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c335159cecc52a9d2fef7fb5c6d02c
SHA137d27f9887a5f111557badd40fe7ba1cb39556fe
SHA25651a462e5e91372f5f967afe7e04f90305306486d2ed74710ab6c12c8cd9734cd
SHA512b0c2569daf3873b68b33eb73830958c025e99ce713facd0fed66d518360e54470b95fb1d8a4adc381a0034ad908a031885c0c2a858552b60f768e1cbc8539789
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b